Lucy Security https://lucysecurity.com Award winning Awareness and Phishing Software Thu, 12 Mar 2026 14:38:28 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.1 https://lucysecurity.com/wp-content/uploads/2025/02/cropped-lucy-icon-black-blue-32x32.png Lucy Security https://lucysecurity.com 32 32 Lucy 5.7 Product Released https://lucysecurity.com/lucy-version-5-7/ Wed, 11 Mar 2026 13:04:38 +0000 https://lucysecurity.com/?p=65619 Version 5.7 features The new Lucy release version 5.7 is packed with new features to help you improve the IS resilience in your organization.  Lucy helps you to deliver robust and effective Awareness programs to your employees with the features you need to manage this challenging and complex activity with confidence and minimal effort. This […]

The post Lucy 5.7 Product Released first appeared on Lucy Security.

]]>

Version 5.7 features

The new Lucy release version 5.7 is packed with new features to help you improve the IS resilience in your organization.  Lucy helps you to deliver robust and effective Awareness programs to your employees with the features you need to manage this challenging and complex activity with confidence and minimal effort.

This particular release includes many Beta features which will change the game in terms of how you manage your awareness activities and what you can hope to achieve.

 Automated capabilities, performance driven and configurable to the needs of your organization.

Lucy 5.7 features

We’re excited to tell you all about Lucy 5.7, packed with new features and usability enhancements

Teams Phishing Attacks (Beta)

Lucy now supports phishing simulations sent as Teams messages. This allows organizations to test employee awareness directly from within their daily communication platform. Simulated attacks can be easily set up and scheduled using the same campaign settings as other simulated attacks.

AI Translation Tool (Beta)

We know our customers and partners use Lucy in a great many countries and run campaigns in very many languages. To give you the ability to easily run attack simulations in multiple languages we have introduced our AI Translation Tool for quick and accurate translation of attacks

Adaptive Phishing (Beta)

This fantastic new feature eliminates the need to manually create and manage each separate attack campaign. Instead, once it is configured, it automatically runs simulations at recurring intervals. Each user is allocated to an attack campaign based on their risk level derived from prior performance. 

AURA (Beta)

This fully automated awareness engine delivers policy -driven security education across your organization.  Select topics, define target audiences  and set courses and awareness-boosters. AURA then automatically assigns training based on each user’s learning record. It manages reminders and provides a rich dashboard of progress and coverage. This initial Beta is only available in English language.

 

Automated Awareness Training

Operational Improvements

We have improved the LDAP and Azure import process to make synchronizations better. System notifications can now be sent direct to admin users inbox. We have also included a Balance Transactions Log which helps you keep track of spend.

Awareness Campaign Enhancements

When working on Awareness Campaigns you can now easily undo any changes you made by clicking on “restore defaults”. As well as changing the awareness template from within the current campaign.

 

How can you find out more?

For full technical details and screenshots, view the official 5.7 release notes.

Or reach out to our team to request a demo to discuss your needs .

We will also soon be adding a comprehensive demonstration of these new features on our YouTube Channel.

The post Lucy 5.7 Product Released first appeared on Lucy Security.

]]>
Human Risk Management in Cybersecurity Explained https://lucysecurity.com/human-risk-management-in-cybersecurity/ Mon, 09 Mar 2026 17:27:11 +0000 https://lucysecurity.com/?p=65615 Human Risk Management in Cybersecurity

The post Human Risk Management in Cybersecurity Explained first appeared on Lucy Security.

]]>

Human Risk Management in Cybersecurity for CISOs

Human risk management in cybersecurity is becoming a core priority for modern CISOs. Attackers no longer rely only on malware or technical exploits. Instead, they target employees through phishing, vishing, social engineering, credential theft, and business email compromise.

As a result, human risk management in cybersecurity has moved beyond basic awareness training. It now focuses on measuring user behavior, identifying high-risk groups, and reducing the likelihood of successful attacks. For security leaders, that means treating people-related exposure as a measurable and manageable part of enterprise risk.

human risk management in cybersecurity

 

This article explains what human risk management in cybersecurity means, why it matters, and how CISOs can use it to build a stronger, more defensible awareness strategy.

What Is Human Risk Management in Cybersecurity?

Human risk management in cybersecurity is the practice of identifying, measuring, and reducing security risk linked to human behavior.

In simple terms, it means understanding how employees, contractors, and other users may increase cyber risk through actions such as:

  • clicking phishing links

  • opening malicious attachments

  • reusing passwords

  • sharing credentials

  • approving fraudulent payment requests

  • mishandling sensitive information

Traditional awareness programs often focus on course completion. However, human risk management in cybersecurity goes further. It looks at whether people are changing their behavior and whether that change reduces real-world risk.

Therefore, the goal is not just to train users. The goal is to lower the probability that a person will become the entry point for an attack.

Why Human Risk Management in Cybersecurity Matters

Human risk management in cybersecurity matters because many cyber incidents still begin with human action. Attackers know that a user can be easier to manipulate than a well-configured firewall or endpoint control.

That is why phishing, voice fraud, QR code scams, malicious MFA requests, and social engineering remain effective. They target attention, trust, urgency, and routine. Even strong technical controls can fail when an employee is deceived into helping the attacker.

For CISOs, this creates a clear challenge. They must show that awareness activity is not just a compliance box. They must show that it reduces exposure.

A strong human risk management in cybersecurity program helps security leaders:

  • identify which users and groups face the highest risk

  • measure behavioral weaknesses over time

  • target education more accurately

  • improve reporting of suspicious messages

  • demonstrate progress to leadership and auditors

Because of this, human risk management in cybersecurity gives awareness teams a clearer place in the wider security strategy.

How Human Risk Management in Cybersecurity Differs from Traditional Awareness Training

Many organizations still rely on annual e-learning and a standard phishing test. That approach may satisfy a minimum policy requirement, but it rarely delivers enough depth.

Human risk management in cybersecurity differs from traditional awareness training in several important ways.

Human Risk Management in Cybersecurity Focuses on Behavior

Traditional training often measures attendance or completion. By contrast, human risk management in cybersecurity measures actions and patterns. It asks practical questions:

  • Who clicks repeatedly?

  • Who reports suspicious emails quickly?

  • Which teams show the highest exposure?

  • Which users improve after training?

  • Which users remain vulnerable?

This shift matters because behavior is what attackers exploit.

Human Risk Management in Cybersecurity Uses Continuous Measurement

A once-a-year course provides only a snapshot. However, human risk management in cybersecurity relies on continuous observation and repeated testing. It uses ongoing simulations, reporting data, and learning interactions to build a more accurate picture of user risk.

Human Risk Management in Cybersecurity Supports Risk-Based Action

Not every employee presents the same level of risk. Senior executives, finance staff, HR teams, and privileged users often face greater exposure. Therefore, human risk management in cybersecurity supports targeted action instead of one-size-fits-all awareness.

That makes the program more efficient and usually more credible with leadership.

human risk management in cybersecurity

Core Components of Human Risk Management in Cybersecurity

A practical human risk management in cybersecurity program usually combines several elements.

1. Phishing and Social Engineering Simulations

Simulations test how users respond to realistic attacks. These may include:

  • phishing emails

  • spear-phishing scenarios

  • QR code lures

  • SMS phishing

  • vishing calls

  • credential harvesting pages

These exercises help security teams see where users struggle and where targeted training is needed.

2. Targeted Security Awareness Training

Awareness content should match the risk. A finance team may need invoice fraud and payment diversion training. Executives may need business email compromise and impersonation training. General staff may need phishing, password, and data handling modules.

