Go to Coalition
All Collections
Cybersecurity Education
Cybersecurity Education
Learn more about cybersecurity and how to protect yourself and your business
L
81 articles in this collection
Written by
John Roberts,
Jen McPhillips,
and
Leeann Nicolo
Getting Started
Getting Started Securing your Business
Learn more about where to start in securing your business and using the Coalition Knowledge base
Written by
Jen McPhillips
Updated over a week ago
Understanding and Preventing Malware Infections
Learn about the different types of malware that you and your organization is exposed to and how you can protect yourself
Written by
Jen McPhillips
Updated over a week ago
Understanding and Preventing Business Email Compromise
Learn about business email compromise and how to protect yourself and your organization
Written by
Jen McPhillips
Updated over a week ago
Understanding and Preventing Funds Transfer Fraud
Learn about Funds Transfer Fraud (FTF) and how to avoid becoming a victim
Written by
Jen McPhillips
Updated over a week ago
Understanding and Preventing Social Engineering Attacks
Learn what social engineering attacks are and how you can protect yourself and your organization
Written by
Jen McPhillips
Updated over a week ago
Understanding and Preventing Denial of Service (DoS/DDoS)
Learn about denial of service attacks and how to prevent them.
Written by
Jen McPhillips
Updated over a week ago
Understanding and Reducing the Risks of Software Vulnerabilities
Learn about the types of software vulnerabilities and how you can reduce the risk of compromise
Written by
Jen McPhillips
Updated over a week ago
Understanding the Impacts of Unpatched and Out-of-Date Software
Understanding the value of updating software applications
Written by
Jen McPhillips
Updated over a week ago
Starting a Vulnerability Disclosure Program
Learn about vulnerability disclosure programs and how to start your own.
Written by
Jen McPhillips
Updated over a week ago
Implementing Multi-Factor Authentication
Learn how to install and enable multi-factor authentication for your emails and applications.
Written by
Jen McPhillips
Updated over a week ago
Understanding Password Extortion Scams
New email spear phishing scam uses your own password
Written by
Jen McPhillips
Updated over a week ago
Training your staff with Security Awareness Training
How to use security awareness training to help improve the cybersecurity posture of your organization
Written by
Jen McPhillips
Updated over a week ago
Securing your Email
Getting Started Securing your Business Email
Learn the key areas of email security and what you can do.
Written by
Jen McPhillips
Updated over a week ago
Using Anti-Phishing software
How to use anti-phishing software and services to help secure your corporate email usage
Written by
Jen McPhillips
Updated over a week ago
Protecting your email with SPF, DKIM, and DMARC
Learn about the benefits of SPF, DKIM, and DMARC and how to enable them for your email domains.
Written by
Jen McPhillips
Updated over a week ago
Enabling SPF to Secure your Email
Learn about SPF and how to enable it for your email domain.
Written by
Jen McPhillips
Updated over a week ago
Using SPF on Domains without Email
How and why to use SPF on domains that don't host email
Written by
Jen McPhillips
Updated over a week ago
Preventing Spoofing with DMARC
Domain-based Message Authentication, Reporting and Conformance (DMARC) limits email spoofing
Written by
Jen McPhillips
Updated over a week ago
How to configure DKIM for Office 365
How to set up DKIM records for your Office 365 Email
Written by
Jen McPhillips
Updated over a week ago
How to configure DKIM for GSuite
How to set up DKIM records for your GSuite Email
Written by
Jen McPhillips
Updated over a week ago
Preventing Spoofing with DKIM
Learn how to help prevent email spoofing by using DKIM
Written by
Jen McPhillips
Updated over a week ago
How to configure DMARC for Email
Learn what DMARC is and how to configure it for Office 365, GSuite, and other mail services
Written by
Jen McPhillips
Updated over a week ago
Tagging External Emails in Office 365
Learn to visually identify emails that come from outside your organization and add warnings.
Written by
Jen McPhillips
Updated over a week ago
Enabling Multi-Factor Authentication on Office 365
MFA (also known as 2FA) helps protect your organization and is free with Office 365
Written by
Jen McPhillips
Updated over a week ago
Enabling Multi-Factor Authentication in GSuite
How to enable Multi-Factor Authentication (MFA) in GSuite
Written by
Jen McPhillips
Updated over a week ago
Enabling Security Audit Logging in Microsoft Office 365
Learn how to enable your Office 365 security audit logs.
