---
title: "Major risks of sharing email accounts | DMARC Report"
description: "Major risks of sharing email accounts from DMARC Report explains practical steps for email authentication, domain protection, deliverability, and DMARC."
image: "https://dmarcreport.com/og/blog/major-risks-of-sharing-email-accounts.png"
canonical: "https://dmarcreport.com/blog/major-risks-of-sharing-email-accounts/"
---

Quick Answer

The three core email authentication standards - SPF (RFC 7208), DKIM (RFC 6376), and DMARC (RFC 7489) - work together to verify that an email genuinely originates from the domain it claims to represent. DMARC Report Major risks of sharing email accounts

Related: [Free DMARC Checker](/tools/dmarc-checker/) ·[How to Create an SPF Record](/tools/spf-record-generator/) ·[SPF Record Format](/blog/spf-format-checker-dos-and-donts-for-email-authentication/) 

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=undefined%2Fblog%2Fmajor-risks-of-sharing-email-accounts%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Major%20risks%20of%20sharing%20email%20accounts&url=undefined%2Fblog%2Fmajor-risks-of-sharing-email-accounts%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=undefined%2Fblog%2Fmajor-risks-of-sharing-email-accounts%2F "Share on Facebook") [ ](https://reddit.com/submit?url=undefined%2Fblog%2Fmajor-risks-of-sharing-email-accounts%2F&title=Major%20risks%20of%20sharing%20email%20accounts "Share on Reddit") [ ](mailto:?subject=Major%20risks%20of%20sharing%20email%20accounts&body=Check out this article: undefined%2Fblog%2Fmajor-risks-of-sharing-email-accounts%2F "Share via Email") 

![Major risks of sharing email accounts](https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg) 

![Dmarc check 8832 1 150x150](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-check-8832-1-150x150.jpg) 

> DMARC monitoring should be as routine as checking your inbox, says Adam Lundrigan, CTO of DuoCircle. The aggregate reports tell you exactly who sends email from your domain. If you’re not reading them, you’re flying blind on your own email security posture.

The three core email authentication standards - SPF ([RFC 7208](https://datatracker.ietf.org/doc/html/rfc7208)), DKIM ([RFC 6376](https://datatracker.ietf.org/doc/html/rfc6376)), and DMARC ([RFC 7489](https://datatracker.ietf.org/doc/html/rfc7489)) - work together to verify that an email genuinely originates from the domain it claims to represent. DMARC Report

Major risks of sharing email accounts

```
					<button title="Play" aria-label="Play Episode" aria-pressed="false" class="play-btn">
						
```

Play Episode

```
					</button>
					<button title="Pause" aria-label="Pause Episode" aria-pressed="false" class="pause-btn hide">
						
```

Pause Episode

```
					</button>
				

					<audio preload="none" class="clip clip-23554">
						<source src="https://media.mailhop.org/dmarcreport/images/2025/04/Major-risks-of-sharing-email-accounts.mp3">
					</audio>
						

							<button class="player-btn player-btn__volume" title="Mute/Unmute">
								
```

Mute/Unmute Episode

```
							</button>
							<button data-skip="-10" class="player-btn player-btn__rwd" title="Rewind 10 seconds">
								
```

Rewind 10 Seconds

```
							</button>
							<button data-speed="1" class="player-btn player-btn__speed" title="Playback Speed" aria-label="Playback Speed">1x</button>
							<button data-skip="30" class="player-btn player-btn__fwd" title="Fast Forward 30 seconds">
								
```

Fast Forward 30 seconds

```
							</button>
						

							<time class="ssp-timer">00:00</time>
							
```

/

```
							<!-- We need actual duration here from the server -->
							<time class="ssp-duration" datetime="PT0H2M10S">2:10</time>
			

								<nav class="player-panels-nav">
												<button class="subscribe-btn" id="subscribe-btn-23554" title="Subscribe">Subscribe</button>
																		<button class="share-btn" id="share-btn-23554" title="Share">Share</button>
										</nav>

						
```

