Go to listing page

DMARC, DKIM, SPF: Cyware has adopted the email authentication trifecta

DMARC, DKIM, SPF: Cyware has adopted the email authentication trifecta

Share Blog Post

Hackers have numerous techniques at their disposal to carry out a cyberattack, but for most, the phishing attack remains a classic go-to option. Modern phishing attacks have become increasingly sophisticated and frequent in recent years with many cyberattacks and subsequent data breaches often beginning with an innocuous looking email.

To counter these threats, multiple technical standards - such as DMARC, SPF and DKIM - have been introduced to standardize how organizations prove the authenticity of their legitimate emails sent to customers. Cyware is proud to announce that it has also adopted these message validation protocols to protect its customers and thwart spam, email spoofing and  phishing attempts.

What are these protocols?

Sender Policy Framework (SPF) is a DNS text entry used to indicate to mail exchanges which host names/IP addresses are authorized to send mail on behalf of one’s domain.

Domain Keys Identified Mail (DKIM) is another email authentical protocol that allows an organization to claim responsibility for a message by adding a digital signature to the header of the email message. This signature can then be validated against a public cryptographic key in the organization’s DNS records to verify that the message was sent from an authorized mail server.

Domain-based Message Authentication, Reporting and Conformance (DMARC) builds on these widely used protocols to determine the authenticity of an email message for preventing spoofing attempts. Once an email message is received, a properly configured DMARC policy tells a receiving server whether or not to accept an email from a particular sender based on domain alignment and reporting. Simply put, DMARC requires both SPF and DKIM checks to succeed to deem a message authentic. It also has consistent policies in place for handling authentication failures such as reporting, quarantining or rejecting a suspicious message.

Together, the trio work to ensure emails cannot be forged and any suspicious ones are blocked before they make their way into users’ inboxes.

Why is this a big deal?

Given the ubiquity of email and how easy they are to spoof with cleverly-crafted logos, language or domains, users often find it difficult to distinguish a real message from a fake one. Large mailbox providers may also inadvertently allow a potentially harmful message to pass and be delivered to users.

These email authentication protocols remove the guesswork and make it easier for email senders, mail providers and users to determine whether a message is safe and authentic, and what to do if it isn’t.

Always staying ahead of the curve

To protect our users from spam, phishing and spoofing attempts, we have adopted and implemented this email security trifecta to ensure all emails delivered through Cyware are safe and properly vetted. In case an email claiming to be from Cyware fails authentication, the message will be immediately quarantined by the mail server.

As an early adopter of these protocols, Cyware has taken a proactive approach to protect its users and brand from all types of deceptive attacks with these proven controls.

We are proud to step up to the plate to protect our clients against threats using the latest technologies and do our part to help make the internet a safer place.


email authentication protocol

Posted on: September 04, 2018

More from Cyware

Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.

The Virtual Cyber Fusion Suite