Written by
Jen McPhillips
Updated over a week ago
How to Find Unauthorized Rule Changes in your Email
Learn how to identify email changes attackers leave behind.
Written by
Jen McPhillips
Updated over a week ago
How to Find your Email Headers for Investigation
Learn how and where to find the technical email trail used in an investigation in your email client
Written by
Jen McPhillips
Updated over a week ago
Protecting your Web Applications
Getting Started Protecting your Web Applications
Learn how to protect your web applications from compromise
Written by
Jen McPhillips
Updated over a week ago
Securing your Web Applications with a Web Application Firewall (WAF)
Learn about Web Application Firewalls and what they can do to help protect your web applications
Written by
Jen McPhillips
Updated over a week ago
Understanding Web Application Vulnerabilities with the OWASP Top-10
Learn about the most common web application vulnerabilities from the Open Web Application Security Project Top-10 list.
Written by
Jen McPhillips
Updated over a week ago
Choosing the Right Hosting Provider for your Business
How to choose a web hosting service that's right for you and your business.
Written by
Jen McPhillips
Updated over a week ago
Using SSL/TLS to Secure your Web Applications
Learn about encrypting online communications for your web applications.
Written by
Jen McPhillips
Updated over a week ago
Securing your Magento Store
Top tips for securing your Magento eCommerce Store
Written by
Jen McPhillips
Updated over a week ago
Securing your Drupal CMS
Top tips for securing your Drupal 8 Content Management System
Written by
Jen McPhillips
Updated over a week ago
Configuring and Deploying Cloudflare
Learn how to configure and deploy Cloudflare DNS and traffic proxy
Written by
Jen McPhillips
Updated over a week ago
How to Remove Malware from Your Website
Helpful tips for removing malware and other corruption from your website.
Written by
Jen McPhillips
Updated over a week ago
Securing WordPress
Learn where to get started in securing your WordPress site
Written by
Jen McPhillips
Updated over a week ago
Setting Permissions Correctly in WordPress
Learn how user roles work in WordPress and how to set them properly in your environment
Written by
Jen McPhillips
Updated over a week ago
Obscuring Administrator Username in WordPress
Change the administrator username to help prevent brute force logins
Written by
Jen McPhillips
Updated over a week ago
Updating WordPress to the latest versions
Learn how to update your WordPress website and keep it updated
Written by
Jen McPhillips
Updated over a week ago
Performing Backups in WordPress
Learn how to backup your Wordpress site
Written by
Jen McPhillips
Updated over a week ago
Securing your WordPress Server Linux Filesystem
Properly setting your WordPress filesystem permissions in Linux (Expert Level)
Written by
Jen McPhillips
Updated over a week ago
Enabling Multi-Factor Authentication (MFA) in WordPress
How to enable Multi-Factor Authentication (MFA) (also known as 2FA) in WordPress
Written by
Jen McPhillips
Updated over a week ago
Working with 3rd Parties
Working with 3rd Parties for Security
Learn how to safely use 3rd party IT and Security companies as part of your overall IT strategy
Written by
Jen McPhillips
Updated over a week ago
Protecting your Company from Third-Party Liability with Contracts
Using contracts to help protect your company in the event a third-party has a security or service failure.
Written by
Jen McPhillips
Updated over a week ago
Working with HIPAA Business Associates
Tips for effectively working with Healthcare Business Associates
Written by
Jen McPhillips
Updated over a week ago
Working with an IT Managed Service Provider (MSP)
Learn how to work with MSPs to securely enable your business to succeed
Written by
Jen McPhillips
Updated over a week ago
Internet of Things (IoT)
Learn what IoT means and how this creates exposure for your organization
Written by
Jen McPhillips
Updated over a week ago
Understanding Security Compliance
Understanding Security Compliance and Frameworks
Learn about security compliance and how it applies to you
Written by
Jen McPhillips
Updated over a week ago
How Coalition helps with NYDFS compliance
New York State Department of Financial Services regulation (23 NYCRR 500)
Written by
Jen McPhillips
Updated over a week ago
Understanding SOC2 Compliance
Learn the benefits of SOC2 compliance for your organization
Written by
Jen McPhillips
Updated over a week ago
Understanding PCI Compliance for Credit Card Acceptance
Learn about the Payment Card Industry and the Data Security Standard
Written by
Jen McPhillips
Updated over a week ago
Understanding the HIPAA Security Rule Compliance for Medical Industries
A brief introduction to HIPAA Security Rule Compliance for Medical Industries
Written by
Jen McPhillips
Updated over a week ago
Understanding NIST 800-171 and CMMC Compliance
Learn about complying with NIST 800-171 and the Cybersecurity Maturity Model Certification
Written by
Jen McPhillips
Updated over a week ago
Accepting Healthcare Appointments Online
How should a medical service provider handle accepting patient appointments?