RSS Feed

```
							<input value="https://dmarcreport.com/feed/podcast/dmarc-report" class="input-rss input-rss-23554" title="RSS Feed URL" readonly />
						

						<button class="copy-rss copy-rss-23554" title="Copy RSS Feed URL" aria-label="Copy RSS Feed URL"></button>
					

						Share						
					

						<a href="https://www.facebook.com/sharer/sharer.php?u=https://dmarcreport.com/blog/podcast/major-risks-of-sharing-email-accounts/&t=Major risks of sharing email accounts" target="blank" rel="noopener noreferrer" class="share-icon facebook" title="Share on Facebook">
							

						</a>
						<a href="https://twitter.com/intent/tweet?text=https://dmarcreport.com/blog/podcast/major-risks-of-sharing-email-accounts/&url=Major risks of sharing email accounts" target="blank" rel="noopener noreferrer" class="share-icon twitter" title="Share on Twitter">
							

						</a>
						<a href="https://media.mailhop.org/dmarcreport/images/2025/04/Major-risks-of-sharing-email-accounts.mp3" target="blank" rel="noopener noreferrer" class="share-icon download" title="Download" download>
							

						</a>
					

						Link						
					

						<input value="https://dmarcreport.com/blog/podcast/major-risks-of-sharing-email-accounts/" class="input-link input-link-23554" title="Episode URL" readonly />
					

					<button class="copy-link copy-link-23554" title="Copy Episode URL" aria-label="Copy Episode URL" readonly=""></button>
					

						Embed						

					
```

/\*! This file is auto-generated \*/ ’ title=“Embed Code” class=“input-embed input-embed-23554” readonly/>

```
					<button class="copy-embed copy-embed-23554" title="Copy Embed Code" aria-label="Copy Embed Code"></button>


```

While sharing email accounts is convenient, users often do not consider the [cybersecurity](https://dmarcreport.com/blog/major-cybersecurity-trends-that-will-reign-in-2024/) and \*\*legal risks they pose. While your company might have convincing reasons to share email addresses, this practice should be avoided as much as possible.

If we go by definition, a shared email account is one that multiple people can access and use, usually within an organization or team. It’s mostly used to \*\*manage communication where multiple people of a group have to come along for operations, for example, in [customer support](https://www.indeed.com/career-advice/career-development/sales-support), sales, or info-based queries. Because of the ease with which shared accounts offer [centralized communication](https://www.ceipal.com/resources/why-centralized-communication-is-necessary-for-successful-engagement), it has become a common workplace practice .

If these accounts are not managed properly, the organization can be left vulnerable to various kinds of [cyberattacks](https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694). If any [malicious activity](https://www.voanews.com/a/us-sanctions-chinese-cybersecurity-firm-for-malicious-activities/7896129.html) (for example, sending phishing emails) is done through the shared account, it is difficult to identify the responsible person because of the **absence of individual logs**. There are more such risks that we’ll discuss in this blog.

![Dmarc check](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-check-6712.jpg) 

## Why does email security matter?

Email is one of the primary sources of communication in most organizations. We share so many \*\*confidential details and files via emails that it’s also one of the most vulnerable assets. Email vulnerability isn’t just limited to data theft but also poses a threat of someone sending phishing emails on your behalf.

As of 2025, DMARC is mandatory under multiple compliance frameworks. [CISA BOD 18-01](https://www.cisa.gov/news-events/directives/bod-18-01) requires p=reject for US federal domains. [PCI DSS v4.0](https://www.pcisecuritystandards.org/) mandates DMARC for organizations processing payment card data as of March 2025\. Google and Yahoo require DMARC for bulk senders (5,000+ messages/day) since February 2024, and [Microsoft began rejecting](https://learn.microsoft.com/en-us/defender-office-365/email-authentication-dmarc-configure) non-compliant email in May 2025\. The UK [NCSC](https://www.ncsc.gov.uk/collection/email-security-and-anti-spoofing), Australia’s [ASD](https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism/cyber-security-guidelines/guidelines-email), and Canada’s [CCCS](https://www.cyber.gc.ca/en/guidance/implementation-guidance-email-domain-protection) all mandate DMARC for government domains. Cyber insurers increasingly require DMARC enforcement as an underwriting condition.

Businesses can’t afford to risk the confidentiality, integrity, and availability of their critical assets, prompting them to take [email security](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) seriously. That’s exactly why [SPF](https://autospf.com/blog/spf-guide-understanding-sender-policy-framework/), [DKIM](https://dmarcreport.com/what-is-dkim/), and [DMARC](https://dmarcreport.com/) protocols have become the primary personnel of the email defense toolkit. Together, these three [email authentication](https://dmarcreport.com/blog/why-email-security-matters-and-how-to-get-it-right/) protocols help \*\*domain owners ensure that only authorized entities send emails on their behalf and that tampered emails don’t get delivered.

