Home | VerSprite Resources
Download Guide
theft
Second half of the 20th century saw the dawn of the information age. Now, at the beginning of 21st century, and especially with the proliferation of IoT devices and social media usage, we are seeing the dawn of misinformation.
Learn more
VerSprite
what is phishing
Phishing is a top concern for businesses as ransomware by phishing attacks increase. Learn what a phishing attack is, common types of phishing, and how to spot phishing emails. Share this article with your employees to bring greater awareness to this issue.
Risk Analysis
VerSprite’s latest report identifies the top 10 global cybersecurity threats, challenges, and opportunities. This comprehensive guide is powerful resource for organizations looking to evolve and refine their geo-cyber strategy for the remainder of 2020.
Jordan Young
Enterprise Data Security
Our free, 4-part cybersecurity video training series walks you through how to stay safe online when working from home. This series is perfect for businesses that are moving employees to remote work.
Phishing Attacks
[Video 1] How secure are your surroundings while working outside your company’s office? In this free training video, we’ll teach you important security precautions to consider while working at home or in a public space.
April Brown
Social Engineering
[Video 2] In this free security training video, we’ll discuss how to better protect your home network while you work remotely. Also, find out what home office devices may be putting your sensitive company data at risk.
[Video 3] Phishing emails, Vishing, and fake websites are easy ways malicious threat actors take advantage of remote employees. In this free training video, learn key indicators for identifying and avoiding phishing attacks.
Security Awareness Training
[Video 4] As a remote IT or tech professional, it’s important to maintain your company’s cybersecurity posture. This free video will give you tips to create new security protocols while employees work from home, including VPN patching and communication.
During adversarial attack simulations harvesting credentials through phishing are often performed through cloned websites. A cloned website works by copying the front-end (such as the Gmail login page) and hosting it on a domain designed to mimic the real domain.
James Sibley
Back to Resources
We are an international squad of professionals working as one.
Email
Phone