AUTOMATED PHISHING-EMAIL TRAINING
First Claim
1. A method, comprising:
- at a computing platform comprising at least one processor, a memory, and a communication interface;
generating, by the at least one processor, a message comprising instructions for handling phishing emails;
communicating, to a user device and via the communication interface, the message comprising instructions for handling phishing emails;
generating, by the at least one processor, a training email comprising phishing content;
communicating, to the user device and via the communication interface, the training email comprising phishing content;
determining, by the at least one processor, whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails;
generating, by the at least one processor and based on whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails, a new training email comprising different phishing content; and
communicating, to the user device and via the communication interface, the new training email comprising different phishing content.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing platform may generate a message comprising instructions for handling phishing emails. The computing platform may communicate the message comprising instructions for handling phishing emails to a user device. The computing platform may generate a training email comprising phishing content. The computing platform may communicate the training email comprising phishing content to the user device. The computing platform may determine whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails. The computing platform may generate, based on whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails, a new training email comprising different phishing content.
-
Citations
20 Claims
-
1. A method, comprising:
at a computing platform comprising at least one processor, a memory, and a communication interface; generating, by the at least one processor, a message comprising instructions for handling phishing emails; communicating, to a user device and via the communication interface, the message comprising instructions for handling phishing emails; generating, by the at least one processor, a training email comprising phishing content; communicating, to the user device and via the communication interface, the training email comprising phishing content; determining, by the at least one processor, whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails; generating, by the at least one processor and based on whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails, a new training email comprising different phishing content; and communicating, to the user device and via the communication interface, the new training email comprising different phishing content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
19. An apparatus, comprising:
-
at least one processor; and a memory storing instructions that when executed by the at least one processor cause the apparatus to; determine whether a training email comprising phishing characteristics has been handled in accordance with instructions for handling phishing emails; responsive to determining that the training email comprising phishing characteristics has been handled in accordance with the instructions for handling phishing emails, generate a new training email comprising fewer phishing characteristics than the training email; and responsive to determining that the training email comprising phishing characteristics has not been handled in accordance with the instructions for handling phishing emails, generate a new training email comprising more phishing characteristics than the training email.
-
-
20. One or more non-transitory computer-readable media having instructions stored thereon that when executed by one or more computers cause the one or more computers to:
-
determine whether a training email comprising phishing content has been handled in accordance with instructions for handling phishing emails; and generate, based on whether the training email comprising phishing content has been handled in accordance with the instructions for handling phishing emails, a new training email comprising different phishing content.
-
Specification