![Dmarc record](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-record-5412.jpg) 

## Why should you avoid sharing email accounts?

Shared email accounts can pose significant cybersecurity risks, especially when not properly managed. Here’s why:

## 1\. Weak access control

Weak passwords are \*\*one of the common reasons for email break-ins . There are so many tools that allow hackers to [crack easy passwords](https://www.techtarget.com/searchsecurity/definition/password-cracker). If multiple people share an account, there are chances that the password is something very easy to guess. This is done so that everyone can remember it. While it’s convenient to use simple passwords, it takes hackers no time to crack them and break into the shared account. 

Chances are that the same password is used across [multiple shared accounts](https://www.apms.com.hk/product/papercut-mf/manual/v16/applicationserver/topics/account-multi-personal-config.html), increasing exposure to threats and breaches. To reduce this risk, it is always suggested that \*\*unique and strong passwords be used for every account. _A strong password includes upper- and lower-case letters, numbers, and special characters_.

## 2\. Lack of accountability

_If multiple people share one email account, keeping a log of who has done what is practically difficult_. So, if there is a breach attempted by an insider and some [sensitive data](https://www.csoonline.com/article/3819170/nearly-10-of-employee-gen-ai-prompts-include-sensitive-data.html) gets shared or a phishing email is sent, it’s very difficult to tell who it was. The situation gets all the worse when more than 3-4 people are sharing the account.

If we keep aside the [cyber threat](https://www.securityweek.com/from-warnings-to-action-preparing-americas-infrastructure-for-imminent-cyber-threats/) concerns, then it’s also a challenge to figure out who has responded or sent which email. This can cause problems in other aspects of a business, such as sales, customer support, **media communication**, etc.

Also, a lack of accountability isn’t about blaming people. If there is a security issue, it’s important that you know who needs more training so that only those users get the help they need - without frustrating those who already follow best practices. _Accountability also does good for the workflow; if no one knows who’s supposed to reply to which emails, team members may waste time checking every message to make sure nothing gets missed_.

![Create dmarc record](https://media.mailhop.org/dmarcreport/images/2025/04/create-dmarc-record-7812.jpg) 

## 3\. Higher risk of phishing

_When there are multiple users, chances are that not all of them will be equally aware of phishing red flags_. While one cautious user might recognize a [phishing attempt](https://www.utilitydive.com/news/utilities-on-high-alert-as-phishing-attempts-cyber-probing-spike-related-t/573698/), another untrained person might click a malicious link or open an infected attachment.

Also, [threat actors](https://cybersecuritynews.com/threat-actors-targeting-local-communities-in-the-u-s/) rely a lot on impersonation. With shared accounts, messages are usually not addressed to a specific person (like ‘Hi John’), [making generic phishing](https://www.cloudsek.com/blog/unmasking-cyber-deception-the-rise-of-generic-phishing-pages-targeting-multiple-brands) all the more believable and successful. Team members are used to \*\*impersonal communication in these inboxes, so a [fake email](https://www.usatoday.com/story/money/columnist/2023/09/21/ai-cyber-scams-security/70920106007/) may not raise [red flags](https://www.livemint.com/news/us-news/los-angeles-fire-toll-rises-to-24-from-red-flag-warning-fire-tornado-video-to-scam-artists-10-points-11736736325156.html).

Another thing that increases the risk of phishing is the frequent forwarding of emails. This is because shared email accounts are often used to **forward emails internally**. So, if a phishing or email slips through and gets forwarded to others, the risk will spread to other departments and sometimes even external contacts.

## 4\. No support for MFA

You already know that multifactor authentication, or MFA, adds an extra layer of security to your password protection . _It requires users to verify their identity using something more than a password - like a code sent to your phone, an app notification, biometrics, etc_. This is one of the most effective ways to \*\*protect email accounts from [unauthorized access](https://www.reuters.com/business/media-telecom/us-committee-slaps-60-million-fine-t-mobile-over-unauthorized-data-access-2024-08-14/).

![Dmarc report](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-report-6671.jpg) 

However, MFA is not a feasible option with shared email accounts, and this stands as a serious cybersecurity risk.

