Resources

Enjoy our resources, articles, whitepapers, business documents and infographics.

Short Summary Flyer - Everything you need to know about LUCY!

/
LUCY, the cyber awareness product, makes Simulated…
Simulated Cyber Attacks
LUCY Server Overview Two Pager

LUCY Two Pager 2017

/
All you need to know about LUCY Server on one sheet of paper.…

Results from the Customer Survey 2017

/
Key findings: 84% of the participants recommend LUCY Security…
Create and run a smishing attack in two minutes - LUCY screencast

Setup and Run a Smishing Attack in 2 Minutes - Educational Social Engineering with LUCY

/
A smishing attack is done easily with LUCY Server. Set up your…
Ransomware Explainer Video by LUCY

Did you know that you can customize our Ransomware Explainer Video?

/
Adapt LUCY's Ransomware Explainer Video to your own needs. Owners…
Educational Advanced Spear Phishing Simulation with the appropriate Malware

Advanced Spear Phishing Campaign and appropriate Malware [Video-Tutorial]

/
Suitable for reproduction: Build your own advanced Spear Phishing…
Robert Bosch uses LUCY for Phishing Simulations

Customer Story - Experiences with the use of the LUCY Phishing Awareness Training Server at Robert Bosch

An interview with Patrick Zeller, Senior Manager Enterprise Security,…

You want to copy an existing Website for a Social Engineering Scam? (Simulation) - We show you how it's done

/
After 2 (two!) minutes you have a cloned website for your Phishing…

Phishing Reports: How to read and analyze Stats of a Ransomware Simulation or a File based Phishing Attack

/
How do you read the results of a Phishing Campaign containing…
Avoid Ransomware - Locky in Action
Use Malware and Ransomware simulations from LUCY: Screencasts, examples and tutorials
150 most influencial blogs and contributors in information security - Cyber Security Ranking

It Starts with a Phishing Attack: 10 Steps to a Global Financial Meltdown

/
'Too big to fail'—But the financial industry remains vulnerable.…

Phishing-Service und Assessementdienstleistungen direkt von LUCY

/
Interesssenten aus der Schweiz können neu alle Leistungen rund…

Competencies of security leaders

/
What skills are optimal for a security leader to have? In reviewing…

Setting up LUCY - It takes just minutes!

/
LUCY comes as VMWare, ESXi, Virtual Box or Amazon AWS images.…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Training Video: Educational Video for Users

/
Rich media content provides the highest learning impact. Use…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

French Training Video: Educational Video for Users

/
La vidéo de formation IT Security en français - Le contenu…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

Spanish Training Video: Educational Video for Users

/
El video de entrenamiento de seguridad de TI en español - Contenido…
The storyboard as word-file is used to document customer requirements for the educational video of LUCY Phishing Server

German Training Video: Educational Video for Users

/
Das LUCY IT Security Trainingsvideo auf Deutsch - Multimediainhalte…