This is where human risk management in cybersecurity becomes more precise. The training is tied to measured exposure rather than generic assumptions.

3. Reporting and Detection Behavior

A mature program does not only track who fails. It also tracks who helps defend the organization. Reporting rates matter because they show whether employees can recognize and escalate suspicious activity.

That means human risk management in cybersecurity should reward positive behavior as well as identify weak points.

4. Risk Scoring and Segmentation

Many organizations group users by department, role, geography, exposure level, or historical performance. This makes it easier to identify patterns and allocate effort.

For example, security teams may find that one business unit clicks less often but reports less often too. Another may complete training but still fail realistic simulations. These patterns support better decisions.

5. Governance and Executive Reporting

CISOs need evidence. They need to explain where risk sits, whether it is improving, and what action is being taken.

For that reason, human risk management in cybersecurity should include reporting that translates awareness activity into risk language that boards, auditors, and senior management can understand.

Awareness Is Your Strongest Defense

Like every new phishing method, quishing preys on trust, haste, and gaps in training. But once your staff are aware of the tactic, it becomes far less effective.

Security isn’t just about blocking links—it’s about empowering people to recognize and resist manipulation in all its forms.

If your awareness program doesn’t include QR phishing, it’s time to scan your strategy.

 

How CISOs Can Measure Human Risk Management in Cybersecurity

Measurement is one of the strongest reasons to adopt human risk management in cybersecurity. Without measurement, awareness remains vague. With measurement, it becomes a managed control.

Useful metrics may include:

  • phishing failure rate

  • phishing reporting rate

  • repeat failure rate

  • time to report

  • training completion by risk group

  • improvement after remediation

  • exposure by role or department

  • vishing simulation outcomes

  • high-risk user population size

However, CISOs should avoid relying on one metric alone. A click rate without context can mislead. A completion rate says little about behavior. Therefore, a balanced set of measures is better.

The aim is to show whether human risk management in cybersecurity is reducing the chance of successful compromise over time.

How Human Risk Management in Cybersecurity Supports Board and Compliance Discussions

Security awareness often becomes more important when the board asks for evidence or when a regulator expects proof of due care.

That is one reason human risk management in cybersecurity is increasingly relevant. It helps CISOs move from broad claims to defensible statements such as:

  • user reporting improved over the last two quarters

  • repeat phishing failures fell in high-risk groups

  • executives completed role-based fraud awareness

  • departments with elevated exposure received targeted remediation

  • simulations now cover email, QR, SMS, and voice channels

This type of reporting is stronger than saying training was delivered. It shows active management of the human layer.

For organizations working under frameworks such as NIS2, ISO 27001, DORA, or sector-specific internal controls, that distinction can be useful.

Common Mistakes with Human Risk Management in Cybersecurity

Although the concept is strong, execution often goes wrong in predictable ways.

Treating Human Risk Management in Cybersecurity as a Rebrand Only

Some organizations rename awareness training as human risk management in cybersecurity without changing the operating model. If the only evidence is annual training and an occasional phishing test, the program is still immature.

Measuring Failure but Ignoring Improvement

A good program should identify weak points, but it should also track whether users improve after targeted intervention. If not, the data has limited value.

Using Unrealistic Simulations

If simulations feel artificial, employees stop taking them seriously. Worse, the results become less useful. Realistic and relevant scenarios matter.

Failing to Prioritize High-Risk Users

Not every user needs the same level of attention. CISOs should focus effort where impact is highest.

Reporting Activity Instead of Risk

The board does not need a long list of course completions. It needs a view of exposure, progress, and remaining concern.

How to Build a Better Human Risk Management in Cybersecurity Program

CISOs do not need to rebuild everything at once. A phased approach works better.

First, establish a baseline through simulations, training records, and reporting behavior. Next, identify the highest-risk groups and the most common failure patterns. Then, deliver focused interventions and measure the change.

Over time, human risk management in cybersecurity should become part of a broader security model that connects awareness, policy, reporting, and risk management.

The strongest programs are continuous. They adapt to new threats, new business processes, and new user behaviors. They also speak the language of risk rather than the language of generic compliance.

FAQs: Human Risk Management in Cybersecurity

1. What is human risk management in cybersecurity?

Human risk management in cybersecurity is the process of identifying, measuring, and reducing cyber risk linked to user behavior, especially in areas such as phishing, social engineering, and credential misuse.

2. Why is human risk management in cybersecurity important for CISOs?

It helps CISOs understand where people-related exposure exists, target the highest-risk users, and show that awareness activity is reducing business risk rather than just fulfilling a policy requirement.

3. How do you measure human risk management in cybersecurity?

Organizations usually measure simulation outcomes, reporting behavior, repeat failure rates, improvement after remediation, and exposure across different roles, departments, and seniority levels.

4. Is human risk management in cybersecurity the same as security awareness training?

No. Security awareness training is one part of it. Human risk management in cybersecurity also includes simulations, measurement, segmentation, remediation, and executive reporting.

5. What should a good human risk management in cybersecurity program include?

A good program should include realistic simulations, targeted awareness content, reporting metrics, role-based interventions, governance, and clear evidence of behavioral improvement over time.

Final Thoughts

Human risk management in cybersecurity gives CISOs a stronger way to understand and reduce people-related exposure. Instead of treating users as a vague problem, it turns behavior into something measurable, reportable, and manageable.

That shift matters. Attackers continue to exploit trust, routine, and distraction. Therefore, organizations need more than annual awareness activity. They need a structured approach that links simulations, education, reporting, and remediation to real risk reduction.

Human risk management in cybersecurity is not just a new label for awareness. When done properly, it is a more mature operating model for strengthening the human layer of defense.

Contact us to find out more.

Our You tube channel also has lots of relevant and helpful content.

The post Human Risk Management in Cybersecurity Explained first appeared on Lucy Security.

]]>
GDPR vs CLOUD Act: Data Sovereignty in Security Awareness https://lucysecurity.com/gdpr-vs-cloud-act-data-sovereignty-security-awareness/ Wed, 04 Mar 2026 10:06:40 +0000 https://lucysecurity.com/?p=65610 GDPR vs CLOUD Act: Why

The post GDPR vs CLOUD Act: Data Sovereignty in Security Awareness first appeared on Lucy Security.

]]>

GDPR vs CLOUD Act: Why Data Sovereignty in Security Awareness Matters

The conflict between GDPR vs CLOUD Act is no longer theoretical. It directly affects data sovereignty in security awareness platforms. While cloud adoption accelerated over the past decade, legal jurisdiction did not disappear. Instead, it became more complex. Therefore, organisations must now reassess where and how their security awareness data is processed.

 

GDPR vs CLOUD Act

This is not about privacy ideology. It is about structural legal exposure. GDPR treats personal data as a fundamental rights issue. The CLOUD Act treats lawful access as a sovereign function. Both systems are coherent. Yet together, they create jurisdictional tension. As a result, hosting decisions have become risk management decisions.

GDPR vs CLOUD Act: A Structural Jurisdictional Conflict

Under GDPR, organisations must assess risk to the rights and freedoms of individuals. That obligation is proactive. It requires accountability, documentation, and justification. Moreover, it demands that organisations consider who can access personal data and under what legal authority.

The CLOUD Act, however, allows U.S. authorities to compel U.S.-based providers to disclose data, regardless of physical storage location. Jurisdiction follows the provider. Therefore, even if data is stored in Europe, it may still fall under U.S. legal reach.

This is not a compliance failure. It is a structural overlap. If a U.S.-headquartered cloud provider processes EU employee data, it may be subject to both GDPR and the CLOUD Act. Consequently, organisations face dual legal exposure.

