Learn about DMARC, SPF, and DKIM

Welcome to DMARCPal's Learn blog. Check our posts to discover and learn more about DMARC, SPF, DKIM, and how to get the most value of your DMARCPal subscription.

Email spoofing and phishing are two types of online scams that have become increasingly common in recent years.

While they may seem similar on the surface, there are important differences between these two methods of tricking people online. Understanding these differences is important to protect...

Forged emails are a growing concern for personal and business communication. With the ease of sending fake emails that appear to come from a different source, it's essential to be aware of the dangers and take steps to prevent them.

This blog post will explore the reasons why it's so easy to send ...

DMARC is a protocol for email authentication. It allows domain owners to specify how email from their domain should be authenticated. But some domain owners may get too many reports and want to stop receiving them.

Some people may want to stop receiving DMARC reports because they are getting too m...

Not a long time ago, Internet email was based on trust. Trust on the servers, trust on the people running the servers.

Trust that who you see in an email “From” is really who wrote that message.

As of 2020 about 3+ billion forged emails are sent in a day, and it is safe to say (no pun intended...

DKIM is short for DomainKeys Identified Mail. It is a mechanism to verify that some core information of an email message, such as its body, and the “From” and “Subject” lines, are authentic and haven’t been tampered with by someone while the email was in transit.

So when you send an email using...

By default, any computer connected to the Internet can send emails pretending to come from your domain.

That’s true. If you registered example.com for your business and just configured basic email (i.e for sending and receiving XXX@example.com messages), then someone on a cybercafe on the ot...

This happens more often than we think: an employee receives an email from his boss requesting him to do something.

It might be something as simple as requesting a document.

Or more serious, such as the credentials to the company’s social media accounts. Or to transfer several thousand dollars to...