London’s romantic restaurants slacking on DMARC

What better reason to analyze the email domain security of some of the most popular consumer brands than one of the busiest retail holidays, Valentine’s Day? It’s that rose-tinted glasses time of year when some of us replace our common sense and security-savvy online behavior with panic purchases and last-minute, oh-so-expensive restaurant reservations.  

The best table in the house is going to cost more than you think

Call it what you will, ‘The Old Smoke’, ‘The Big Smoke’ or just ‘The Smoke’, but if you were trying to book a table in one of London’s hottest eateries, you may be feeling the financial burn today.

We analyzed the primary domains of the top 48 most romantic restaurants in London, as ranked by GQ Magazine, and found that only one had a DMARC policy in place, and it wasn’t even in quarantine, let alone reject. 

Email fraud continues to bloom

We looked at 20 of the biggest flower delivery companies in the US, as listed by Timeout, and found only two had DMARC set to p=none, not hugely assuring given how many orders are placed online and that so many email addresses are handed over to these companies whose email domains are so easy spoof. At this time of year, it could be as simple as a scammer sending an email asking a consumer if they want to upgrade their order, or tempt them with free delivery, and with one click, financial details are handed over to the unknown.

All that glitters isn’t always gold

It’s a cliche, but apparently people like to get engaged on Valentine’s Day. In fact, last year over one million people in the UK were planning to pop the question on February 14th. 

If you’ve had a wedding, you know how expensive things can get, so we looked into the most popular yet affordable jewelers in the UK to see if these brands were safeguarding their users from heartache. Sadly, none of those listed by Yahoo Style as the brand to buy this Valentine’s season had any DMARC policies in place.

‘But soft! What light through yonder window breaks?’ For those of us in the security world, it’s anything that will mitigate known and unknown threats. To strengthen your organization’s email security policies and start protecting your users, explore the solutions on offer and select a partner that suits your needs – it may just be Red Sift you’re looking for. If so, drop us a note. We can’t promise to be your one true love, but we’ll definitely set your email security heart on fire.


Red Sift

14 Feb. 2020



Recent Posts


Preventing certificate related violations in cybersecurity frameworks:  A guide to certificate monitoring…

Rebecca Warren

TLS is one of the most widely adopted security protocols in the world allowing for unprecedented levels of commerce across the internet.  At the core of the TLS protocol is TLS certificates. Organizations must deploy TLS certificates and corresponding private keys to their systems to provide them with unique identities that can be reliably…

Read more

Red Sift ASM & Red Sift Certificates: the missing link in your…

Billy McDiarmid

According to Gartner, Attack Surface Management (ASM) refers to the “processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers.” This broad category of tooling is used within Continuous Threat Exposure Management (CTEM) programs, with many vendors within it having…

Read more

The best tools to protect yourself from SubdoMailing

Francesca Rünger-Field

In late February 2024, ‘SubdoMailing’ became a trending search term overnight. Research by Guardio Labs uncovered a massive-scale phishing campaign that had been going on since at least 2022. At the time of reporting, the campaign had sent 5 million emails a day from more than 8,000 compromised domains and 13,000 subdomains with several…

Read more
Product Release

Red Sift’s Spring 2024 Quarterly Product Release

Francesca Rünger-Field

This early into 2024, the cybersecurity space is already buzzing with activity. Emerging standards, such as Google and Yahoo’s bulk sender requirements, mark a new era of compliance for businesses reliant on email communication. At the same time, the prevalence of sophisticated cyber threats, such as the SubdoMailing campaign, emphasizes the continual hurdles posed…

Read more