lucy-phishing-tagline-new-awareness-content-2017

Big Update: Awareness Training and Phishing Attack Templates 02/2017 – IT Security Training reloaded!

LUCY made it to the finals of the 2017 Cybersecurity Excellence Awards!

LUCY made it! We are finalists for both awards!

lucy-ransomware-simulation-locked-screen

How to Educate Unteachable Security Ignorants – Screenlocker Ransomware Simulation

LUCY Phishing Software Java Dropper for Awareness Training

11 Great Things LUCY Phishing Software 2017

Cyber Security Excellence Award - Lucy as awareness product

Please Vote for LUCY at the Cyber Security Excellence Awards

Phishing Incident Plugin for Outlook - LUCY Server

Our Most Beloved New Feature: Phishing Incident Plugin for Outlook

More than a quarter of Downloads in German Speaking Areas to an Article in German Press in October 2016

The IT Security Community is a Global One – LUCY Software Downloads in October ’16

lucy-phishing-attack-template-efax-cozy-bear

Use Identical Mails as used from Cozy Bear for Your Own Phishing Simulations – Post Election Phishing

LUCY Partner BWG Systemhaus

LUCY Phishing announces partnership with German IT-Security Provider BWG

LUCY Security announces partnership with German IT-Security Provider BWG

IT-Security and the Human Factor

The “human factor” is often one of the weakest links in the IT security chain. Attackers exploit this fact by inducing employees to open e-mail attachments or to navigate to faked company sites where the attackers try to sneak up sensitive data, such as Windows login information. These kinds of exploits doesn’t focus technical vulnerabilities, they focus human behaviours as helpfulness, uncertainty, inattention or obedience to authority. On the other hand attentive employees are simultaneously one of the best protections against external cyber threads.

Phishing Service der BWG mit LUCYPhishing Services from BWG – BWG Systemhaus, a German System Integrator, has recognized the increasing need for Phishing simulations in the market and is offering it as a “Phish as a Service” based on the LUCY platform. The LUCY Phishing & Technology Assessment Server is a product platform, where you can perform simulated phishing and malware attacks for/against a given organization. The solution also includes an integrated e-learning platform for increasing IT-Security awareness. Employees are trained and can be effectively prepared with attractive videos and various quizzes so that they gain an increased readiness to respond on cyber attacks.

bwg-logo-small-transparentLUCY’s German partnership with BWG – LUCY Phishing GmbH announces its partnership with the German BWG Systemhaus Gruppe AG, a powerful system integrator in the field of IT infrastructure, IT security, Medical IT and Managed IT services. The company has close to 100 employees and its headquarters are located in Ettlingen, near Karlsruhe. Other offices are in Stuttgart, Freiberg (Saxony) and Leibzig. Go to the Phishing Services from BWG.

About LUCY – The product enables their users to improve their IT-Security awareness and test their IT defenses. It can be installed locally or in the cloud and includes features such as Phishing simulations, IT security awareness training, SMiShing or “Bad-USB” simulations. Additionally, the solution allows technological assessments and harmless technical scenarios can be run, such as malware attacks or ransomware attacks. The Swiss company was founded in 2015, is based in Thalwil near Zurich and has customers in over 20 countries. A partner network is under construction with certified partner companies in Australia / New Zealand, Germany and Hungary.

cisco-asr-report-featured-image

5 Takeaways From Cisco’s Big Cybersecurity Report – fortune.com

1-ransomware, 2-flash, 3-abandoned WP-Sites, 4-OldSwitchesRouters, 5-SecTeams are loosing confidence!

Jonathan Vanian from fortune.com analyzed Cisco’s annual Security Report. His findings are:

  1. Hackers love ransomware (at Hospitals, Universities, UtilityFirms)
  2. Adobe Flash is still bad 4 security
  3. Abandoned WordPress Sites used by hackers for Shops
  4. Companies with old, outdated technology are main targets (Switches, Routers)
  5. The badiest one: Security teams are losing their confidence

Sources: