Skip to content
+1 512 696 1522
Facebook page opens in new windowTwitter page opens in new window
LUCY Security
LUCY Security
  • Home
  • Solution
    • Overview
    • Attack Simulation
    • Test Infrastructure
    • Awareness Training
    • Engage Employees
  • Editions
  • Resources
    • Custom Awareness Video
    • Partners
    • Distributors
    • Support
    • Video Library
    • Documents
    • Course Overview
  • About
    • About us
    • Contact
    • News and press
      • Dark Web Analysis
    • Connect 2020
    • Careers
    • Upcoming Events & Webinars
  • English (English)
  • Home
  • Solution
    • Overview
    • Attack Simulation
    • Test Infrastructure
    • Awareness Training
    • Engage Employees
  • Editions
  • Resources
    • Custom Awareness Video
    • Partners
    • Distributors
    • Support
    • Video Library
    • Documents
    • Course Overview
  • About
    • About us
    • Contact
    • News and press
      • Dark Web Analysis
    • Connect 2020
    • Careers
    • Upcoming Events & Webinars
  • English (English)

Blog and Video

Oct142018
BlogVideo

Even for Experts: Phishing & Training Campaigns set up within seconds with LUCY Software 4.3 [Video]

It can’t be better! Cybercrime Prevention in Seconds! Also for Pros: A new Phishing and Training Wizard for Campaign Creation is available in LUCY V4.3. LUCY Software is the leading solution for cybercrime prevention.

Watch the 2-minute video and discover how to set up, start and send a complete simulated phishing attack and a security awareness training course to your employees in two minutes. We explain how this works:

  1. You need LUCY Server V4.3 as local installation or Cloud Appliance (Download).
  2. Log into LUCY and select ‘New’ and ‘Campaign Wizard’ options in the Campaign Dashboard.
  3. The wizard for creating the simulated phishing attack will start. Select the type of attack you want to use. Available are hyperlink-based, web-based, file-based, USB attack, Mail+Webfilter test, pure training without attack simulation or the Malware Simulation to test your infrastructure.
  4. Select the template on which the phishing attack should be based, define the attack language.
  5. Name your attack scenario and select the client under which the attack should run.
  6. If you want to add a training to the phishing attack, please select the corresponding checkbox.
  7. Now define the properties of the phishing attack: attack domain, sender name (of the simulated phishing email), sender email and subject of the message. You can already work with variables to address the victims individually here. The configuration of the attack part is now completed.
  8. Awareness Training part: Now select the appropriate sensitization training and the language to be used. There are hundreds of quizzes, videos, games, interactive courses, posters, etc. to choose from.
  9. Now also define the properties of the training lesson: source domain, sender name, sender e-mail and subject. This information is then used to send the user an invitation e-mail to complete the training.
  10. Select a predefined recipient group that is to receive the attack and the training or enter the recipients now.
  11. Done! Check your entries in the recapitulation of the phishing and training campaign and
  12. Press ‚Start’. Alternatively, professionals can go into the detailed settings of the attack and make further revisions! So even specialists benefit from the efficiency gain in campaign creation through the LUCY V4.3 Campaign Wizard.

Strengthen your staff against Internet attacks with LUCY Software! There is no better product for cybercrime prevention.

Schedule a Demo

Ask for a Testsystem

Categories: Blog, VideoBy adminOctober 14, 2018
Tags: phishing softwarewizard
Share this article
Share on FacebookShare on Facebook TweetShare on Twitter Pin itShare on Pinterest Share on LinkedInShare on LinkedIn Share on WhatsAppShare on WhatsApp

Author: admin

Post navigation

PreviousPrevious post:New LUCY 4.3 brings a full blown LMS and Debian 9.5NextNext post:Did you miss all these features from the past 12 months? From LUCY 3.7 to 4.3

Related Posts

The 3 main Reasons your users get hacked
November 4, 2021
Which Cyber Training has the greatest learning impact?
April 19, 2021
Cyber Security Awareness NIST – Requirements, Commitments and Content
March 29, 2021
Phishing Attacks in the Holiday Season
December 16, 2020
Why LUCY 4.7.5 is a milestone in our product development
September 3, 2020
Holistic Cybersecurity a Must for the Healthcare Industry
April 1, 2020
Recent Posts
  • New LUCY Security Release 4.8.4
  • LUCY Security presents User Awards 2021
  • LUCY Security presents international Partner Awards 2021
  • LUCY Security at ASIS Europe 2022 in Prague from May 22-24
  • LUCY Software NOT affected by the Log4j Bug
Archives
  • January 2022
  • December 2021
  • November 2021
  • August 2021
  • May 2021
  • April 2021
  • March 2021
  • January 2021
  • December 2020
  • September 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • July 2019
  • May 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • June 2018
  • March 2018
  • November 2017
Categories
  • Blog
  • Event
  • Local Event
  • News
  • Press
  • ReleaseNote
  • Resources
  • TechBlog
  • Video
CONTACTS

Address: Europe
Lucy Security AG
Chamerstr. 44 | 6300 Zug | Switzerland

Address: North America
LUCY Security USA
13785 Research Blvd
Suite 125
Austin, TX 78750

CONTACTS

Address: Europe
Lucy Security AG
Chamerstr. 44 | 6300 Zug | Switzerland

Address: North America
LUCY Security USA
13785 Research Blvd
Suite 125
Austin, TX 78750

SEARCH
CONNECT

Find us on:

Facebook page opens in new windowTwitter page opens in new windowYouTube page opens in new windowLinkedin page opens in new window
INFORMATION
  • Home
  • Solution
  • Editions
  • Resources
  • About us
  • Support Wiki
  • Contact
  • Demo request
LANGUAGE
  • English
LUCY Security
All Rights Reserved 2022











Noted in the press

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Privacy PolicyCookie PolicyACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.