Employee Training

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
How to minimize ransomware attacks with a recovery-in-depth approach
If your organization is ever hit by ransomware, here's how incorporating a recovery-in-depth approach first can help you get back to business with minimal loss.

Blog
Coalition Cyber Insurance Tips: Create stronger passwords
Computers rely on usernames and passwords, but weak passwords can be guessed or stolen. Learn our tips to create strong passwords and avoid a cyber incident.

Blog
Cybersecurity education: Staying safe online with robust access controls (MFA, SSO)
Managing digital identities is a crucial part of cybersecurity. Learn how SSO and identity access management mitigates the dangers of separate accounts.

Blog
Cybersecurity education: Educate employees to throw back phishing attacks
Phishing is the most popular attack technique hackers use. Learn more about employee cybersecurity training and ways to combat even the most stealthy phish.

Blog
2021 Coalition Cybersecurity Guide: Simple steps to protect your business
The 2021 Coalition Cybersecurity Guide is designed for small businesses who want specific and actionable recommendations to protect their organization from cyber threats.

Blog
How your company can stay productive & secure while working remotely (Part II)
Best practices for your team to stay productive and secure while working remotely

Blog
How your company can stay productive & secure while working remotely (Part I)
Best practices for your team to stay productive and secure while working remotely

Blog
Introducing Security Awareness Training, provided in partnership with Curricula
