Small Business

Blog
Bridging the Cyber Insurance Gap Between Brokers and SMEs
Coalition UK research reveals a gap between specialist cyber insurance take-up by SME decision makers and broker impact on outcomes.

Blog
It’s Time to Say Goodbye to On-Premises Microsoft Exchange
Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.

Blog
The Endpoint Security Tool You May Already Be Paying For
Rather than buying a new security tool to bolster your cybersecurity posture, see if you’re entitled to endpoint security with your Microsoft business license.

Blog
How MSPs and Cyber Insurance Providers Can Unite to Fortify the Future
Partnering with cyber insurance providers can help MSPs create new revenue opportunities, simplify service offerings, and deepen client relationships.

Blog
Not All Endpoint Security Solutions Are Created Equal
As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.

Blog
Study Finds Small Businesses Underestimate Cyber Risk Reality
Coalition’s new Small Business Cybersecurity Study uncovers small business leaders’ experiences with and perceptions of cyber risk.

Blog
Your Email Account is the Primary Gateway for Cyber Attackers
Business email compromise is one of the most pervasive cyber threats. Learn how to protect your business with security awareness training.

Blog
Limiting Employee Access Can Reduce Your Cyber Exposure
Role-based access control can strengthen your security posture by reducing employee error and malicious insiders while addressing compliance requirements.

Blog
Fortinet SSL VPN Decision Presents New Risks
Fortinet’s decision to end support for its SSL VPN technology is creating new challenges for businesses that depend on the remote access technology.

Blog
Why Every SMB Should Shrink Its Attack Surface
Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.

Blog
Are Your Weak Passwords Welcoming a Cyber Attack?
Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.

Blog
Why We Built the Risky Tech Ranking
The Risky Tech Ranking is designed to help businesses make better-informed purchasing decisions and drive more accountability among technology providers.

Blog
How MDR Helps Businesses Protect Against Top Cyber Threats
Managed detection and response is an invaluable way for small and midsize businesses to strengthen their cybersecurity posture without an in-house team.

Blog
7 Security Actions for SMBs to Prioritize in 2025
Knowing which security actions to prioritize is the first step toward small and midsize businesses becoming more cyber resilient.














