xorlab and Lucy working together Zurich, Zug – The partnership between the two cybersecurity start-ups xorlab and Lucy is intended to provide employees in large companies with even better protection against phishing and other threats. Companies, especially large ones, will systematically train their employees to recognize dangerous e-mails and to act accordingly. The Zug-based company…
LUCY Security: Enabling companies to improve their IT security awareness Cyber threats have multiplied at a fast rate. Today, no sector is left behind when it comes to threats and attacks, especially the financial sector. When an organization is under threat, it involves both outside actors as well as internal employees. Take a look at…
LUCY Security AG at booth #13 GISEC (https://www.gisec.ae/) from 1–3 APRIL 2019 | DWTC, UAE
Legality of Using Third-Party Marks in Phishing Simulations and Educational Presentations on Phishing
This article addresses the legality of displaying third-party trademarks or service marks as part of an educational phishing simulation or educational presentation on phishing attacks made available for use by employers through software offered by Lucy Security AG (“Lucy”).
As 2018 drew to an end, many cybersecurity reports published their findings on the most common types of attacks that targeted small and large organisations. Let’s take a closer look at an evergreen method of cybercrime, social engineering and more specifically phishing.
Our evaluation process has shown that LUCY Security Awereness software is the only solution that meets our data protection and GDPR needs.
The Marriott Data Breach: What impact will this incident have on industry and consumers? Listen to the podcast!
Jean speaks with his guests Colin Bastable of LUCY Security and Matt Mosley of Tevora about the Incident
The second release using Debian 9.5 brings significant improvements to users of the Phishing Incident button. Further the GDPR compliance is now on the highest level!
The ever evolving nature of cyber attacks requires companies to constantly update their corporate security strategies. Best practices used 5 years ago may be outdated today. The same can apply to security companies.