• Features
  • Services
    • Email Authentication
    • Agency Partnerships
    • Email Training
    • Inbox Brand Visibility
    • Deliverability
  • Resources
    • Knowledge Base
    • API documentation
    • Blog
    • Status
    • BIMI inspector
  • About us
    • Contact
    • Terms and Conditions
    • Privacy Policy
    • Privacy recommendations
  • Features
  • Services
    • Email Authentication
    • Agency Partnerships
    • Email Training
    • Inbox Brand Visibility
    • Deliverability
  • Resources
    • Knowledge Base
    • API documentation
    • Blog
    • Status
    • BIMI inspector
  • About us
    • Contact
    • Terms and Conditions
    • Privacy Policy
    • Privacy recommendations
  • Login
    EN CS
Mailkit logo
  • Features
  • Services
    • Email Authentication
    • Agency Partnerships
    • Email Training
    • Inbox Brand Visibility
    • Deliverability
  • Resources
    • Knowledge Base
    • API documentation
    • Blog
    • Status
    • BIMI inspector
  • About us
    • Contact
    • Terms and Conditions
    • Privacy Policy
    • Privacy recommendations
  • Features
  • Services
    • Email Authentication
    • Agency Partnerships
    • Email Training
    • Inbox Brand Visibility
    • Deliverability
  • Resources
    • Knowledge Base
    • API documentation
    • Blog
    • Status
    • BIMI inspector
  • About us
    • Contact
    • Terms and Conditions
    • Privacy Policy
    • Privacy recommendations
  • Login
    EN CS
EN CS
Login
8 November, 2022

What is phishing and why is it dangerous to you?

Have you ever heard about the “Grandson scam”? It’s a way of fooling older adults by calling them and pretending to be their grandchild or the grandchild’s best friend, asking for the money transfer for some made-up emergency. Of course, I don’t have to mention disappearing forever after the transfer.

This is a kind of “social” phishing. Email phishing is based on a similar rule; most often the goal of a “phisher” is to disguise as a well reputable company (eg. eBay, Amazon, etc.) with a call to action, to gain access to your fragile personal information - password, card numbers and so on…

Email phishing

This data is often used not only to get access to spoofed (“phished”) entities but also to other sources; this is due to the fact that many internet users are basing all of their online accounts on the same password. You’ve been warned. 

The more sophisticated and crafted type of phishing is so-called spear-phishing - this is a spoofed message targeting an individual user or organization, customizing the phish message thoroughly for the recipient - using their personal details like name, interests, and others.

How is this dangerous for you and your business? First of all, it is important to focus on the safety of your users/recipients. If a malicious actor is attempting to spoof your brand, domain, or logo, he will target your recipients who, believing it is a message directly from you, might give away crucial data. Such data leak might end in being used against them, potentially costing them money and/or causing other types of harm. This alone is a very good reason to protect yourself and your users against such malicious activity.

The other very important factor is your brand’s reputation. Not only a phishing attack can cause harm to the reputation of your domain, but also can easily ruin the trust in your brand; especially if the perception of the attack being your fault maintains. The first one might be observable with numbers when carefully monitoring deliverability tools, and the second one might be more subtle, but in the end, reflected in the business/revenue calculations.

So what are the protection measures you can take? First of all - authentication. Make sure you authenticate your traffic properly with both SPF and DKIM. To put it very simply - the first one based on the public records authenticates the legitimacy of the source of the message, while the second one, based on the private and public keys pair, checks if the message signed by the sender has been tampered with.

Building on those two, we have a DMARC protocol. This is a method of monitoring and instructing recipients on how to handle the messages coming from your domain (claiming to be your brand) if both of said authenticators fail. A cherry on top of the proper authentication, DMARC gives you the ability to thoroughly follow the traffic using your domain,  as well as instructs the mailbox providers to "quarantine" or even "reject" the messages without proper proof, that it's actually coming from you (authentication).

At Mailkit, we'll be instructing you step by step on how to set up all the necessary DNS records to get things going. You can also delegate your domain directly to us so we can handle most of the stuff for you. We also offer thorough monitoring and advice on DMARC and all related factors.

 

Contact us

Pains of DMARC adoption
Pains of DMARC adoption
19 August, 2019
Default blog image
BIMI - acronym email marketers shoud be interested in
6 May, 2019
Default blog image
Email marketing & spam - what do consumers think?
20 June, 2018

Contact us

Let us know what your campaign objectives are and we'll create a plan that works for you.

+420 277 001 800
sales@mailkit.com


Processing of information provided using this form is governed by our Privacy Policy.

Required
Required
Required
Mailkit logo

A Czech emailing platform with its own infrastructure, that is a leader in international mailing distribution.

 

  • Features
  • Services
  • Resources
  • About us

services

  • Email Authentication
  • Agency Partnerships
  • Email Training
  • Inbox Brand Visibility
  • Deliverability

ReSOURCES

  • Knowledge Base
  • API documentation
  • Blog
  • Status
  • BIMI inspector
Logo Maawg
Logo Experience
Logo CSA
Logo Signal spam
Logo ISO-27001
Logo ISO-9001
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
© 2006-2022 Mailkit - All rights reserved