In this two-part blog post, we will cover: what every organization should consider today to protect their email domains from misuse, how to improve the delivery of their messages, and what should be taken into account regarding phishing and malicious message protection for incoming messages.
In this first part, we focus on message hygiene, i.e., how we protect our organization’s email addresses from misuse and improve the chances of our messages being delivered, so they don’t end up as spam or even get blocked entirely at the recipient’s end. In the second part, to be published later, we will focus on how we can best protect our users from phishing and malicious messages.
Email is utilized in many different ways
Every organization uses email for different purposes. For example, we communicate with various stakeholders through it. The marketing department uses it to send marketing messages, and in some organizations, it is strongly integrated into the enterprise resource planning system to act as a messaging channel between different systems. There are numerous other use cases as well. Throughout history, the problem with email has been verifying the identity of the sender. In practice, even today, anyone can send email messages on our behalf, for better or worse.
The most common protection mechanisms we use to tell others from which services emails are sent on our behalf are SPF, DKIM, and DMARC. DMARC is the latest of these and acts as a “confirming lock” for SPF and DKIM settings, which without DMARC are actually easily circumvented. For this reason, its use is now increasingly required, as has already happened with Google and Yahoo. I personally believe that this is just the beginning, and requirements will become even stricter in the future.
Google and Yahoo are tightening their requirements
Google and Yahoo announced last fall that they would require DMARC usage from entities sending more than 5000 messages per day to their service. This setting came into effect in their services at the beginning of February. However, the setting requirement for DMARC is still moderately in reporting mode (Policy=none), the implementation of which does not jeopardize the delivery of organizations’ messages in situations where all email protection mechanisms (such as SPF and DKIM) may not yet be fully in order. I have received many inquiries about this when various providers have communicated about the requirements for implementing DMARC policy. My answer is that it can be safely turned on in this mode. However, it is not enough to protect the organization’s email domain from misuse. A good first step, nonetheless.
What should be done regarding protections?
We, the experts at Above IT, have carried out numerous email communication improvement measures for both small and large organizations, with several years of experience.
Get in touch! Book a time directly from my calendar at the bottom of the page, and let’s discuss in more detail how we could help you with this matter.
Wishing you secure communication,
Mika, consigliere



