Performance benchmarking for simulated phishing attacks
First Claim
Patent Images
1. A method, comprising:
- conducting a first simulated phishing attack on individuals from a first group by electronically sending one or more messages from a network device;
electronically recording in a computer readable storage medium responses of one or more individuals from the first group to the first simulated phishing attack;
conducting a second simulated phishing attack on individuals from a second group by electronically sending one or more messages from the network device;
electronically recording in the computer readable storage medium responses of one or more individuals from the second group to the second simulated phishing attack;
calculating by a computerized processor an aggregate performance of the first group based on the responses to the first simulated phishing attack;
calculating by the computerized processor an aggregate performance of the second group based on the responses to the second simulated phishing attack; and
generating by the computerized processor a comparison of the aggregate performance of the first group with the aggregate performance of individuals from the second group;
wherein the simulated phishing attacks are constructed from a common template with respect to at least one individual from the first group and at least one individual from the second group so as to allow the aggregate performance of the first group to be compared with the aggregate performance of the second group.
9 Assignments
0 Petitions
Accused Products
Abstract
Described herein are methods, network devices and machine-readable media for conducting a simulated phishing attack on a first group of individuals, and performing an analysis of the group'"'"'s performance to the simulated attack. In the analysis, an aggregate performance of the first group is compared with an aggregate performance of individuals from a second group. To ensure uniformity in the simulated phishing attacks, messages thereof may be constructed from template messages, the template messages having placeholders for individual-specific and company-specific information.
-
Citations
30 Claims
-
1. A method, comprising:
-
conducting a first simulated phishing attack on individuals from a first group by electronically sending one or more messages from a network device; electronically recording in a computer readable storage medium responses of one or more individuals from the first group to the first simulated phishing attack; conducting a second simulated phishing attack on individuals from a second group by electronically sending one or more messages from the network device; electronically recording in the computer readable storage medium responses of one or more individuals from the second group to the second simulated phishing attack; calculating by a computerized processor an aggregate performance of the first group based on the responses to the first simulated phishing attack; calculating by the computerized processor an aggregate performance of the second group based on the responses to the second simulated phishing attack; and generating by the computerized processor a comparison of the aggregate performance of the first group with the aggregate performance of individuals from the second group; wherein the simulated phishing attacks are constructed from a common template with respect to at least one individual from the first group and at least one individual from the second group so as to allow the aggregate performance of the first group to be compared with the aggregate performance of the second group. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor; a storage device connected to the processor; a network device; and a set of instructions on the storage device that, when executed by the processor, cause the processor to; conduct a first simulated phishing attack on individuals from a first group; electronically record in a computer readable storage medium responses of one or more individuals from the first group to the first simulated phishing attack; conduct a second simulated phishing attack on individuals from a second group; electronically record in the computer readable storage medium responses of one or more individuals from the second group to the second simulated phishing attack; calculate an aggregate performance of the first group based on the responses to the first simulated phishing attack; calculate an aggregate performance of the second group based on the responses to the second simulated phishing attack; and compare the aggregate performance of the first group with the aggregate performance of individuals from the second group; wherein the simulated phishing attacks are constructed from a common template with respect to at least one individual from the first group and at least one individual from the second group so as to allow the aggregate performance of the first group to be compared with the aggregate performance of the second group. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory machine-readable storage medium comprising software instructions that, when executed by a processor, cause the processor to:
-
conduct a first simulated phishing attack on individuals from a first group by electronically sending one or more messages from a network device; electronically record in a computer readable storage medium responses of one or more individuals from the first group to the first simulated phishing attack; conduct a second simulated phishing attack on individuals from a second group by electronically sending one or more messages from the network device; electronically record in the computer readable storage medium responses of one or more individuals from the second group to the second simulated phishing attack; calculate by a computerized processor an aggregate performance of the first group based on the responses to the first simulated phishing attack; calculate by the computerized processor an aggregate performance of the second group based on the responses to the second simulated phishing attack; and generate by the computerized processor a comparison of the aggregate performance of the first group with the aggregate performance of individuals from the second group; wherein the simulated phishing attacks are constructed from a common template with respect to at least one individual from the first group and at least one individual from the second group so as to allow the aggregate performance of the first group to be compared with the aggregate performance of the second group. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification