From DKIM to DKIM2: How email authentication is evolving

From DKIM to DKIM2: How email authentication is evolving

Email communications have always been one of the favorite targets among threat actors. To safeguard their email ecosystem, businesses and organizations use email authentication protocols such as SPF, DKIM, and DMARC. DKIM has been an integral part of email security mechanisms since 2007. This email authentication tool helps verify whether or not an email has…

How to Create a DMARC Record in GoDaddy for Enhanced Email Security

How to Create a DMARC Record in GoDaddy for Enhanced Email Security

To create a DMARC record in GoDaddy, log into your account, navigate to DNS Management for your domain, and add a new TXT record with the name “_dmarc” and the value “v=DMARC1; p=quarantine; pct=100; rua=mailto:your-email@example.com” (replacing ‘your-email@example.com’ with your administrator email). Finally, save your changes, keeping in mind that DNS updates may take up to…

7 Best Practices for Writing Secure Emails to Avoid Phishing Attacks

7 Best Practices for Writing Secure Emails to Avoid Phishing Attacks

There were 4.48 billion global email users in 2024, and analysts expected that number to reach 4.89 billion by 2027. Emails are a big part of our daily life. But they can also be a way for hackers to steal information.  Phishing attacks happen when someone tricks you into sharing personal details. These scams look…

Booking Scam Alert, Fortinet LockBit Attack, Abu Dhabi Guidelines

Booking Scam Alert, Fortinet LockBit Attack, Abu Dhabi Guidelines

It feels like we just welcomed 2025 yesterday! Yet here we are again, meeting you all in the third week of March. As time flies by, threat actors are trying their best to keep up with the latest technology. Each sophisticated cyberattack is bringing them closer to your network and hard-earned money. If this sounds…

Setting Up DMARC: A Complete Guide to Email Protection

Setting Up DMARC: A Complete Guide to Email Protection

To set up DMARC for your domain, first, ensure that you have SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) records configured. Next, create a DMARC TXT record in your DNS settings using the format v=DMARC1; p=; rua=mailto:; and start with a policy of ‘none’ to monitor results before transitioning to stricter policies like…

Why is sending emails without DKIM a risk you can’t afford?

Why is sending emails without DKIM a risk you can’t afford?

Sending emails without signing them with DKIM is a bad idea because it weakens your email security and increases the chances of your emails being rejected or marked as spam. It’s a security and deliverability risk that is not worth taking, especially when you know Google, Yahoo, and other email service providers require bulk senders…

DMARC Aggregate Report: What It Is and How to Use It for Email Security

DMARC Aggregate Report: What It Is and How to Use It for Email Security

Overview of DMARC Aggregate Reports DMARC (Domain-based Message Authentication, Reporting, & Conformance) aggregate reports are invaluable tools designed to help domain owners keep a watchful eye on their email authentication practices. These reports act as a beacon, illuminating how your emails are treated by the recipient’s mail systems. By summarizing results for both SPF (Sender…

DKIM Best Practices: Essential Guidelines for Email Authentication

DKIM Best Practices: Essential Guidelines for Email Authentication

DKIM Overview DKIM, or DomainKeys Identified Mail, is a powerful email authentication method that plays a pivotal role in enhancing the security of your email communications. Imagine it as a guardian standing watch over your email, ensuring that not only do the emails you receive originate from legitimate sources, but they also remain intact and…

The DMARC ‘fo’ tag options and their ideal use cases

The DMARC ‘fo’ tag options and their ideal use cases

There are some optional tags in DMARC, and ‘fo’ is one of them. It stands for ‘failure options.’ The ‘fo’ tag allows domain owners to specify the conditions under which forensic (RUF) reports should be generated for SPF and/or DKIM authentication checks. There are four possible values for this tag: fo=0, fo=1, fo=d, and fo=s….