For CISOs and DPOs, this creates uncertainty. Contracts cannot override sovereign law. Technical safeguards help. Yet jurisdictional authority remains.

Why Data Sovereignty in Security Awareness Now Matters

Security awareness platforms process more than email addresses. They often handle:

  • Employee identity data

  • Phishing simulation performance

  • Behavioural risk scoring

  • Training completion records

  • Departmental reporting

  • Remedial learning histories

While this data may not seem sensitive at first glance, it creates behavioural profiles. Therefore, it can fall squarely within GDPR’s risk-based framework.

If such datasets are hosted under U.S. jurisdiction, organisations must consider potential extraterritorial access. Even lawful access creates exposure. Moreover, notification obligations may differ. As a result, risk allocation becomes unclear.

This is why data sovereignty in security awareness has moved from theory to procurement requirement. Regulated sectors now routinely ask:

  • Who owns the hosting entity?

  • Under which jurisdiction does it operate?

  • Can data be accessed under foreign law?

These questions reflect legal friction, not political positioning.

GDPR vs CLOUD Act – From Cloud Convenience to Jurisdictional Risk Assessment

For years, cloud adoption focused on scalability and cost. However, geopolitical developments have changed the equation. Schrems rulings, surveillance debates, and evolving EU certification schemes have increased scrutiny.

Therefore, organisations must now expand vendor risk assessments to include jurisdictional exposure. This includes:

  • Corporate ownership structure

  • Legal domicile

  • Sub-processor chains

  • Extraterritorial access laws

Data sovereignty in security awareness cannot be an afterthought. Instead, it must be part of architectural design.

Hosting Models Compared Under GDPR vs CLOUD Act

Not all hosting models carry equal jurisdictional risk.

1. U.S. Provider, EU Data Centre
Data is physically in Europe. However, jurisdiction may still follow the provider. Therefore, exposure to the CLOUD Act remains.

2. EU-Based Hosting Provider
The provider operates under EU law. Consequently, extraterritorial exposure is reduced. Legal symmetry improves.

3. EU Hosting with Anonymization Options
Personal identifiers can be removed or masked. Therefore, risk to individual rights decreases. Moreover, regulatory exposure can be reduced.

4.  On-Premise Deployment
Infrastructure is controlled internally. As a result, jurisdiction aligns fully with the organisation’s legal perimeter. This offers maximum sovereignty.  Of course, Anonymization options can also be enabled on-premise to satisfy local oversight like Works Councils.

Each model represents a different risk posture. Organisations must choose consciously.

On-Premise and EU Hosting as Risk Mitigation

On-premise deployment offers clear advantages under the GDPR vs CLOUD Act tension. Infrastructure remains under direct organisational control. There is no foreign provider subject to external jurisdiction. Therefore, legal clarity improves.

Similarly, EU-owned and EU-located hosting reduces asymmetry. If the hosting provider is not subject to U.S. jurisdiction, the CLOUD Act’s reach does not automatically apply. While no system eliminates all risk, alignment strengthens.

These options are not anti-cloud. They are risk-aligned. For sectors such as healthcare, finance, public administration, and defence, this alignment can be decisive.

The Role of Anonymization in Data Sovereignty in Security Awareness

An additional layer of protection lies in anonymization. If personal identifiers are removed or pseudonymised, exposure risk decreases. Under GDPR, fully anonymized data falls outside personal data scope. Therefore, risk to rights and freedoms is reduced.

Anonymization does not replace sound hosting decisions. However, it complements them. Combined with EU hosting or on-premise deployment, it strengthens the compliance posture.

Consequently, organisations gain flexibility. They can maintain effective awareness programs while reducing jurisdictional ambiguity.

How the GDPR vs CLOUD Act Issue is Changing Procurement

By 2026, the GDPR vs CLOUD Act debate has shifted into procurement language. Sovereign cloud discussions now influence tender requirements. Moreover, certification schemes such as EUCS reinforce jurisdictional assessment.

Public sector buyers increasingly request:

  • EU legal control

  • Transparent sub-processing

  • Local data residency

  • Jurisdictional insulation

Data sovereignty in security awareness is therefore no longer niche. It is embedded in resilience frameworks such as NIS2 and DORA.

Organisations that ignore this shift risk future compliance friction.

Strategic Takeaway: Design for Jurisdictional Clarity

The GDPR vs CLOUD Act conflict does not imply that one side is wrong. Both legal systems are internally coherent. However, their overlap creates exposure.

Organisations cannot solve geopolitical divergence. Yet they can design infrastructure to reduce jurisdictional conflict. On-premise deployment, EU-owned hosting, and anonymization are not political statements. They are structured risk management choices.

In 2026, data sovereignty in security awareness is no longer optional. It is a core element of governance design.

Ready to raise awareness and build a strong human firewall? Contact Us today to find out more.

Our You tube channel also has lots of relevant and helpful content.

GDPR vs CLOUD Act FAQs

 

1. Why does GDPR vs CLOUD Act matter for security awareness platforms?

Because these platforms process employee personal data. If hosted under U.S. jurisdiction, they may face extraterritorial access obligations. Therefore, legal exposure must be assessed.

2. Is storing data in an EU data centre enough?

Not necessarily. Jurisdiction may follow the provider, not the server location. Consequently, provider ownership matters.

3. Does on-premise deployment eliminate CLOUD Act exposure?

It significantly reduces it if no U.S.-jurisdiction provider is involved. Therefore, legal symmetry improves.

4. How does anonymization help with data sovereignty in security awareness?

If data is properly anonymized, it may fall outside GDPR scope. As a result, risk to individuals and compliance exposure decreases.

5. Are sovereign hosting decisions anti-cloud?

No. They are risk-based architectural decisions. The objective is jurisdictional clarity, not technological isolation.

The post GDPR vs CLOUD Act: Data Sovereignty in Security Awareness first appeared on Lucy Security.

]]>
Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience https://lucysecurity.com/supply-chain-security-for-cisos/ Thu, 26 Feb 2026 15:48:53 +0000 https://lucysecurity.com/?p=65607 Supply Chain Security for CISOs:

The post Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience first appeared on Lucy Security.

]]>

Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience

Supply Chain Security for CISOs is no longer optional. Attackers now target suppliers first. Therefore, CISOs must move beyond questionnaires and build measurable human-layer resilience across their vendor ecosystem.

Most breaches now originate through third parties. However, many organisations still treat supplier security as a compliance exercise. That approach no longer works. Instead, Supply Chain Security for CISOs must include behavioural controls, awareness enforcement, and continuous oversight.

Supply Chain Security for CISOs

Why Supply Chain Security for CISOs Cannot Rely on Questionnaires Alone

Most vendor risk programmes rely on annual security questionnaires. At first glance, this appears sufficient. However, questionnaires measure declared controls, not real-world behaviour.

A supplier may claim ISO alignment. Yet one employee clicking a phishing link can bypass every documented safeguard.

Therefore, Supply Chain Security for CISOs must include testing, not just attestations.

Key limitations of traditional vendor assessments:

  • Annual cadence does not reflect evolving threats

  • Self-declared answers lack behavioural evidence

  • No measurement of phishing susceptibility

  • No insight into human-layer risk

As a result, CISOs often discover supplier weakness only after an incident.

The Human Layer: The Core Weakness in Supply Chain Security for CISOs

Attackers exploit trust relationships. For example:

  • Compromised finance suppliers send fraudulent invoices

  • MSP accounts are abused for lateral access

  • Procurement impersonation leads to payment diversion

In each case, the technical perimeter remains intact. However, human behaviour fails.

Therefore, Supply Chain Security for CISOs must extend awareness expectations to critical suppliers.

