Books from Verne Harnish, Stephen Covey, Eric Ries, Liz Wiseman, Marshal Rosenberg and Christoph Mathis for building a better business: Lean Startup, Non Violent Communication, Scaled Agile, Scaling Up and Multipliers

For Accelerators, Multipliers and Entrepreneurs – The Books we read in 2016

It is important that you don’t only focus on Tech skills,  when you build a Software Business. As an entrepreneur and a leader in Tech you need to start early developing your personal and especially your communication skills. So we did in 2016! Here’s the list.

Avoid Ransomware - Locky in Action

18 Strategic and Creative Ways to Avoid Ransomware

Phishing Incident Plugin for Outlook - LUCY Server

Our Most Beloved New Feature: Phishing Incident Plugin for Outlook

How to configure an IT Security Awareness Training with LUCY Interactive Training Templates

Security Awareness Training – Screencast How to customize your own Training using the Mixed Interactive Template

It's done in two minutes - create a phishing scam simulation with LUCY. A webcast

Create and Execute a Phishing Scam in 2 Minutes – Simulations with LUCY

Send out a Ransomware Simulation in just two Minutes - LUCY Tutorial and screencast

It Takes You 2 Minutes to Create and Send Out a Ransomware Simulation

LUCY Relase 3.2 is available in November 2016

Bam! LUCY V3.2 is out with awesome corporate features

Dear LUCY Users,

Phishing Incident Plugin for Outlook and LDAP Integration – Only six weeks after Version 3.1 we’re shipping already LUCY Release V3.2! Why? Because we wanted it so! Big customers and large corporate prospects asked us to provide more corporate features. And we put them in this release!

Analyzing a malware simulation report from LUCY

Malware screencast 5/5 – How malware simulations are reported: Example of a vulnerability scan report.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Screencast showing how a ransomware simulation is run with lucy, this is a tutorial video

Malware screencast 4/5 – Setting up a ransomware attack simulation (harmless) – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos:

Different Malware Types can be simulated with LUCY - Tutorial Screencast

Malware screencast 3/5 – Different types of available malware simulation templates – LUCY Server.

Setup and run different types of malware attack simulations with LUCY: In a set of screencasts we show you how you can execute vulnerability scans, ransomware simulations, remote console posts and many more!
Template based malware attack simulations: We created a series of screencasts, where we show quickly, how you can customize a vulnerabiltiy scan or a malware attack simulation using a predefined template. Let’s have a look on these 5 videos: