Home | VerSprite Resources
View VerSprite's Compliance Advisory Services →
Download Service Listings
Security Awareness Training
Minimize phishing cyberattacks and prevent domain spoofing with these three settings: SPF, DKIM, and DMARC.
Learn more
Mike Charette
Bazaar loader
Exotic Lily specializes in breaching a company and then selling the access to the highest bidder. These threat actors shifted their focus from IT, Healthcare, and cybersecurity companies to a broader spectrum of companies.
Uddip Ranjan
Our free, 4-part cybersecurity video training series walks you through how to stay safe online when working from home. This series is perfect for businesses that are moving employees to remote work.
VerSprite
Phishing Attacks
[Video 1] How secure are your surroundings while working outside your company’s office? In this free training video, we’ll teach you important security precautions to consider while working at home or in a public space.
April Brown
[Video 2] In this free security training video, we’ll discuss how to better protect your home network while you work remotely. Also, find out what home office devices may be putting your sensitive company data at risk.
Enterprise Data Security
[Video 3] Phishing emails, Vishing, and fake websites are easy ways malicious threat actors take advantage of remote employees. In this free training video, learn key indicators for identifying and avoiding phishing attacks.
[Video 4] As a remote IT or tech professional, it’s important to maintain your company’s cybersecurity posture. This free video will give you tips to create new security protocols while employees work from home, including VPN patching and communication.
During adversarial attack simulations harvesting credentials through phishing are often performed through cloned websites. A cloned website works by copying the front-end (such as the Gmail login page) and hosting it on a domain designed to mimic the real domain.
James Sibley
Data Security Breach
This guide offers a perspective gained from research and experience into incidents and their causes. Nothing will stop all cyber incidents, but attention to these areas can reduce the chances of a successful attack.
Ray Strubinger
Back to Resources
We are an international squad of professionals working as one.
Email
Phone