MFA is designed for individual use. It sends the second step (like a code or app prompt) to a specific person’s device. But with shared accounts, who gets the **code or notification**, and who approves the login?

If only one team member receives the MFA prompt, others can’t log in without coordination. To avoid this, many teams turn off [MFA](https://www.ibm.com/think/topics/multi-factor-authentication) entirely, which leaves the **account vulnerable**. _With no MFA, you are only left with a password, and if that’s also weak, then any attacker can get in easily_.

![Dmarc check](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-check-8934.jpg) 

## 5\. Credential leakage

To make sure every user of the shared account can access it, the password is often written down on sticky notes, saved in unencrypted documents like spreadsheets or text files, or sent through emails, Slack, or WhatsApp. _This increases the possibility of the password being accidentally or intentionally stolen by ill-intended people_. 

_Also, since the same password has to be used by multiple people, it rarely gets updated. As a result, hackers get more time to steal and exploit it_.

And you know what’s more dangerous - one of the users left the company and still has access because nobody **bothered to change the password**. Over time, this creates a long, invisible list of people who might still be able to log in.

## 6\. Data retention

If one user has deleted an [email attachment](https://www.computerweekly.com/news/366605874/Phishing-links-becoming-bigger-threat-than-email-attachments) for **safety purposes**, and some other user has already downloaded it on their device, then the data still exists. This can be dangerous when dealing with sensitive details and can even open gateways for phishing and [BEC attacks](https://www.bleepingcomputer.com/news/security/hackers-impersonate-us-government-agencies-in-bec-attacks/).

Hackers will easily steal and [encrypt data](https://www.businesstoday.in/technology/news/story/apple-appeals-uk-governments-order-to-allow-access-to-encrypted-data-466907-2025-03-06), refusing to delete it until they receive a ransom.

![Dmarc analyzer](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-analyzer-5780.jpg) 

## 7\. Non-compliance

Healthcare, legal, government, and other industries are required to abide by strict data protection and [communication laws](https://corporate.findlaw.com/law-library/communications-law.html), including email security. Most data compliance policies require organizations to _not_ share email accounts, regardless of purpose. This ensures the **privacy and integrity of organizations**, employees, and customers.

_Therefore, violating these laws will only increase your legal, financial, reputational, and operational problems_.

## 8\. Complex systems

Whenever there is a security issue, it gets hard for the IT person to figure out who did what, which device was involved, and how the problem started. Also, some users might need full control of the account, and others don’t. What do you do in such situations? Unfortunately, you can’t set different access levels in a shared account, making it tough to **manage safely**.

![Dmarc office 365](https://media.mailhop.org/dmarcreport/images/2025/04/dmarc-office-365-9342.jpg) 

## 9\. Increased risk of social engineering

[Social engineering](https://www.infosecurity-magazine.com/news/credential-compromise-social/) means manipulating people into giving up confidential details or performing certain actions that **compromise security**. Now, with multiple people using an email account, the [cybercriminal](https://www.bbc.com/news/articles/ce8vedz4yk7o) also gets multiple victims to trick. They can pick a seemingly easy target and convince them to click a [malicious link](https://www.scworld.com/news/new-usps-text-scam-uses-unique-method-to-hide-malicious-pdf-links) or enter [login credentials](https://hackread.com/hackers-fake-microsoft-adfs-login-pages-steal-credentials/) on a spoof site.

## 10\. Access restriction

Depending on the responsibilities and hierarchy, users will need different levels of account access. With shared email accounts, you can’t set different levels of access control, allowing and exposing every user to every **email activity**.

With no role-based permissions, everyone can read, delete, or send emails - even those who shouldn’t. Even users who only need to read emails can **access account settings**, change passwords, or connect insecure [third-party](https://www.investopedia.com/terms/t/third-party.asp) apps - opening doors for attackers.

![What is dmarc](https://media.mailhop.org/dmarcreport/images/2025/04/what-is-dmarc-4310.jpg) 

## Alternatives to shared email accounts

Here are some \*\*safe practices that can help you achieve the same **goal as sharing email accounts**\-

- Using shared mailbox for teams. This method doesn’t require sharing passwords, and access is managed with user permissions.
- Set up rules to forward specific emails to another person or team.
- You can [delegate access](https://www.godaddy.com/en-in/help/what-is-delegate-access-12378) to someone else who can read/send emails on your behalf.
- _Use helpdesk platforms like Zendesk, Freshdesk, and Front. These are especially useful for customer support teams as all emails to a shared address go into a ticketing system, and each user gets their own login to handle queries_.

