[Live Webinar] Join us 25 March for more insights from our new 2026 Cyber Claims Report.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition
Topic

Policyholder Education

Security

Blog

It’s Time to Say Goodbye to On-Premises Microsoft Exchange

Businesses are urged to migrate away from Microsoft Exchange to a secure cloud or hosted email solution that’s built for the way we work today.
Gregory AndersenOctober 07, 2025
Security

Blog

Citrix NetScaler RCE Vulnerability Exploited in Zero-Day Attacks

Coalition notified policyholders about a critical remote code execution vulnerability in Citrix’s NetScaler products that is already being exploited in the wild.
Joe ToomeyAugust 28, 2025
Cyber Insurance

Blog

Timely Reporting Can Be the Deciding Factor in Cyber Insurance

The cyber insurance industry must work to normalize the reporting of suspicious activity and encourage businesses to use the resources at their disposal.
Robert JonesAugust 25, 2025
Cyber Insurance

Blog

Taking Responsibility in the Age of Non-Stop CVEs

Like other types of insurance, cyber coverage is meant to ease the financial burden of unforeseen events, not to erase accountability altogether.
Gregory AndersenJuly 31, 2025
Security

Blog

Why Every SMB Should Shrink Its Attack Surface

Shrinking your attack surface can eliminate vulnerabilities and exposures that contribute to your business' overall cyber risk profile.
Alok OjhaMay 01, 2025
Security

Blog

Ransomware Revealed: Top 4 Technologies Exploited by Threat Actors

Most attackers exploit technologies that are highly common among small and businesses and use the same tactics to get inside a network and deploy ransomware.
Ramya RagavanApril 22, 2025
Security

Blog

Are Your Weak Passwords Welcoming a Cyber Attack?

Weak passwords can put your business at risk. Learn how to mitigate the threat of compromised credentials and safeguard your data, finances, and reputation.
Shubham LalwaniApril 17, 2025
Security

Blog

The Psychology of Social Engineering

The power of psychology, people, and persuasion is essential to successful social engineering attacks. Greater awareness is the best defense.
Cory MarchandFebruary 13, 2025
Security

Blog

Expect Everyday Cybercrime to Increase in 2025

Small and midsize businesses must be prepared for everyday cybercrime to increase in 2025, particularly attacks targeting email accounts and endpoints.
Ryan GregoryDecember 18, 2024
Cyber Insurance

Blog

Introducing Cyber Health Rating

Cyber Health Rating is a comprehensive cyber health metric in Coalition Control® that provides actionable steps to improve your cybersecurity posture.
Alok OjhaDecember 16, 2024
Security

Blog

CrowdStrike Software Update Triggers Global Outage

A software update from cybersecurity vendor CrowdStrike prompted a global computer outage impacting Microsoft Windows operating systems.
Tiago HenriquesJuly 19, 2024
Security

Blog

Remove Polyfill.io to Prevent Malicious Attacks

Researchers published new information about the open-source code Polyfill leading to malicious attacks. Learn more about prevention.
Scott WalshJune 28, 2024
Security

Blog

Palo Alto Networks: Patch Available for PAN-OS Zero-day

A patch is now available for a command injection zero-day vulnerability impacting Palo Alto Networks PAN-OS. Learn what actions you need to take.
Simon BellApril 15, 2024
Security

Blog

MFA Bypass Attacks: Weak MFA Implementation Welcomes Intrusion

Threat actors are increasingly targeting multi-factor authentication (MFA). Learn the most effective types of MFA and how to avoid MFA bypass attacks.
Joe ToomeyMarch 01, 2024
Security

Blog

Cyber Threat Index 2024: Scans, Honeypots, and CVEs 

The Coalition Cyber Threat Index uses our data derived from internet scans, honeypots, and vulnerabilities to provide in-depth cyber insights for 2024.
Tiago HenriquesFebruary 21, 2024