{"id":75,"date":"2020-10-07T10:37:28","date_gmt":"2020-10-07T17:37:28","guid":{"rendered":"https:\/\/danory.ca\/it-news\/?p=75"},"modified":"2020-11-02T09:50:57","modified_gmt":"2020-11-02T17:50:57","slug":"email-spoofing-attack","status":"publish","type":"post","link":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/","title":{"rendered":"How to Avoid an Email Spoofing Attack"},"content":{"rendered":"<p>You\u2019ve just received an e-mail from your boss asking for your help on an important project. Quickly opening the attachment they\u2019ve sent; you realize that the e-mail wasn\u2019t really from your boss and you have experienced an email spoofing attack.<\/p>\n<p>It is very common to fall victim to an attacker changing the \u201cFrom:\u201d address on an email to represent a known name. For example, an attacker can pretend to be a recognized business and send emails to customers asking for payments, private information or other valuable items.<\/p>\n<p>I\u2019m sure you are now thinking of the various e-mails that you have caught entering your inbox that present a false exterior.<\/p>\n<h4>So, how do we prevent an email spoofing attack?<\/h4>\n<p>Fortunately, there are people who have considered these vulnerabilities and have provided standards to prevent these weaknesses.\u00a0 For the past 30 years this has been covered by the <a href=\"https:\/\/www.ietf.org\/\">Internet Engineering Task Force (IETF)<\/a>. The IETF provides two main ways to solve spoofing: Sender Policy Framework and Domain Keys Identified Mail.<\/p>\n<h5><em>Sender Policy Framework<\/em><\/h5>\n<p>Prevents others from sending messages from your domain name. The sender policy framework has a record of approved email systems and servers. For instance, Andrew and James who have emails with @danory.ca have been identified and approved by the Sender Policy Framework. However, emails cannot be sent from hailey@danory.ca as this user has not been approved by the email system or server.<\/p>\n<h5><em>Domain Keys Identified Mail<\/em><\/h5>\n<p>Prevents spoofing by providing a source to check if the email is authentic. This solves the problem when named accounts are used: answers the question of did my boss actually send this from their inbox or is this someone sending an email with my bosses\u2019 name on it?<\/p>\n<h4>How do I monitor against Email Spoofing attacks?<\/h4>\n<p>There is another protocol called Domain Message Authentication Reporting &amp; Conformance (<a href=\"https:\/\/support.google.com\/a\/answer\/2466580?hl=en\">DMARC<\/a>).<\/p>\n<p>DMARC is the governing record for your email system. This tells recipients whether to block, junk, or deliver your email. Additionally,\u00a0 you can protect your own brand from spoofing and ensure your email nearly always delivers and is trusted if you set it up properly.<\/p>\n<p>At <a href=\"https:\/\/danory.ca\/\">Danory Technology Partners<\/a> we have taken the time to research the best cloud tools for business grade e-mail. We work to give your organization strong tools to help further your company&#8217;s communications. <a href=\"contact@danory.ca\">Contact us<\/a> to figure out how we can help protect your company against email spoofing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve just received an e-mail from your boss asking for your help on an important project. Quickly opening the attachment they\u2019ve sent; you realize that the e-mail wasn\u2019t really from&#8230;<\/p>\n","protected":false},"author":2,"featured_media":94,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[10,9],"class_list":["post-75","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy","tag-email-protection","tag-email-spoofing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Avoid an Email Spoofing Attack | Danory Technology Partners<\/title>\n<meta name=\"description\" content=\"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid an Email Spoofing Attack | Danory Technology Partners\" \/>\n<meta property=\"og:description\" content=\"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Danory Technology Partners\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-07T17:37:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-02T17:50:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"449\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Addison Pasiuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Addison Pasiuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\"},\"author\":{\"name\":\"Addison Pasiuk\",\"@id\":\"https:\/\/danory.ca\/it-news\/#\/schema\/person\/4b603ebc7cf19de04d2335f037a7601b\"},\"headline\":\"How to Avoid an Email Spoofing Attack\",\"datePublished\":\"2020-10-07T17:37:28+00:00\",\"dateModified\":\"2020-11-02T17:50:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\"},\"wordCount\":411,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/danory.ca\/it-news\/#organization\"},\"image\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg\",\"keywords\":[\"email protection\",\"email spoofing\"],\"articleSection\":[\"Data Privacy\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\",\"url\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\",\"name\":\"How to Avoid an Email Spoofing Attack | Danory Technology Partners\",\"isPartOf\":{\"@id\":\"https:\/\/danory.ca\/it-news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg\",\"datePublished\":\"2020-10-07T17:37:28+00:00\",\"dateModified\":\"2020-11-02T17:50:57+00:00\",\"description\":\"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?