×

Social engineering simulation workflow appliance

  • US 9,871,817 B2
  • Filed: 06/01/2017
  • Issued: 01/16/2018
  • Est. Priority Date: 02/05/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of reducing organizational susceptibility to social engineering, the organization having a plurality of sources, the method comprising:

  • receiving, via a computer appliance, contact information for a plurality of members of the organization;

    monitoring, via the computer appliance, each of the sources for triggering events;

    receiving, via a computer platform remote from the computer appliance, signals from the computer appliance indicative of detected triggering events and delivery identifiers associated with the detected triggering events, wherein the computer platform creates different templates for detected triggering events having different characteristics;

    preparing, by the computer platform, communications including templates based on each of the detected triggering events, wherein the computer platform compiles information regarding detected triggering events and evaluates susceptibility of the organization to social engineering based on the detected triggering events, and wherein the computer platform does not receive the contact information of the plurality of members from the computer appliance;

    transmitting, by the computer platform, the communications including the templates to the computer appliance;

    including a tag in at least one of the templates on the computer platform;

    identifying, via the computer appliance, at least one member of the organization as an intended recipient based on one of the detected triggering events;

    preparing, by the computer appliance, a message to the intended recipient based on characteristics of the one of the detected triggering events, the message soliciting an action by the intended recipient;

    adding, by the computer appliance, information into the message regarding the intended recipient of the message based on the tag;

    transmitting the message, using the computer appliance, to the intended recipient;

    determining, by the computer platform, whether the intended recipient acts as solicited by the message; and

    evaluating, by the computer platform, the action of the intended recipient.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×