Use our best-practice templates for efficient set up of a Data Entry Phishing Simulation. Here, users receive an email inviting them to a customized website to enter (sensitive) data.

In this short video you will see how this is done. For more information please refer to our LUCY Wiki. The section Create your first phishing campaign shows you step-by-step instructions for what you must do.

 

Do you want to watch even more?  Watch our hands on screencast “Create a phishing simulation attack