What’s the Value of your Email DNA?

Wow, another day, another breach. A few weeks ago, it was the Labour party’s turn to get hit with yet a second wide-spread attack. Though this attack was DDOS in nature, and the party’s spokesperson has said they are ‘confident that no data breach occurred’, this shows us point blank – again – that organizations need to better protect their networks, systems and processes. What better place to start than with email security. 

Disclaimer: this blog may be slightly self promotional and product specific, but it is high time we talk openly and truthfully about how companies like Red Sift can help protect today’s businesses.


Though cyber crime has been prevalent for years now, these criminals are becoming more savvy and more sophisticated in the types of attacks they’re launching at both individuals and businesses – and research suggests 90% of cyberattacks start with a phishing email. It is clear as day that more is needed than just training employees on these potential threats. So, why then aren’t more businesses deploying tech alongside training – especially when a product that is as easy to deploy and manage as OnINBOX can help fend off potential threats?

At Red Sift, we’re all about making cybersecurity easy and accessible to the masses. That’s why OnINBOX has been intentionally designed with simplicity in mind to give businesses large and small the ability to protect their email networks. It does this by giving each employee a dedicated virtual security expert that shows them the risks and threats present within each and every email and then walks them through how to ACT:

We authenticate and evaluate security protocols in place in real-time
We scan for harmful content such as tracking pixels or malicious URLs
We build trust within the network by learning the user’s inbox interactions and behaviours

This means that every warning issued from OnINBOX is the result of a technical risk assessment completed by scanning the email’s hidden DNA and cross-checking it with the organization’s trust network.

Is this person who they say they are?

With clear visual indicators at the top of every email, scanned by the OnINBOX security system, all users, no matter how technically savvy they are or not, can take notice of any hidden risks.

How can I spot the traps and protect my systems from malware?

OnINBOX scans the content of the emails to analyze any potential hidden risk signals – but rest assured, this isn’t a case of Big Brother! OnINBOX doesn’t actually read your emails but rather extracts all of the domains/links within the email to check for anything suspicious that shouldn’t be there, flagging this to the end-user and letting them know when links are malicious or if emails are being tracked.

How can security teams define and control trust networks?

Intuitive, centralized dashboards provide the controls to swiftly define what is and isn’t a risk for an organization through easy-to-use classification systems. These are rolled out to every email associated with the organization’s domain, which in turn, instantly protects the entire organization.

How easy is it to get started?

With OnINBOX, the set-up is extremely straightforward. There is no software required, and centralized deployment for Office 365 and G Suite mailboxes is quick and easy. OnINBOX also provides centralized threat intelligence with threat classifications across all mailboxes within the organization’s domain so all users are protected.

How do I protect my organization end to end?  

With cross-channel and cross-device email protection, OnINBOX users will see risk indicators at the top of every email regardless of where it has been opened – whether it’s on a laptop, mobile, tablet, or through an app. OnINBOX also allows organizations to customize and tailor the solution by adding contacts and URLs to their trust networks with pre-approved, or banned entries.

OnINBOX doesn’t just stop there – it builds trust at the heart of the organization, giving employees the confidence they need to conduct ‘business as usual’ without the impending fear of opening up the organization to attack or breach. What are you waiting for then? Go, uncover the DNA of your emails, ACT now by getting in touch with a member of the team.


Clare Holmes

27 Nov. 2019



Recent Posts


Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more