Tag Archives: Email Security

Email Security Advice to Combat Attacks

email-security-advice-to-combat-attacks

A compromise is beneficial when two parties are coming to the table to negotiate something they are at odds with. However, be it at work or at home, a compromised account favors only one party and the intent is not for the betterment of the relationship. Unless you’re following closely, a lot of compromises occur without much fanfare or significant news coverage. This is probably…

Read More »

Is a set-and-forget strategy damaging your email authentication?

is-a-set-and-forget-strategy-damaging-your-email-authentication?

We spend a lot of time talking about the configuration of SPF, DKIM, and DMARC records, because, well…they’re really important for good email deliverability. But what about the older strategies made obsolete due to the adoption of these standards, specifically Sender ID and DomainKey? Not all email marketers treat these solutions as things of the past. As the technology adoption life cycle demonstrates, it can…

Read More »

How Microsoft’s filtering changes impact your marketing email.

how-microsoft’s-filtering-changes-impact-your-marketing-email.

In January, Microsoft decided to shake up the way their filters look at mail and elevate their anti-spoofing and anti-phishing filters, potentially impacting email marketers’ email campaigns. For those of you who’ve been around long enough will remember Microsoft always tries to push their own way, with initiatives like SenderID rather than supporting industry initiatives like SPF. After fully supporting SPF, DKIM, and DMARC standards…

Read More »

How do I achieve DMARC compliance?

how-do-i-achieve-dmarc-compliance?

So you decided to implement a stricter DMARC policy to protect yourself from a recent spoofing attack. Great job! But upon review of your non-complaint mail sources, you realize there is an authorized vendor, but they are not DMARC-compliant. What do you do? One of the more important details to identify during the DMARC authentication setup process is identifier alignment, often seen in non-compliant mail…

Read More »
>