If your employees must complete phishing simulations, why should high-risk suppliers not do the same?

Embedding Awareness into Supply Chain Security for CISOs

Forward-looking CISOs now embed awareness requirements into supplier governance frameworks.

This can include:

  • Contractual clauses requiring security awareness training

  • Mandatory phishing simulation participation

  • Defined remediation for high-risk behaviour

  • Tiered oversight based on supplier criticality

Importantly, this approach shifts supply chain security from reactive compliance to proactive resilience.

However, enforcement must be practical. Suppliers may lack mature training platforms. Therefore, scalable enablement is critical.

Operationalising Supply Chain Security for CISOs with Licence Extension

CISOs often face a structural challenge. They require supplier awareness. Yet suppliers lack the capability.

A practical solution is to allow critical suppliers to operate under the enterprise awareness programme.

This delivers:

  • Centralised reporting visibility

  • Consistent training standards

  • Unified phishing simulation cadence

  • Measurable behavioural KPIs

In addition, dedicated modules covering:

  • Invoice fraud and payment diversion

  • Vendor impersonation attacks

  • Secure communications practices

  • Third-party data handling responsibilities

ensure relevance to supply chain risk scenarios.

As a result, Supply Chain Security for CISOs becomes measurable and enforceable.

Building Vendor Resilience Instead of Vendor Compliance

Compliance confirms documentation. Resilience confirms behaviour.

Therefore, Supply Chain Security for CISOs must focus on:

  1. Behavioural measurement

  2. Continuous testing

  3. Contractual alignment

  4. Shared awareness ecosystems

By extending awareness licences to suppliers, CISOs transform vendors into security stakeholders rather than security liabilities.

Moreover, this model supports regulatory expectations under modern supply chain risk frameworks. It demonstrates governance maturity. It reduces breach probability. And it strengthens board-level assurance.

A CISO Checklist for Supply Chain Security

Ask yourself:

  • Do we measure supplier phishing susceptibility?

  • Do critical vendors complete awareness training?

  • Can we extend licences to high-risk suppliers?

  • Do we have modules tailored to supply chain fraud?

  • Can we report behavioural risk across the supplier ecosystem?

If the answer to any of these is no, your supply chain remains exposed.

Conclusion: Supply Chain Security for CISOs Is Ecosystem Governance

Supply Chain Security for CISOs is no longer a procurement formality. Instead, it is ecosystem governance.

Attackers exploit supplier behaviour. Therefore, CISOs must measure and influence that behaviour.

By embedding awareness requirements, extending licences to critical vendors, and deploying dedicated supply chain training modules, organisations shift from vendor risk to vendor resilience.

Ultimately, Supply Chain Security for CISOs depends not on paperwork, but on people.

Next steps

If you have any questions on this important topic just reach out to ask using our Contact us form.

You might also be interested in looking at one of our Supply Chain risk management awareness modules on You tube.

 

FAQs: Supply Chain Security for CISOs

1. Why is supply chain security a priority for CISOs?

Supply chain security is a priority because attackers increasingly target suppliers as an indirect entry point. While internal controls may be strong, a compromised vendor can bypass technical safeguards through trusted access or email relationships. Therefore, Supply Chain Security for CISOs must address third-party human risk, not just internal controls.

2. Can customers extend their awareness licences to suppliers?

Yes. One effective approach to Supply Chain Security for CISOs is allowing customers to extend their existing awareness licences to critical suppliers. This enables suppliers to participate in the same training and phishing simulations as internal staff. As a result, CISOs gain centralised oversight, consistent standards, and measurable behavioural data across their extended ecosystem.

3. Do you provide specific awareness modules focused on supply chain threats?

Yes. Dedicated awareness modules focused on supply chain threats are essential. These modules typically address invoice fraud, vendor impersonation, payment diversion, third-party data handling, and secure communications practices. Therefore, Supply Chain Security for CISOs becomes directly aligned to real-world supplier attack scenarios rather than generic training content.

4. How should CISOs prioritise which suppliers require awareness enforcement?

CISOs should apply a tiered model based on risk exposure. Suppliers with financial processing access, privileged IT connectivity, data handling responsibilities, or brand trust relationships should be prioritised. Consequently, Supply Chain Security for CISOs becomes risk-driven and proportionate, rather than uniformly applied across all vendors.

5. How can CISOs demonstrate supply chain security maturity to regulators and boards?

CISOs can demonstrate maturity by moving beyond questionnaires and showing behavioural metrics. This includes phishing susceptibility rates, training completion rates, remediation tracking, and supplier risk scoring. When awareness enforcement is measurable and documented, Supply Chain Security for CISOs becomes auditable and defensible at board level.

The post Supply Chain Security for CISOs: From Vendor Risk to Vendor Resilience first appeared on Lucy Security.

]]>
Cybersecurity Challenges in Central and Eastern Europe in 2026 https://lucysecurity.com/cybersecurity-challenges-in-centra-and-eastern-europe/ Fri, 30 Jan 2026 16:33:09 +0000 https://lucysecurity.com/?p=65603 Cybersecurity Challenges in Central and

The post Cybersecurity Challenges in Central and Eastern Europe in 2026 first appeared on Lucy Security.

]]>

Cybersecurity Challenges in Central and Eastern Europe 2026

Cybersecurity challenges in Central and Eastern Europe are rising in 2026. At the same time, attacks are becoming more targeted, more localised, and more disruptive. As a result, organisations in CEE need a practical view of what is changing and what to prioritise.

In particular, healthcare, finance, and the public sector face the sharpest pressure. These sectors handle sensitive data, run complex workflows, and often depend on third parties. Therefore, they are prime targets for social engineering, ransomware, and credential theft.

cybersecurity challenges in Central and Eastern Europe

Why cybersecurity challenges in Central and Eastern Europe are rising in 2026

Several conditions make cybersecurity challenges in Central and Eastern Europe distinct in 2026. First, the region is exposed to a blend of criminal activity and geopolitically motivated disruption. In addition, many organisations combine modern cloud tools with older systems that are harder to patch. Moreover, shared suppliers and outsourced IT create a wider “blast radius” when one provider is compromised.

ENISA’s Threat Landscape continues to highlight social engineering as a major initial access route, while also noting fast exploitation of vulnerabilities and the growing role of AI in attacks.

Cybersecurity challenges in Central and Eastern Europe in 2026: the threat mix

In 2026, cybersecurity challenges in Central and Eastern Europe are defined by convergence. Attackers combine persuasion, identity abuse, and operational disruption rather than relying on a single technique.

1 – Social engineering becomes mobile-first

Phishing still works. However, the chain often starts on mobile: smishing leads to messaging apps, and then escalates to voice calls or payment requests. Consequently, “verify by email” is no longer a safe workflow. ENISA also notes the increasing role of AI-supported phishing activity.

2 – Credential theft fuels repeatable compromise

Stolen credentials, session tokens, and infostealer logs enable fast account takeover. Europol describes this clearly: data and access are traded, reused, and exploited at scale.

3 – Disruption attempts are more visible in CEE

CEE remains a region where disruptive intent is not theoretical. For example, reporting in January 2026 described an attempted destructive attack against Poland’s energy targets linked by researchers to Sandworm, using malware designed to wipe systems.

Cybersecurity challenges in Central and Eastern Europe for healthcare in 2026

For healthcare, cybersecurity challenges in Central and Eastern Europe are amplified by operational urgency. Clinicians and administrators work under time pressure, so attackers focus on workflows that must not slow down.

