Patents by Inventor Scott McVicker Epple

Scott McVicker Epple has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10986122
    Abstract: A threat management facility generates a simulated phishing threat based on one or more characteristics of a network user. Based on whether the user fails to respond appropriately to the simulated phishing threat, the threat management facility may implement one or more prophylactic measures to remediate the security weakness exposed by the user's failure to respond appropriately to the simulated phishing threat. For example, a security policy for an endpoint associated with the user may be adjusted to address the security weakness. Additionally, or alternatively, the user may be enrolled in training directed at reducing the likelihood that the user will be the victim of an actual phishing attack in the future.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: April 20, 2021
    Assignee: Sophos Limited
    Inventors: Brady Bloxham, Scott McVicker Epple, Jeffrey Philip Albert
  • Patent number: 10924517
    Abstract: A threat management facility generates a simulated phishing threat based on one or more characteristics of users of an enterprise network and transmits the simulated phishing threat to the users of the enterprise network. Based on whether a user fails to respond appropriately to the simulated phishing threat, the threat management facility may adjust a profile of the user. Network traffic to and from an endpoint associated with the user may be processed according to the adjusted profile.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: February 16, 2021
    Assignee: Sophos Limited
    Inventors: Scott McVicker Epple, Jonathan Jesse
  • Publication number: 20190245894
    Abstract: A threat management facility generates a simulated phishing threat based on one or more characteristics of users of an enterprise network and transmits the simulated phishing threat to the users of the enterprise network. Based on whether a user fails to respond appropriately to the simulated phishing threat, the threat management facility may adjust a profile of the user. Network traffic to and from an endpoint associated with the user may be processed according to the adjusted profile.
    Type: Application
    Filed: February 7, 2018
    Publication date: August 8, 2019
    Inventors: Scott McVicker Epple, Jonathan Jesse