Cybersecurity Education

Learn more about cybersecurity and how to protect yourself and your business

John Roberts avatar Dr. Lee Mangold avatar L
79 articles in this collection
Written by John Roberts, Dr. Lee Mangold, and Leeann Nicolo
Getting Started

Getting Started Securing your Business

Learn more about where to start in securing your business and using the Coalition Knowledge base
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Preventing Malware Infections

Learn about the different types of malware that you and your organization is exposed to and how you can protect yourself
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Preventing Business Email Compromise

Learn about business email compromise and how to protect yourself and your organization
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Preventing Funds Transfer Fraud

Learn about Funds Transfer Fraud (FTF) and how to avoid becoming a victim
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Preventing Social Engineering Attacks

Learn what social engineering attacks are and how you can protect yourself and your organization
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Preventing Denial of Service (DoS/DDoS)

Learn about denial of service attacks and how to prevent them.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding and Reducing the Risks of Software Vulnerabilities

Learn about the types of software vulnerabilities and how you can reduce the risk of compromise
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding the Impacts of Unpatched and Out-of-Date Software

Understanding the value of updating software applications
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Starting a Vulnerability Disclosure Program

Learn about vulnerability disclosure programs and how to start your own.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Implementing Multi-Factor Authentication

Learn how to install and enable multi-factor authentication for your emails and applications.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding Password Extortion Scams

New email spear phishing scam uses your own password
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Training your staff with Security Awareness Training

How to use security awareness training to help improve the cybersecurity posture of your organization
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago
Securing your Email

Getting Started Securing your Business Email

Learn the key areas of email security and what you can do.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Using Anti-Phishing software

How to use anti-phishing software and services to help secure your corporate email usage
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Protecting your email with SPF, DKIM, and DMARC

Learn about the benefits of SPF, DKIM, and DMARC and how to enable them for your email domains.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling SPF to Secure your Email

Learn about SPF and how to enable it for your email domain.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Using SPF on Domains without Email

How and why to use SPF on domains that don't host email
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Preventing Spoofing with DMARC

Domain-based Message Authentication, Reporting and Conformance (DMARC) limits email spoofing
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to configure DKIM for Office 365

How to set up DKIM records for your Office 365 Email
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to configure DKIM for GSuite

How to set up DKIM records for your GSuite Email
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Preventing Spoofing with DKIM

Learn how to help prevent email spoofing by using DKIM
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to configure DMARC for Email

Learn what DMARC is and how to configure it for Office 365, GSuite, and other mail services
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Tagging External Emails in Office 365

Learn to visually identify emails that come from outside your organization and add warnings.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Multi-Factor Authentication on Office 365

MFA (also known as 2FA) helps protect your organization and is free with Office 365
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Multi-Factor Authentication in GSuite

How to enable Multi-Factor Authentication (MFA) in GSuite
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Security Audit Logging in Office 365

Learn how to enable your Office 365 security audit logs.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to Find Unauthorized Rule Changes in your Email

Learn how to identify email changes attackers leave behind.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to Find your Email Headers for Investigation

Learn how and where to find the technical email trail used in an investigation in your email client
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago
Protecting your Web Applications

Getting Started Protecting your Web Applications

Learn how to protect your web applications from compromise
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing your Web Applications with a Web Application Firewall (WAF)

Learn about Web Application Firewalls and what they can do to help protect your web applications
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding Web Application Vulnerabilities with the OWASP Top-10

Learn about the most common web application vulnerabilities from the Open Web Application Security Project Top-10 list.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Choosing the Right Hosting Provider for your Business

How to choose a web hosting service that's right for you and your business.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Using SSL/TLS to Secure your Web Applications

Learn about encrypting online communications for your web applications.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing your Magento Store

Top tips for securing your Magento eCommerce Store
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing your Drupal CMS

Top tips for securing your Drupal 8 Content Management System
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Configuring and Deploying Cloudflare

Learn how to configure and deploy Cloudflare DNS and traffic proxy
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to Remove Malware from Your Website

Helpful tips for removing malware and other corruption from your website.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing WordPress

Learn where to get started in securing your WordPress site
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Setting Permissions Correctly in WordPress

Learn how user roles work in WordPress and how to set them properly in your environment
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Obscuring Administrator Username in WordPress

Change the administrator username to help prevent brute force logins
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Updating WordPress to the latest versions

Learn how to update your WordPress website and keep it updated
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Performing Backups in WordPress

Learn how to backup your Wordpress site
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing your WordPress Server Linux Filesystem

Properly setting your WordPress filesystem permissions in Linux (Expert Level)
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Multi-Factor Authentication (MFA) in WordPress

How to enable Multi-Factor Authentication (MFA) (also known as 2FA) in WordPress
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago
Technical Best Practices

Using Penetration Testing to Improve Security

How to use penetration testing, or Ethical Hacking, to improve your overall security posture
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Closing Unused Network Ports

How to close unused network ports
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Encrypting your Data at Rest

Learn how to protect your data while “at rest” on your computer
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing Exposed Databases

Learn how to prevent attackers from finding and attempting to attack your database server
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Securing Exposed Server Message Block (SMB) Servers

Learn how to prevent attackers from finding and attempting to attack your SMB servers
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding Technical Best Practices

Learn what technical best practices are and where to find them
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Recommended Password Policies

Learn about best practices for password use in your organization.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Understanding Remote Desktop Protocol

Learn about Microsoft Remote Desktop Protocol and how to prevent attacks.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Checking if your Computers are Encrypted

Learn to identify whether your computers are encrypted or not.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Device Management Best Practices

Learn about high-level best practices for securing your computers and phones.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Password Managers

Learn about password managers, how they're used, and why.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Remote Access Best Practices

Learn about best practices for remotely accessing your networks and computers.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Data Backup Best Practices

Learn about best practices for backing up your organizations data.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago