Use OnDMARC’s Investigate tool for free to instantly verify if DKIM and SPF are correctly set up to ensure your business emails are authenticated…Continue Reading: Check your email security setup in 30 seconds
Phishing
OnDMARC Success Stories
Once OnDMARC was in place, Greenhill uncovered 2,734 unauthorized email sources sending 671,000 fake emails from a parked domain; in the first 90 days, a million spoof emails were blocked; its SPF pass rate increased from 79.7% to 100%, specifically due to OnDMARC’s Dynamic SPF feature. …Continue Reading: OnDMARC Success Stories
Major UK political parties vulnerable to phishing
Annnnd you’ve guessed it, none of the parties had their DMARC policies configured to quarantine, let alone reject. Only three of the parties – Liberal Democrats, Labour and SNP had a valid DMARC policy, but would still need to tighten configurations to direct impersonated emails using the @libdems.org.uk email domain for example, into the spam/junk folder…Continue Reading: Major UK political parties vulnerable to phishing
A comedy of email errors
So given it’s early September, and the entire office is in a post-holiday coma, we thought we’d break the monotony of the perpetual cyber doom media cycle and distract you with a few of our favourite ludicrous scams and subsequent responses…Continue Reading: A comedy of email errors
Incoming and outgoing email: you just need to secure it all
How can you assure recipients that the emails that are sent from @yourdomain.com are actually from you and not from an opportunistic scammer impersonating your currently reputable brand?…Continue Reading: Incoming and outgoing email: you just need to secure it all
The many guises of a phishing attack
News this week that highlighted the canny nature of scammers made us wonder whether we needed to start a glossary of phishing attacks. These attacks now come in many guises, and if you’re a computer user that isn’t privy to an underground network of caught-in-the-wild attack loggers, you may easily fall victim to one of…Continue Reading: The many guises of a phishing attack