“Dear patient, you will receive some text message with your digital certificate in the next few days.” Such vague and general statements from vaccination centers and authorities addressed to patients enable cybercriminals to gain access to employees’ smartphones or other sensitive data with so-called smishing attacks.
Cybercriminals use COVID-19 to attack your smartphone
Train your users now!
Criminals are exploiting the uncertainty around COVID-19 certificates
Training of Employees is needed now
The best protection is realistic training with a so-called smishing simulation. This type of training educates employees efficiently and realistically. The simulation results, which are anonymous at the employee level, subsequently allow corporate communications or human resources to initiate further awareness and information measures and thus increase viability.
Uncomplicated and rapid implementation
With Lucy, this is done quickly.
Fixed price offer
- For customers with their own LUCY system, it is 3 Euros per user.
- For customers without their own LUCY system for 3.50 Euros per user.
- Flat rates are possible
Compare yourself with others
Measure yourself against other service users in a smishing benchmark. Participation in the benchmark is optional and anonymous. Those customers who choose to do so will see the results of third-party customers. There is a minimum requirement of six participants.
STEP
No. 1ASSIGNMENT AND CONFIDENTIALITY AGREEMENT
LUCY is assigned to carry out a smishing campaign and is authorized to use the collected information needed for this purpose and for this purpose only.
STEP
No. 2PREPARATION
Employees will receive an SMS pointing to a landing page where somebody tries to grab a user’s login details. The landing page is created for the customer concerned, and the user’s mobile numbers are collected for sending such a text message.
STEP
No. 3PILOT
A test run will be performed to verify that the smishing simulation meets the customer’s expectations.
STEP
No. 4IMPLEMENTATION
Employees will receive a text message supposedly from their own employer with a request to log in. All messages are sent on a workday during office hours.
STEP
No. 5REPORT & CONCLUSION
The results for internal communication are processed and made available for the management. Employee data and the simulation will be deleted.