\",\"breadcrumb\":{\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage\",\"url\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg\",\"contentUrl\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg\",\"width\":449,\"height\":426,\"caption\":\"boss email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/danory.ca\/it-news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid an Email Spoofing Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/danory.ca\/it-news\/#website\",\"url\":\"https:\/\/danory.ca\/it-news\/\",\"name\":\"Danory Technology Partners\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/danory.ca\/it-news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/danory.ca\/it-news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/danory.ca\/it-news\/#organization\",\"name\":\"Danory Technology Partners\",\"url\":\"https:\/\/danory.ca\/it-news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/danory.ca\/it-news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/01\/Danory-Logo-Blue-web-400x400.png\",\"contentUrl\":\"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/01\/Danory-Logo-Blue-web-400x400.png\",\"width\":400,\"height\":400,\"caption\":\"Danory Technology Partners\"},\"image\":{\"@id\":\"https:\/\/danory.ca\/it-news\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/danory.ca\/it-news\/#\/schema\/person\/4b603ebc7cf19de04d2335f037a7601b\",\"name\":\"Addison Pasiuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\/\/danory.ca\/it-news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7fc0f9bfcc47dadeb46a786af25dd716?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7fc0f9bfcc47dadeb46a786af25dd716?s=96&d=mm&r=g\",\"caption\":\"Addison Pasiuk\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid an Email Spoofing Attack | Danory Technology Partners","description":"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/","og_locale":"en_US","og_type":"article","og_title":"How to Avoid an Email Spoofing Attack | Danory Technology Partners","og_description":"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?","og_url":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/","og_site_name":"Danory Technology Partners","article_published_time":"2020-10-07T17:37:28+00:00","article_modified_time":"2020-11-02T17:50:57+00:00","og_image":[{"width":449,"height":426,"url":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg","type":"image\/jpeg"}],"author":"Addison Pasiuk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Addison Pasiuk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#article","isPartOf":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/"},"author":{"name":"Addison Pasiuk","@id":"https:\/\/danory.ca\/it-news\/#\/schema\/person\/4b603ebc7cf19de04d2335f037a7601b"},"headline":"How to Avoid an Email Spoofing Attack","datePublished":"2020-10-07T17:37:28+00:00","dateModified":"2020-11-02T17:50:57+00:00","mainEntityOfPage":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/"},"wordCount":411,"commentCount":0,"publisher":{"@id":"https:\/\/danory.ca\/it-news\/#organization"},"image":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg","keywords":["email protection","email spoofing"],"articleSection":["Data Privacy"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/","url":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/","name":"How to Avoid an Email Spoofing Attack | Danory Technology Partners","isPartOf":{"@id":"https:\/\/danory.ca\/it-news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage"},"image":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg","datePublished":"2020-10-07T17:37:28+00:00","dateModified":"2020-11-02T17:50:57+00:00","description":"Did my boss actually send this message from their personal inbox, or is this someone else sending an email spoofing attack with my bosses\u2019 name on it?","breadcrumb":{"@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/danory.ca\/it-news\/email-spoofing-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#primaryimage","url":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg","contentUrl":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/10\/austin-distel-Imc-IoZDMXc-unsplash-1-e1602090056276.jpg","width":449,"height":426,"caption":"boss email"},{"@type":"BreadcrumbList","@id":"https:\/\/danory.ca\/it-news\/email-spoofing-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/danory.ca\/it-news\/"},{"@type":"ListItem","position":2,"name":"How to Avoid an Email Spoofing Attack"}]},{"@type":"WebSite","@id":"https:\/\/danory.ca\/it-news\/#website","url":"https:\/\/danory.ca\/it-news\/","name":"Danory Technology Partners","description":"","publisher":{"@id":"https:\/\/danory.ca\/it-news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/danory.ca\/it-news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/danory.ca\/it-news\/#organization","name":"Danory Technology Partners","url":"https:\/\/danory.ca\/it-news\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/danory.ca\/it-news\/#\/schema\/logo\/image\/","url":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/01\/Danory-Logo-Blue-web-400x400.png","contentUrl":"https:\/\/danory.ca\/it-news\/wp-content\/uploads\/2020\/01\/Danory-Logo-Blue-web-400x400.png","width":400,"height":400,"caption":"Danory Technology Partners"},"image":{"@id":"https:\/\/danory.ca\/it-news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/danory.ca\/it-news\/#\/schema\/person\/4b603ebc7cf19de04d2335f037a7601b","name":"Addison Pasiuk","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/danory.ca\/it-news\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7fc0f9bfcc47dadeb46a786af25dd716?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fc0f9bfcc47dadeb46a786af25dd716?s=96&d=mm&r=g","caption":"Addison Pasiuk"}}]}},"_links":{"self":[{"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/posts\/75"}],"collection":[{"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":20,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/posts\/75\/revisions"}],"predecessor-version":[{"id":127,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/posts\/75\/revisions\/127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/media\/94"}],"wp:attachment":[{"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/media?parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/categories?post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danory.ca\/it-news\/wp-json\/wp\/v2\/tags?post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}