Common healthcare risks in 2026 include:

  • phishing against shared inboxes, referrals, and appointment workflows

  • invoice and supplier impersonation tied to procurement

  • ransomware combined with data theft and extortion

  • credential reuse across clinical systems and SaaS portals

Even when core systems are defended, attackers aim for the human layer. Therefore, healthcare resilience depends on process controls as much as tools.

cybersecurity challenges in Central and Eastern Europe

Cybersecurity challenges in Central and Eastern Europe for finance in 2026

In finance, cybersecurity challenges in Central and Eastern Europe often look like fraud first and malware second. While banks invest heavily in controls, attackers keep targeting people and processes.

High-frequency finance risks include:

  • payment diversion and invoice fraud (supplier change requests)

  • executive impersonation and “urgent transfer” pressure

  • account takeover via stolen sessions or MFA fatigue

  • credential theft that enables lateral movement into payment systems

Because cross-border operations are common, language and time-zone complexity add risk. As a result, verification steps must be strict, fast, and easy to follow.

Cybersecurity challenges in Central and Eastern Europe for the public sector in 2026

For the public sector, cybersecurity challenges in Central and Eastern Europe are shaped by legacy IT, limited budgets, and large user populations. In addition, municipalities and agencies are highly visible targets.

Common public sector issues include:

  • phishing against procurement, payroll, and citizen services

  • supplier compromise via MSP tools or remote access

  • slow patch cycles and hard-to-retire legacy systems

  • disruption attempts designed to erode trust

CERT Polska reporting also shows the scale of malicious domains and phishing activity handled at national level, which aligns with the pressure public services face.

Practical priorities for cybersecurity challenges in Central and Eastern Europe

To reduce cybersecurity challenges in Central and Eastern Europe in 2026, focus on controls that remove attacker advantage quickly.

  1. Mobile-first awareness and simulations (smishing → chat apps → vishing paths)

  2. Identity hardening (conditional access, MFA quality, privileged access hygiene)

  3. Fraud-proof business processes (call-backs, dual approval, verified channels)

  4. Patch and exposure speed for internet-facing systems

  5. Recovery readiness (tested restores, segmented backups, rehearsed playbooks)

  6. Supplier triage focused on MSPs, remote tooling, and shared admin access

Final thoughts on cybersecurity challenges in Central and Eastern Europe in 2026

In 2026, cybersecurity challenges in Central and Eastern Europe will keep concentrating in healthcare, finance, and the public sector. However, the strongest defensive gains come from tightening workflows and identity controls, not just buying more tools. Ultimately, organisations that reduce human-triggered risk and prove recovery capability will be the ones that stay resilient.

Our You tube channel also has lots of relevant and helpful content. Or Contact Us to discuss your particular challenges and hew we can help.

Further reading

ENISA Threat Landscape 2025 (EU trends, social engineering, AI)

Europol IOCTA 2025: Steal, Deal and Repeat (data/access economy)

Reuters reporting on Poland energy cyber incident (Jan 2026)

CERT Polska annual reporting and statistics

Frequently Asked Questions about cybersecurity challenges in Central and Eastern Europe

What are the main cybersecurity challenges in Central and Eastern Europe in 2026?

The main cybersecurity challenges in Central and Eastern Europe in 2026 are social engineering, ransomware, credential theft, and fraud. These threats often combine technical compromise with human manipulation. As a result, attackers gain access through people rather than systems.


Why are healthcare organisations in CEE especially exposed to cyber attacks?

Healthcare organisations face higher cybersecurity challenges in Central and Eastern Europe because staff work under time pressure and rely heavily on email, mobile devices, and shared systems. In addition, many hospitals still use legacy platforms that are difficult to patch. This makes phishing and ransomware particularly effective.


How do cybersecurity challenges in Central and Eastern Europe affect financial institutions?

For banks and financial services, cybersecurity challenges in Central and Eastern Europe often appear as fraud rather than traditional hacking. Attackers target payment processes, supplier changes, and executive approvals. Therefore, human verification and identity protection are critical controls.


Why is the public sector a frequent target in Central and Eastern Europe?

The public sector faces persistent cybersecurity challenges in Central and Eastern Europe due to visibility, budget constraints, and legacy IT systems. Municipalities and agencies also depend on external service providers. Consequently, phishing and supplier compromise are common entry points.


Are technical security tools enough to address cybersecurity challenges in Central and Eastern Europe?

No. While technical controls are essential, they do not fully address cybersecurity challenges in Central and Eastern Europe. Most successful incidents begin with social engineering or credential abuse. Therefore, organisations must combine technology with training, clear processes, and identity controls.


What should organisations prioritise first to reduce cybersecurity challenges in Central and Eastern Europe?

To reduce cybersecurity challenges in Central and Eastern Europe, organisations should prioritise mobile-focused awareness, strong identity and access management, and fraud-resistant business processes. In addition, tested backup and recovery plans are essential for resilience.

The post Cybersecurity Challenges in Central and Eastern Europe in 2026 first appeared on Lucy Security.

]]>
Security Awareness Trends 2026: Why Attacks Have Gone Mobile — and What Organisations Must Do https://lucysecurity.com/security-awareness-trends-2026/ Thu, 22 Jan 2026 11:07:17 +0000 https://lucysecurity.com/?p=65593 Security Awareness Trends 2026: Why

The post Security Awareness Trends 2026: Why Attacks Have Gone Mobile — and What Organisations Must Do first appeared on Lucy Security.

]]>

Security Awareness Trends 2026: Why Attacks Have Gone Mobile — and What Organisations Must Do

Security awareness trends 2026 reveal a decisive shift. Attacks are no longer focused mainly on corporate email. Instead, they are targeting people on their mobile phones, through messaging apps, QR codes, SMS and voice calls.

This change is not accidental. It reflects how people now live and work.

Security Awareness Trends 2026

Employees are constantly mobile. They move between meetings, commuting, travel, home working and flexible schedules. As a result, they often read messages, approve requests and scan QR codes outside the traditional workplace environment.

Consequently, their security mindset changes. When people are busy, distracted or away from the office, their psychological defences drop. Attackers understand this perfectly. Therefore, modern social engineering is designed to intercept people in moments of urgency, distraction and trust.

This reality defines the core security awareness trends for 2026.

Security awareness trends 2026: why attackers are winning on mobile

The most important driver behind security awareness trends 2026 is behavioural, not technical.

People behave differently on mobile devices.

Specifically:

  • Responding faster and more instinctively

  • Less frequently verifying

  • They trust short messages more easily

  • And, they operate outside formal security routines

In the office, employees sit at desks, use corporate systems and follow formal workflows. In contrast, on mobile phones, they multitask, skim messages and act quickly.

As a result, attackers design campaigns that:

  • Arrive at busy moments

  • Create false urgency

  • Exploit authority and familiarity

  • Bypass email security controls entirely

Therefore, security awareness trends 2026 show that human behaviour on mobile is now the primary attack surface.

Security Awareness Trends 2026 – The work–life blur

Another defining security awareness trend 2026 is context collapse.

Employees now blend work and personal communication across the same devices and apps. WhatsApp, SMS and phone calls are used for both private and professional conversations.

Because of this blending:

  • Business requests feel personal

  • Personal messages feel professional

  • Verification habits weaken

  • Social pressure increases

For example, when an employee receives a WhatsApp message that appears to come from their manager, it triggers social obedience and speed, not analytical security thinking.

Similarly, when a QR code is scanned in a public space, it feels routine and harmless, even if it leads to a malicious site.

Therefore, security awareness trends 2026 demand training that reflects how people actually behave, not how policies assume they behave.

Security Awareness Trends 2026 – Messaging apps as attack channels

One of the clearest security awareness trends 2026 is the rise of messaging-app attacks.

