品牌保护

品牌保护

网络钓鱼呈上升趋势。

那么,您可能会问,网络钓鱼与品牌有什么关系呢?好吧,对于初学者来说,欺诈性电子邮件需要来自某个地方。要使网络钓鱼有效,欺诈性电子邮件越熟悉,成功率就越高。毫无戒心的员工、客户和各种利益相关者更有可能打开来自合法或受信任域的电子邮件。网络犯罪分子意识到这种行为,并会尝试使用您的域来网络钓鱼可能打开您邮件的人。

如果收件人毫无戒心地打开来自您域的欺诈性电子邮件,则可能会释放恶意软件。恶意软件可能是计算机病毒、勒索软件、击键记录器等。

A virus could affect other computers in the network and take control of them. They can then be manipulated to launch an attack on external parties, like a Distributed Denial of Service (aka DDoS) attack. In the case of a ransomware attack, applications may be compromised and even locked. No one, including the administrator, can access the application until a ransom is paid. In the event the malware is a keystroke logger, then whatever password is typed, along with the userid will be relayed back to the cyber criminals.

如果上述任何一种情况涉及外部方(例如客户),并且他们发现电子邮件来自您的域,您认为会发生什么?你们的关系可能会受到不利影响。你绝对不想陷入这种情况。那你能做什么呢?

DMARC

You can deploy a Domain-based Message Authentication, Reporting, and Conformance (aka DMARC) policy. A DMARC policy helps email-receiving parties to determine whether any given message is legitimate (i.e. the sender is really who they say they are). DMARC accomplishes this through a verification process by checking whether the sender email server is listed in a Sender Policy Framework (aka SPF) record. SPF does not operate on its own, it requires a Domain Key Identification Mechanism (aka DKIM) record. DKIM encrypts the header information of the email and utilizes a public-key infrastructure (aka PKI) to authenticate the email. These two records, together with the reporting mechanism of DMARC would help a business weed out fraudulent emails being sent with their domain name.

Beyond the technical authentication process briefly outlined above, the implementation of DMARC has a host of other benefits, and we recommend that you check out our 博客文章 on how your business can benefit from it.

Do 联系我们 if you need some help in deploying DMARC for your brand.