Small Business

Blog
Why Coalition is Bringing Active Cyber Insurance to Germany
Growing concerns around cyber risk and low cyber insurance adoption rates among all business segments make Germany an obvious choice for Coalition expansion.

Blog
Introducing Coalition Security Awareness Training
Coalition Security Awareness Training makes it easy for small businesses to educate employees on cybersecurity, monitor performance, and track compliance.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.

Blog
Bolstering Resilience to Avoid Disruption: The Evolving Role of Cyber Insurance
Sezaneh Seymour, Coalition’s VP and Head of Regulatory Risk and Policy, discusses an evolving cyber risk landscape on The Cyber Insider podcast.

Blog
MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion
Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.

Blog
Coalition Security Services: More Protection From Cyber Risk
Learn about our expanded security offering, Coalition Security Services, and how it can help protect your business from cyber risks.

Blog
Pay on Behalf: Why Coalition Coverage Handles Upfront Costs for Policyholders
Cyber events can be costly, and most businesses can’t afford a massive loss. So who’s responsible for payment while an insurance claim is in progress?

Blog
Preserving Data Privacy in a Digital Age
Organizations that fail to prioritize data privacy can put themselves at risk not only of the direct impacts of a cyber attack but also liability to others.

Blog
Security Alert: What to Know About Threat Actor Volt Typhoon
Microsoft and CISA warned that the Chinese APT Volt Typhoon is targeting critical infrastructure by living off the land. Learn the risks of this technique.

Blog
Incident Response Impact: A Tale of Two Cyber Claims
When it comes to cyber incidents, time is critical. Learn why speed matters from two real case studies and how Coalition can help.

Blog
Nonprofits face risk of cyber scams this holiday season
Learn how one nonprofit faced the worst cybersecurity woes during the busy holiday season and what your organization can do to improve its cyber hygiene.

Blog
All I want for Christmas is for businesses to understand their cyber risk
As a broker, you know too well the challenges of trying to convince business owners of the importance of cyber coverage in an increasingly digitized environment.

Blog
Cybersecurity education: Incidents vs. attacks and tools to mitigate them
There are many terms related to cybersecurity failures, such as events, incidents, and attacks. But what do these terms mean, and is there a hierarchy?

Blog
Cybersecurity alphabet soup: Security defensive acronyms
The best cybersecurity strategy requires a good defense. In the latest post in our cyber acronyms series, we explore key terms you should know to protect your organization.