WhatsApp, in particular, now plays a central role in business communication across Europe, DACH and SE Asia. It is fast, informal and trusted. Unfortunately, it is also ideal for impersonation.

Common WhatsApp attack patterns now include:

  • Executive impersonation

  • Fake HR and finance requests

  • Account re-linking scams

  • Supplier and partner fraud

Because messages arrive on personal phones, employees are often:

  • Away from formal verification processes

  • Under time pressure

  • Outside security monitoring controls

As a result, WhatsApp attacks bypass traditional security tooling and awareness habits.

Consequently, security awareness trends 2026 clearly show that messaging apps must be treated as primary threat vectors, not secondary ones.

WhatsApp phishing simulation

Security Awareness Trends 2026 – Smishing, Vishing and QR codes

Smishing: the trigger that starts the attack journey

In practice, Smishing remains a dominant entry point in modern attacks. However, security awareness trends 2026 reveal that smishing rarely acts alone.

Instead, SMS is now used to trigger multi-stage attacks.

Typical smishing journeys include:

  • SMS/Text → fake delivery alert → WhatsApp follow-up

  • Text/SMS → account warning → voice call from “support”

  • SMS/Text → QR scan → credential theft

Because SMS feels transactional and official, recipients often react quickly. Moreover, because phones are personal devices, people trust text messages more than emails.

Therefore, smishing continues to play a central role in multi-channel social engineering, reinforcing its importance in security awareness trends 2026.

QR codes and quishing: trust turned into a weapon

QR codes have become part of everyday life. People scan them for menus, parking, payments and invoices. However, this convenience has fuelled another key security awareness trend 2026: quishing.

Quishing attacks exploit the natural trust people place in QR codes. Because of this, attackers replace legitimate QR codes or distribute fake ones via messages, posters and printed materials.

Once scanned, users are redirected to:

  • Credential harvesting pages

  • Payment portals

  • Malware delivery sites

Crucially, QR scanning bypasses email gateways, link inspection and endpoint filtering. As a result, it shifts security responsibility entirely onto human judgement.

Therefore, security awareness trends 2026 clearly show that QR code literacy is now essential.

Vishing: when pressure defeats rational thinking

Vishing completes the mobile attack ecosystem.

Voice calls allow attackers to apply real-time psychological pressure. They exploit fear, urgency, authority and confusion to force rapid decisions.

Therefore, typical vishing scenarios include:

  • Fake IT emergency calls

  • Executive impersonation

  • Bank and regulator threats

Because calls occur live, employees have no time to reflect. Instead, they rely on instinct and social conditioning.

As a result, security awareness trends 2026 emphasise real-time decision training, not just theoretical knowledge.

What security awareness trends 2026 mean for organisations

Taken together, security awareness trends 2026 deliver a clear message.

Security awareness must evolve from:

  • Email-focused → mobile-first

  • Channel-specific → multi-channel

  • Annual training → continuous reinforcement

  • Policy-heavy → behaviour-driven

Therefore, organisations must prepare employees for real-world attack conditions, including distraction, urgency, social pressure and context switching.

Only then can human risk be reduced meaningfully.

How Lucy supports modern security awareness

Lucy Security is built around these security awareness trends 2026.

As a result, Lucy enables organisations to:

  • Train employees across WhatsApp, smishing, QR and vishing scenarios

  • Deliver mobile-first simulations that reflect real attacks

  • Reinforce safe reporting behaviour at the moment of risk

  • Measure human vulnerability across all major social-engineering channels

Because Lucy aligns training with how people actually work and communicate, it directly supports modern, behaviour-based awareness programmes.

Final thoughts

Security awareness trends 2026 confirm a fundamental shift.

Attackers no longer wait for employees at their desks. Instead, they intercept them on the move, under pressure and outside formal work settings.

Organisations that fail to adapt will continue to suffer avoidable breaches. In contrast, those that embrace mobile-first, multi-channel awareness will build resilient human firewalls.

In 2026, security awareness is no longer about remembering rules.
It is about recognising manipulation in everyday digital life.

Further reading

FAQ: Security awareness trends 2026

1. What are the main security awareness trends 2026?
The main trends are mobile-first attacks, messaging-app phishing, smishing, QR-code abuse and vishing.

2. Why are employees more vulnerable on mobile devices?
Because they are often busy, distracted, outside formal work environments and operating under time pressure.

3. What is quishing?
Quishing is phishing that uses QR codes to redirect users to malicious websites or payment pages.

4. Why is WhatsApp now a major business risk?
Because it blends personal and professional communication, enabling fast and trusted impersonation.

5. Why does vishing succeed so often?
Because real-time voice pressure bypasses rational thinking and forces instinctive decisions.

6. How should organisations adapt security awareness for 2026?
By adopting mobile-first, multi-channel training with continuous reinforcement and strong reporting culture.

 

Want to see these capabilities in action? Contact Us today to book a demo.

Our You tube channel also has lots of relevant and helpful content.

The post Security Awareness Trends 2026: Why Attacks Have Gone Mobile — and What Organisations Must Do first appeared on Lucy Security.

]]>
AI Threats to Employees: New Awareness Training Content https://lucysecurity.com/ai-threats-to-employees-training/ Tue, 13 Jan 2026 13:20:10 +0000 https://lucysecurity.com/?p=65589 AI Threats to Employees: What

The post AI Threats to Employees: New Awareness Training Content first appeared on Lucy Security.

]]>

AI Threats to Employees: What Modern Security Awareness Must Address

AI threats to employees are growing fast. They no longer target systems first. Instead, attackers now target people. Using artificial intelligence, they create convincing messages, voices, and websites that exploit trust, speed, and routine work habits.

As a result, many successful cyber incidents today begin with human interaction. Employees click, reply, approve, or share. Therefore, modern security awareness must evolve. It must focus on how AI-enabled attacks reach staff during everyday work.

AI threats to employees

Why AI Threats to Employees Are Escalating

AI lowers the barrier for cybercrime. Attackers no longer need advanced technical skills. Instead, they use AI tools to generate content at scale. This includes emails, voice calls, fake websites, and documents.

Moreover, AI improves realism. Messages sound natural. Language errors disappear. Context improves. Consequently, employees struggle to spot warning signs they once relied on.

At the same time, work patterns have changed. Employees work remotely. They use mobile devices. They respond quickly to messages. Because of this, attackers exploit urgency and distraction.

Together, these factors explain why AI threats to employees are increasing across all sectors.

How AI Threats to Employees Appear in Everyday Work

AI-driven attacks often blend into normal workflows. They do not look suspicious at first glance. Instead, they imitate trusted processes.

Common examples include:

  • AI-generated phishing emails that match writing style and tone

  • Fake login pages cloned from real business services

  • Voice calls that impersonate managers or suppliers

  • Messages referencing real projects, invoices, or travel plans

Because these attacks feel familiar, employees respond without hesitation. Therefore, awareness training must focus on recognition in context, not just theory.

DORA awareness training

From AI Phishing to Deepfakes: The Human Risk Landscape

AI phishing remains the most common entry point. However, it is no longer limited to email. Attackers now use messaging apps, collaboration tools, and SMS.

Deepfake audio adds a new layer of risk. Attackers use synthetic voices to request urgent payments or sensitive actions. Even experienced staff can be fooled.

In addition, large language models introduce new risks. Employees may unknowingly paste sensitive data into AI tools. Prompt injection attacks can also manipulate AI systems to leak information.

Each of these scenarios targets human behaviour. Therefore, technical controls alone are not enough.