Written by
Jen McPhillips
Updated over a week ago
Protecting your Domain
Getting Started Protecting your Domain
Learn the basics of protecting your online domains
Written by
Jen McPhillips
Updated over a week ago
Understanding the Impact of a Look-Alike Domain
Learn about how look-alike domains are used in modern attacks, what to look for, and how Coalition helps.
Written by
Jen McPhillips
Updated over a week ago
Understanding DNS Registry Locking
Learn how to lock your domain names to prevent fraudulent registration transfers.
Written by
Jen McPhillips
Updated over a week ago
Understanding DNSSEC
Learn the basics of DNS and how to enable DNS security functionality for your domains.
Written by
Jen McPhillips
Updated over a week ago
Protecting Yourself from Malware
Understanding and Preventing Ransomware
Learn what makes ransomware so dangerous and some steps towards becoming a victim of an attack.
Written by
Jen McPhillips
Updated over a week ago
Securing your Business Against Ransomware
Simple technical steps to reduce the risk and impact of a ransomware attack
L
Written by
Leeann Nicolo
Updated over a week ago
Best Practices for Avoiding Malware
Practical tips and steps to take to prevent becoming infected with malware
Written by
John Roberts
Updated over a week ago
Disabling Macros in Microsoft Office
Help prevent malware and ransomware by preventing macro execution
Written by
Jen McPhillips
Updated over a week ago
How to Clean Ransomware
Tips on removing malware infections common to ransomware
Written by
Jen McPhillips
Updated over a week ago
Technical Best Practices
Upgrade from Internet Explorer 11 web browser to modern alternatives
IE 11 is an old web browser with several modern alternatives
Written by
John Roberts
Updated over a week ago
Using Penetration Testing to Improve Security
How to use penetration testing, or Ethical Hacking, to improve your overall security posture
Written by
Jen McPhillips
Updated over a week ago
Closing Unused Network Ports
How to close unused network ports
Written by
Jen McPhillips
Updated over a week ago
Encrypting your Data at Rest
Learn how to protect your data while “at rest” on your computer
Written by
Jen McPhillips
Updated over a week ago
Securing Exposed Databases
Learn how to prevent attackers from finding and attempting to attack your database server
Written by
Jen McPhillips
Updated over a week ago
Securing Exposed Server Message Block (SMB) Servers
Learn how to prevent attackers from finding and attempting to attack your SMB servers
Written by
Jen McPhillips
Updated over a week ago
Understanding Technical Best Practices
Learn what technical best practices are and where to find them
Written by
Jen McPhillips
Updated over a week ago
Recommended Password Policies
Learn about best practices for password use in your organization.
Written by
Jen McPhillips
Updated over a week ago
Understanding Remote Desktop Protocol
Learn about Microsoft Remote Desktop Protocol and how to prevent attacks.
Written by
Jen McPhillips
Updated over a week ago
Checking if your Computers are Encrypted
Learn to identify whether your computers are encrypted or not.
Written by
Jen McPhillips
Updated over a week ago
Device Management Best Practices
Learn about high-level best practices for securing your computers and phones.
Written by
Jen McPhillips
Updated over a week ago
Password Managers
Learn about password managers, how they're used, and why.
Written by
Jen McPhillips
Updated over a week ago
Remote Access Best Practices
Learn about best practices for remotely accessing your networks and computers.
Written by
Jen McPhillips
Updated over a week ago
Data Backup Best Practices
Learn about best practices for backing up your organizations data.
Written by
Jen McPhillips
Updated over a week ago
Vulnerability Analysis
Vulnerability: Windows file sharing ports
Learn about the risks of exposing Windows file sharing ports.
Written by
Jen McPhillips
Updated over a week ago
How to mitigate CVE-2018-9206 - jQuery File Uploader vulnerability
Understanding a vulnerability in the popular jQuery plugin disclosed October 2018
Written by
John Roberts
Updated over a week ago