Cybercriminals use COVID-19 to attack your smartphone

Train your users now!

Criminals are exploiting the uncertainty around COVID-19 certificates

“Dear patient, you will receive some text message with your digital certificate in the next few days.” Such vague and general statements from vaccination centers and authorities addressed to patients enable cybercriminals to gain access to employees’ smartphones or other sensitive data with so-called smishing attacks.

Smishing
Smishing

Training of Employees is needed now

The best protection is realistic training with a so-called smishing simulation. This type of training educates employees efficiently and realistically. The simulation results, which are anonymous at the employee level, subsequently allow corporate communications or human resources to initiate further awareness and information measures and thus increase viability.

Uncomplicated and rapid implementation

With Lucy, this is done quickly.

Fixed price offer

  • For customers with their own LUCY system, it is 3 Euros per user.
  • For customers without their own LUCY system for 3.50 Euros per user.
  • Flat rates are possible

Compare yourself with others

Measure yourself against other service users in a smishing benchmark. Participation in the benchmark is optional and anonymous. Those customers who choose to do so will see the results of third-party customers. There is a minimum requirement of six participants.

STEP

No. 1

ASSIGNMENT AND CONFIDENTIALITY AGREEMENT

LUCY is assigned to carry out a smishing campaign and is authorized to use the collected information needed for this purpose and for this purpose only.

STEP

No. 2

PREPARATION

Employees will receive an SMS pointing to a landing page where somebody tries to grab a user’s login details. The landing page is created for the customer concerned, and the user’s mobile numbers are collected for sending such a text message.

STEP

No. 3

PILOT

A test run will be performed to verify that the smishing simulation meets the customer’s expectations.

STEP

No. 4

IMPLEMENTATION

Employees will receive a text message supposedly from their own employer with a request to log in. All messages are sent on a workday during office hours.

STEP

No. 5

REPORT & CONCLUSION

The results for internal communication are processed and made available for the management. Employee data and the simulation will be deleted.

Results of a smishing campaign

Smishing

Please contact us to request a quote.

REQUEST A QUOTE NOW!