AI Threats to Employees Under DORA and Digital Resilience Rules

AI threats to employees now have regulatory relevance. Under the Digital Operational Resilience Act (DORA), organisations must address ICT risk holistically. This includes people, processes, and technology.

Importantly, DORA recognises that incidents often start with human action. As a result, staff awareness and preparedness form part of operational resilience.

Training must therefore cover:

  • Incident recognition

  • Escalation expectations

  • Safe handling of suspicious requests

  • Awareness of AI-enabled deception

Without this, organisations struggle to meet resilience goals, even with strong technical controls.

Why Short, Focused Training Works Against AI-Driven Attacks

Traditional awareness training often fails because it overwhelms users. Long sessions reduce attention and retention. In contrast, short modules work better.

Microlearning allows employees to absorb one risk at a time. It fits into busy schedules. It also reinforces learning through repetition.

When dealing with AI threats to employees, short formats are especially effective. They allow training to react quickly to new attack techniques. They also support frequent updates without disruption.

As a result, organisations can keep awareness aligned with a fast-moving threat landscape.

Building Awareness for AI Threats Without Overloading Staff

Effective awareness does not rely on fear. Instead, it relies on clarity. Employees need to understand what to look for and what to do next.

Good awareness training:

  • Uses realistic scenarios

  • Explains why an attack works

  • Shows simple decision paths

  • Reinforces reporting behaviour

By doing so, employees become active defenders. They slow attacks down. They report early, and they reduce impact.

Over time, this builds resilience at scale.

Why AI Threats to Employees Will Continue to Evolve

AI tools will continue to improve. Attackers will adapt quickly. Therefore, static training will fall behind.

Organisations must treat awareness as a continuous process. Content must evolve. Scenarios must stay current. Employees must remain engaged.

AI threats to employees are not a future concern. They are already part of daily work. Awareness training must reflect that reality.

Final Thoughts

AI threats to employees exploit trust, speed, and routine. They succeed because people are busy, not careless. Therefore, modern security awareness must be practical, current, and human-focused. When training reflects real work scenarios, employees become a strong line of defence rather than the weakest link.

Ready to raise awareness and build a strong human firewall? Contact Us today to find out more.

Our You tube channel also has lots of relevant and helpful content.

The post AI Threats to Employees: New Awareness Training Content first appeared on Lucy Security.

]]>
China Cybersecurity Law 2026: What It Signals for Cyber Risk https://lucysecurity.com/china-cybersecurity-law-amendments/ Fri, 02 Jan 2026 15:22:21 +0000 https://lucysecurity.com/?p=65583 China Cybersecurity Law Amendments 2026:

The post China Cybersecurity Law 2026: What It Signals for Cyber Risk first appeared on Lucy Security.

]]>

China Cybersecurity Law Amendments 2026: What Regulators Are Really Signalling

The China Cybersecurity Law amendments, effective from 1 January 2026, mark the most significant update to China’s cyber regulatory framework since the law first came into force. While the changes introduce tougher enforcement powers and higher penalties, they also send a clearer signal about what regulators now expect from organisations.

In short, cybersecurity is no longer treated as a purely technical issue. Instead, it is framed as an organisational capability—one that must work reliably in practice, not just on paper.

china regulations 2026

A shift from rules to readiness

The updated China Cybersecurity Law does not prescribe specific technologies or controls. Instead, it strengthens regulators’ ability to assess whether organisations are actually managing cyber risk effectively.

This matters because enforcement is no longer theoretical. Regulators can impose fines without prior warnings, apply operational sanctions, and hold named individuals accountable. As a result, organisations must be able to demonstrate preparedness at all times.

Broader scope, broader accountability

The China Cybersecurity Law amendments also expand regulatory reach in several important ways.

First, the law explicitly applies where overseas activities affect China’s networks or data environment. This has direct implications for global organisations, SaaS providers, and supply-chain partners.

Second, the law aligns more closely with China’s Personal Information Protection Law and Data Security Law. Consequently, how people handle, access, and expose data now sits firmly within cybersecurity compliance expectations.

Why human risk is now central

Although the amendments avoid explicit training mandates, enforcement trends make one point increasingly clear: human-led failures are now regulatory risks.

Credential misuse, social engineering, poor escalation, and incorrect data handling are no longer treated as unfortunate accidents. Instead, they are viewed as indicators of weak governance and insufficient internal controls.

Therefore, organisations are expected to show that employees can recognise cyber risks, respond appropriately, and follow defined procedures under pressure.

China Cybersecurity Law amendments

How the China Cybersecurity Law amendments change enforcement expectations

One of the most consequential elements of the China Cybersecurity Law amendments is the removal of the informal “warning first” approach. Regulators no longer need to issue corrective notices before taking enforcement action.

As a result, organisations must assume that any incident may trigger immediate scrutiny. There is little tolerance for gaps between written policy and operational reality. Consequently, preparedness must be continuous rather than reactive.

This shift fundamentally changes how compliance risk is managed.

Why the China Cybersecurity Law amendments elevate human risk

The China Cybersecurity Law amendments significantly increase exposure to risks originating from human behaviour. Credential misuse, social engineering, poor escalation, and mishandling of data are no longer viewed as isolated mistakes.

Instead, they are interpreted as signals of insufficient governance and weak internal controls.

Because enforcement is faster and penalties are higher, regulators increasingly expect organisations to demonstrate that people can identify risks early, respond correctly, and follow established procedures without hesitation.

China Cybersecurity Law amendments and AI-driven threats

The China Cybersecurity Law amendments also reflect the growing impact of AI on the threat landscape. Synthetic content, automated phishing, and AI-assisted impersonation now sit squarely within cybersecurity governance expectations.

As attacks become more convincing and more scalable, technical controls alone are not sufficient. Therefore, organisations must ensure that individuals are capable of recognising abnormal behaviour and escalating concerns promptly.

This reinforces the importance of organisational readiness in an AI-enabled threat environment.

What regulators look for under the China Cybersecurity Law amendments

Although the China Cybersecurity Law amendments avoid prescriptive control lists, enforcement patterns indicate clear indicators of regulatory confidence.

Regulators increasingly assess whether organisations can evidence:

  • Defined cybersecurity governance and accountability

  • Consistent incident identification and escalation

  • Correct handling of data and access privileges

  • Preventive measures that reduce repeat human error

  • Ongoing improvement rather than one-time compliance

Together, these factors demonstrate that cybersecurity is embedded into everyday operations.

Security Awareness software

Why the China Cybersecurity Law amendments strengthen the case for awareness

Taken together, the China Cybersecurity Law amendments shift compliance from intention to execution. Organisations are no longer judged on whether controls exist, but on whether they work under real conditions.

As enforcement becomes more immediate and accountability more personal, reducing human-led incidents becomes a strategic necessity. Consequently, organisations that systematically improve how people recognise and respond to cyber threats are better positioned to demonstrate due diligence.

In regulatory terms, preparedness must now be observable.

Further reading on the China Cybersecurity Law amendments

For a concise regulatory overview, download our briefing note:
China Cybersecurity Law Amendments – Briefing Note

Final thoughts on the China Cybersecurity Law amendments

The China Cybersecurity Law amendments are not about adding more rules. Instead, they raise expectations around organisational readiness and defensibility.

In this environment, organisations that invest in reducing human cyber risk are not simply improving security posture. They are strengthening their ability to withstand regulatory scrutiny, operational disruption, and reputational damage.

That shift makes awareness-led risk management a core component of modern cybersecurity governance in 2026 and beyond.

Our You tube channel also has lots of relevant and helpful content.

The post China Cybersecurity Law 2026: What It Signals for Cyber Risk first appeared on Lucy Security.

