[Live Webinar] Join us 25 March for more insights from our new 2026 Cyber Claims Report.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Incident Response

Security

Blog

Why We Acquired Wirespeed

How Coalition's acquisition of Wirespeed, an industry-leading cybersecurity platform, will enhance its suite of cyber risk management tools.
Sisi LiuNovember 06, 2025
Cyber Insurance

Blog

Timely Reporting Can Be the Deciding Factor in Cyber Insurance

The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
Robert JonesAugust 25, 2025
Cyber Insurance

Blog

UK Government Issues Response to Public Ransomware Consultation

Coalition shares its perspective after the UK government published its official response to the public consultation on ransomware legislation.
Sezaneh SeymourJuly 28, 2025
Security

Blog

Not All Endpoint Security Solutions Are Created Equal

As more businesses adopt endpoint security solutions, a clear disconnect has emerged between how they’re marketed and how they truly function.
Jason VitaleJune 28, 2025
Security

Blog

Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider

Small and midsize businesses need a security partner who's invested in their well-being — so why not a cyber insurance provider?
John B. RobertsJanuary 22, 2025
Security

Blog

How MDR Elevates the Role of In-house Security and IT Teams

A managed detection and response (MDR) service is like having your own security operations center but at a more manageable cost.
Jamie McGrorySeptember 10, 2024
Cyber Insurance

Blog

Familiar Threat Actor Attack Tactics Find New Life

Changes in technology are prompting threat actors to revive old attack methods that may seem ordinary on the surface but still lead to cyber insurance claims.
Gregory AndersenJune 27, 2024
Security

Blog

SEO Poisoning Attacks Demand More Scrutiny from Search Engine Users

Threat actors are capitalizing on the trust we put in search engines by hiding malicious websites in plain sight using a tactic known as SEO poisoning.
Alexander AmmonsJune 20, 2024
Security

Blog

Threat Actor Claims 100% Success With SIM-Swapping Extortion

SIM-swapping extortion attacks are on the rise due to self-service password resets, which help threat actors bypass interaction with their victims.
Shelley MaJune 17, 2024
Cyber Insurance

Blog

The Double-Edged Sword of Using Boundary Devices

Boundary devices can help mitigate cyber threats and enable secure remote access. However, these technologies are often directly targeted in cyber attacks.
Gregory AndersenApril 18, 2024
Security

Blog

LockBit Ransomware Used in Exploitation of ConnectWise ScreenConnect

Coalition Incident Response has discovered a link between the LockBit ransomware gang and the ConnectWise ScreenConnect vulnerabilities. 
Leeann NicoloMarch 06, 2024
Cyber Insurance

Blog

Common Cyber Tax Fraud Schemes (and How to Help Mitigate Them)

During tax season, businesses tend to unknowingly lower their defenses to attackers — and almost all cyber tax fraud starts with a phishing email.
Gregory AndersenFebruary 20, 2024
Cyber Insurance

Blog

Why MDR is the Next MFA for Cyber Insurance

Cyber insurance providers are increasingly encouraging businesses to implement MDR — if not incentivizing it — just as they did with MFA.
Gregory AndersenJanuary 24, 2024
Security

Blog

QR Codes Increasingly Used in Phishing Attacks

Threat actors are using QR codes in phishing attacks to gain access to business networks. Learn the risks and how to evaluate a QR code for legitimacy.
Jason VitaleJanuary 11, 2024
Cyber Insurance

Blog

Pay on Behalf: Why Coalition Coverage Handles Upfront Costs for Policyholders

Cyber events can be costly, and most businesses can’t afford a massive loss. So who’s responsible for payment while an insurance claim is in progress?
Jason BucherNovember 22, 2023