Home | VerSprite Resources
Download Guide
Global Threats
VerSprite’s latest report identifies the top 10 global cybersecurity threats, challenges, and opportunities. This comprehensive guide is powerful resource for organizations looking to evolve and refine their geo-cyber strategy for the remainder of 2020.
Learn more
Jordan Young
Social Engineering
Our free, 4-part cybersecurity video training series walks you through how to stay safe online when working from home. This series is perfect for businesses that are moving employees to remote work.
Versprite
Enterprise Data Security
[Video 1] How secure are your surroundings while working outside your company’s office? In this free training video, we’ll teach you important security precautions to consider while working at home or in a public space.
April Brown
Security Awareness Training
[Video 2] In this free security training video, we’ll discuss how to better protect your home network while you work remotely. Also, find out what home office devices may be putting your sensitive company data at risk.
[Video 3] Phishing emails, Vishing, and fake websites are easy ways malicious threat actors take advantage of remote employees. In this free training video, learn key indicators for identifying and avoiding phishing attacks.
Phishing Attacks
[Video 4] As a remote IT or tech professional, it’s important to maintain your company’s cybersecurity posture. This free video will give you tips to create new security protocols while employees work from home, including VPN patching and communication.
During adversarial attack simulations harvesting credentials through phishing are often performed through cloned websites. A cloned website works by copying the front-end (such as the Gmail login page) and hosting it on a domain designed to mimic the real domain.
James Sibley
Multi-Factor Authentication
Utilizing reverse proxies offers a more advanced approach for creating phishing web pages that not only allow the Victim User to fully authenticate to their account through a malicious site, but also how to automate the theft of information within the account.
LastPass is a commonly used cloud-based password management solution that stores hundreds of unique and strong passwords, but what if a user’s entire password database is compromised? While a cloud-based solution to password management is very convenient, it isn’t without its own set of dangers.
Back to Resources
We are an international squad of professionals working as one.
Email
Phone