A leading cyber security research organisation has recently released the results of a survey conducted by them to study the security risks involved in remote working. Two key takeaways that
How does email forwarding affect DMARC authentication results?
Domain-Based Message Authentication, Reporting, and Conformance (DMARC) authentication use two protocols SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) to help determine the legitimacy of an email message. SPF
Read MoreHow does email forwarding affect DMARC authentication results?
Beware Twitter’s verified Badge users are not the only ones at Risk. You might be the next
Ever since Twitter has been acquired by Elon Musk, it has been in the news for all the wrong reasons. Then may it be for the layoffs, Musk’s heated discussions
Read MoreBeware Twitter’s verified Badge users are not the only ones at Risk. You might be the next
Gmail embraces BIMI to authenticate emails with verified logos
Google, in their recent security blog has confirmed that they are all set to take their email security to next level by rolling out Gmail’s general support of BIMI, an
Read MoreGmail embraces BIMI to authenticate emails with verified logos
SPF, DKIM and DMARC: Are they mere acronyms or Useful Email Security?
Since the early days of the internet, spam has been a persistent and chronic problem. Gary Thuerk of Digital Equipment Corp (DEC) sent the first unsolicited mass e-mailing (later dubbed
Read MoreSPF, DKIM and DMARC: Are they mere acronyms or Useful Email Security?
How can you block email based impersonation and phishing attacks with DMARC?
It is a well-known fact that in most of the cyber-frauds, the cyber criminals impersonate trusted identities, mainly because the chances of the victim falling for such emails are high.
Read MoreHow can you block email based impersonation and phishing attacks with DMARC?
DKIM Records: How To Create and Add Them To Your DNS
What is a DKIM record? DKIM is an open standard for email authentication that helps protect email senders and recipients from spam, spoofing, and phishing. It allows an organization to
Read MoreDKIM Records: How To Create and Add Them To Your DNS
What is the DKIM selector and how does it work?
There are 150,465 live websites using DKIM. But what is DKIM? DKIM stands for Domain Keys Identified Mail which is an email authentication technique that helps the receiver to check
What does a DMARC record look like and how do I generate it?
A DNS txt record published in your public DNS is known as a DMARC record. This is a DMARC record, as indicated by the DMARC version tag. The receiver would
Read MoreWhat does a DMARC record look like and how do I generate it?
Top 6 Misconceptions People Have About DMARC
Many businesses make the mistake of relying on their consumers or staff to detect and report phishing attacks. This technique, however, is flawed. Around the world, 90% of leading brand