LUCY Security: Enabling companies to improve their IT security awareness Cyber threats have multiplied at a fast rate. Today, no sector is left behind when it comes to threats and attacks, especially the financial sector. When an organization is under threat, it involves both outside actors as well as internal employees. Take a look at…
LUCY Security AG at booth #13 GISEC (https://www.gisec.ae/) from 1–3 APRIL 2019 | DWTC, UAE
Legality of Using Third-Party Marks in Phishing Simulations and Educational Presentations on Phishing
This article addresses the legality of displaying third-party trademarks or service marks as part of an educational phishing simulation or educational presentation on phishing attacks made available for use by employers through software offered by Lucy Security AG (“Lucy”).
As 2018 drew to an end, many cybersecurity reports published their findings on the most common types of attacks that targeted small and large organisations. Let’s take a closer look at an evergreen method of cybercrime, social engineering and more specifically phishing.
LUCY reaches an incredible Net Promoter Score of 85.3 in 2018 The average NPS in B2B Tech is 21 The company changes its legal form from LLC to AG Zug – 24. April 2018 – LUCY Security AG announced that the company has achieved a dreamlike 85 Net Promoter Score (NPS®), far exceeding the Tech […]
Superior employee awareness available thanks to the partnership between LUCY Security AG and HvS-Consulting AG
You think that no such files reach your network or the mailbox…
Nearly 70 new educational posters for printing and hanging – freely modifiable and available in two different versions. This is simple and effective employee sensitisation for security awareness.
Simple = Effective. For the top 10 Phishing Emails a simple formula obviously applies when it comes to the question of which phishing simulations are the most effective.
Zug, June 20, 2018 – The employee is the major target for Internet Attacks. 97% of all attacks target the person and only 3% target the technology. People are the central link in the IT security chain. Employees with high awareness and a secured technology stack are the best protection for an organization. The German […]