]]>
Phishing Landing Page Cloning for Simulated Attacks https://lucysecurity.com/phishing-landing-page-cloning/ Wed, 12 Nov 2025 09:20:37 +0000 https://lucysecurity.com/?p=65568 Phishing Landing Page Cloning: How

The post Phishing Landing Page Cloning for Simulated Attacks first appeared on Lucy Security.

]]>

Phishing Landing Page Cloning: How Lucy Creates Realistic Credential-Capture Simulations

Phishing landing page cloning lets security teams create convincing credential-capture tests by replicating real websites and adding simulated login forms. This approach helps organisations measure user behaviour under real-world conditions — safely and legally.

Phishing landing page cloning

Why Phishing Landing Page Cloning Matters

Attackers rarely build fake sites from scratch. Instead, they clone real login pages from trusted brands, making them almost indistinguishable from the originals. Employees may recognise a generic phishing email, but when the link leads to a familiar-looking page, even cautious users can be tricked.

Thus, by cloning legitimate pages for simulations, Lucy enables companies to mirror genuine phishing tactics. Users see a real-looking landing page, but any credentials they enter are captured only for awareness measurement, not stored or reused. This realism is what makes Lucy’s phishing training so effective.

How Lucy Clones a Real Page Safely

Lucy’s phishing landing page cloning tool copies the look and layout of a genuine website while stripping out any active elements that could cause harm.

  1. The admin selects a target URL.

  2. Lucy clones the design and adjusts links to ensure everything runs inside the secure simulation environment.

  3. A simulated login form is added, allowing users to “submit” details without risk.

All data is handled anonymously, and no real credentials are saved. The goal is insight, not intrusion.

➡ See how it works in practice — watch our YouTube demo video showing phishing landing page cloning step by step.

Phishing landing page cloning

Adding Simulated Login Forms

A convincing simulation often depends on the login form. Lucy lets admins customise form fields and button text to match any scenario — from Microsoft 365 portals to internal HR pages.
However, the system’s backend ensures that any information entered is recorded only as a “click or entry event,” never as actual data.
As a result, this careful design means you can test user vigilance without touching sensitive information.

Best Practices for Running Cloned Landing Page Simulations

To keep simulations effective and ethical, Lucy recommends:

  • Gain internal consent before testing (works council or HR sign-off).

  • Inform users post-campaign with clear feedback and awareness content.

  • Vary templates — users adapt quickly to familiar formats.

  • Combine with training modules to reinforce lessons immediately.

  • Track key metrics: click rates, form submissions, and time to report.

Lucy’s analytics dashboard automatically links these results to each user’s awareness score, helping you measure improvements over time

Security Awareness software

From Simulation to Awareness

A cloned landing page is only the first step. After the campaign, Lucy automatically assigns awareness training modules to users who entered data or clicked through.
Consequently, this “click-to-learn” workflow converts every mistake into a teaching moment, reinforcing positive security habits.
As a result, organisations see measurable reductions in repeat phishing victims and higher reporting rates.

FAQ: Phishing Landing Page Cloning

Is cloning a landing page legal?
Yes — provided it’s used within your organisation, with consent and for training. Lucy ensures full compliance and anonymised results.

Can real credentials be exposed?
No. Lucy’s simulated login forms record only the event, never the actual data.

What types of pages can be cloned?
Almost any public site or internal login page can be mirrored — from SaaS tools to company intranets — for realistic awareness simulations.

Final Thoughts

Phishing landing page cloning helps teams experience how real attacks unfold — safely, repeatably, and with measurable outcomes. Lucy’s platform makes this easy, ethical, and effective.
If you want to see it in action, watch our YouTube video or explore Lucy’s full range of phishing awareness training solutions to strengthen your human firewall.

The post Phishing Landing Page Cloning for Simulated Attacks first appeared on Lucy Security.

]]>
Nonprofit Cybersecurity Awareness Training | Lucy https://lucysecurity.com/nonprofit-cybersecurity-awareness-training/ Mon, 03 Nov 2025 15:56:07 +0000 https://lucysecurity.com/?p=65557 Nonprofit Cybersecurity Awareness Training: Building

The post Nonprofit Cybersecurity Awareness Training | Lucy first appeared on Lucy Security.

]]>

Nonprofit Cybersecurity Awareness Training: Building Digital Resilience

Nonprofits face rising cyber threats that endanger their missions and data. Through nonprofit cybersecurity awareness training, Lucy Security and the CyberPeace Builders empower NGOs and educators to recognise phishing and build lasting digital resilience.

Nonprofit Cybersecurity Awareness Training

Why Nonprofit Cybersecurity Awareness Training Matters

Cybercriminals increasingly target organisations that serve the public good. They know nonprofits hold valuable data yet often lack enterprise-grade defences. A single phishing email or stolen password can cause major financial and reputational harm.

Through this partnership, Lucy Security and CyberPeace Builders make cybersecurity awareness for nonprofits accessible to any organisation — regardless of size, location, or budget. By using Lucy’s multilingual awareness platform, volunteer experts can run phishing simulations and interactive training programs at scale, ensuring every team member knows how to recognise and report suspicious activity.

Download the full case study

From Digital Exposure to Digital Empowerment

The M-PESA Foundation Academy in Kenya faced the same challenge as many nonprofits: digitalisation without adequate cybersecurity preparation. Staff and students worked online daily but lacked the knowledge to identify threats.

With support from CyberPeace Builders and Lucy’s phishing simulation for NGOs, the Academy created a culture of vigilance and shared responsibility. In just a few months, phishing click rates fell sharply, and cybersecurity became part of everyday operations.

This example shows how nonprofit cybersecurity awareness training empowers users instead of punishing mistakes — turning uncertainty into confidence.

 

nonprofit cybersecurity awareness training

A Scalable Model for Global Impact

The CyberPeace Builders community now supports more than 85 nonprofit organisations across 70 countries, all using Lucy’s platform for awareness and phishing training. Thousands of volunteer hours have already been contributed, making this a truly global initiative.

Lucy’s cloud-based, multilingual system enables partners to run campaigns, measure results, and repeat training cycles efficiently — creating measurable, lasting improvement in human-factor defence. This approach sets a new standard for cyber resilience in nonprofit organisations worldwide.

Download the full case study

Nonprofit Cybersecurity Awareness Training: Results That Inspire Change

  • 100+ staff trained in cybersecurity awareness

  • Multiple phishing simulations completed with strong improvement rates

  • Significant drop in risky clicks and data exposure

  • Ongoing integration of cyber hygiene into daily routines

Each success story demonstrates how nonprofit cybersecurity awareness training transforms vulnerable teams into confident defenders and reduces long-term risk exposure.

 

Taking the Next Step Toward Resilience

Every nonprofit can strengthen its digital defences. Whether you’re in education, healthcare, or humanitarian relief, Lucy Security provides scalable, measurable training solutions that fit your mission.

Contact us today to learn how our phishing simulations, awareness modules, and volunteer partnerships can protect your organisation.

You can also request tailored content or multilingual campaign support through our Managed Awareness Service, ensuring continuous improvement and compliance.

Final Thoughts — Awareness That Lasts

he collaboration between Lucy Security and the CyberPeace Builders proves that nonprofit cybersecurity awareness training is both achievable and sustainable. By combining education, technology, and volunteer expertise, the program helps vulnerable communities build genuine cyber resilience.

To explore more stories and awareness insights, visit the Lucy Security YouTube channel for campaign videos, short interviews, and training highlights.

Together, we’re building a safer digital world — one nonprofit at a time.

The post Nonprofit Cybersecurity Awareness Training | Lucy first appeared on Lucy Security.

]]>