Protecting your email should be one of your **top priorities**. Get in touch with us to know how we can help with this.

## Sources

- [RFC 7208 - Sender Policy Framework (SPF)](https://datatracker.ietf.org/doc/html/rfc7208)
- [RFC 7489 - Domain-based Message Authentication, Reporting, and Conformance (DMARC)](https://datatracker.ietf.org/doc/html/rfc7489)

## Topics

[ dkim ](/tags/dkim/)[ DMARC ](/tags/dmarc/)[ email security ](/tags/email-security/)[ SPF ](/tags/spf/) 

![Brad Slavin](https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead for DMARC Report's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Take control of your DMARC reports

Turn raw XML into actionable dashboards. Start free - no credit card required.

[Start Free Trial](https://app.dmarcreport.com/) [Check Your DMARC Record](/tools/dmarc-checker/) 

## Related Articles

[  Foundational 8m  10 Critical Learnings From Verizon’s 2021 DBIR - A DMARCReport Perspective  Nov 25, 2025 ](/blog/10-critical-learnings-from-verizons-2021-dbir-a-dmarcreport-perspective/)[  Foundational 12m  10 DNS Blacklist Insights That Improve Email Security And Deliverability Fast  Nov 14, 2025 ](/blog/10-dns-blacklist-insights-to-improve-email-security-and-deliverability/)[  Foundational 12m  10 Email Spoofing Detection Tools That Dramatically Improve Brand Protection  Nov 11, 2025 ](/blog/10-email-spoofing-detection-tools-that-dramatically-improve-brand-protection/)[  Foundational 12m  10 Reasons SPF Filtering Is Critical For Email Security  Nov 19, 2025 ](/blog/10-reasons-spf-filtering-is-critical-for-email-security/)

```json
{"@context":"https://schema.org","@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"DMARC Report","url":"https://dmarcreport.com","description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","publisher":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
[{"@context":"https://schema.org","@type":"BlogPosting","headline":"Major risks of sharing email accounts","description":"Major risks of sharing email accounts from DMARC Report explains practical steps for email authentication, domain protection, deliverability, and DMARC.","url":"https://dmarcreport.com/blog/major-risks-of-sharing-email-accounts/","datePublished":"2025-04-08T10:54:55.000Z","dateModified":"2026-04-16T15:53:43.000Z","dateCreated":"2025-04-08T10:54:55.000Z","author":{"@type":"Person","@id":"https://dmarcreport.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://dmarcreport.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/dmarcreport/images/team/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"DMARC Report","url":"https://dmarcreport.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com","logo":{"@type":"ImageObject","url":"https://dmarcreport.com/images/dmarcreport-logo.png"},"description":"DMARC reporting and email authentication management. Monitor aggregate and forensic DMARC reports, analyze authentication results, and enforce DMARC policies across all your domains.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.wikidata.org/wiki/Q138898167","https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.g2.com/products/dmarc-report/reviews","https://github.com/duocircle","https://www.crunchbase.com/organization/duocircle-llc","https://www.trustradius.com/products/duocircle/reviews"],"aggregateRating":{"@type":"AggregateRating","ratingValue":"4.8","reviewCount":"470","bestRating":"5","worstRating":"1","url":"https://www.g2.com/products/dmarc-report/reviews"},"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://dmarcreport.com/support/"},"knowsAbout":["DMARC","DMARC Reporting","DMARC Aggregate Reports","DMARC Forensic Reports","Sender Policy Framework","DKIM","Email Authentication","Email Security","DNS Management","Email Deliverability"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://dmarcreport.com/blog/major-risks-of-sharing-email-accounts/"},"articleSection":"foundational","keywords":"dkim, DMARC, email security, SPF","wordCount":1947,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/dmarcreport/images/2022/04/dmarc-alignment-6379.jpg","caption":"Major risks of sharing email accounts","width":900,"height":600},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}]
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://dmarcreport.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://dmarcreport.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://dmarcreport.com/foundational/"},{"@type":"ListItem","position":4,"name":"Major risks of sharing email accounts","item":"https://dmarcreport.com/blog/major-risks-of-sharing-email-accounts/"}]}
```
