×

Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams

  • US 8,484,741 B1
  • Filed: 01/27/2012
  • Issued: 07/09/2013
  • Est. Priority Date: 01/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A system for facilitating an information technology administrator of a client organization to assess potential susceptibility of employees of the client organization to phishing scams, the system comprising:

  • at least one processor device;

    an address book manager module that is arranged and configured to facilitate input by the information technology administrator of the e-mail addresses of the group of individuals into one or more address books;

    an e-mail manager module that is arranged and configured to facilitate creation by the information technology administrator of at least one phishing e-mail that includes at least a link to a web page;

    a web page manager module that is arranged and configured to facilitate creation by the information technology administrator of a web page that is accessible by a recipient of the phishing e-mail by clicking on the link included in the received phishing e-mail;

    a campaign manager module that is arranged and configured to facilitate customization by the information technology administrator of a campaign by allowing selection of and correlation between one or more of the address books and one or more phishing e-mails to be sent;

    a message generation module that is arranged and configured to execute the campaign according to the customization established by the information technology administrator by sending the phishing e-mails to the group of individuals in the address book(s);

    a monitoring module that is arranged and configured to monitor responses to the phishing e-mails sent by the message generation module, wherein the monitoring module comprises an interactive application simulator which interacts with recipients of phishing e-mails who respond by providing potentially confidential information in response to the phishing e-mails, and wherein the interactive application simulator is arranged and configured to avoid collecting potentially confidential information provided by recipients of phishing e-mails; and

    a report generating module is arranged and configured to provide analysis of the responses to the phishing e-mails for review by the information technology administrator;

    wherein the at least one processor device is operatively connected to at least one of the address book manager module, the e-mail manager module, the web page manager module, the campaign manager module, the message generation module, the monitoring module, and the report generating module.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×