Chat +1-888-563-5277 [email protected]

Email Security Best Practices For 2020

Email security is always a top priority as email is the main infection vector for a personal device. Whether it is opening attachments containing malware or a misguided click on a link redirecting towards a site that is, itself, malicious. The only fact that 94% of malware is delivered via email is the important hint to think.

Over the past two weeks, your email inbox was likely flooded with messages detailing what brands were doing to mitigate the COVID-19 outbreak. At EasyDMARC we have detected 2x increase of daily average email sending volume and on average 3x increase of phishing/threat emails volume. The Internet is drowning in COVID-19-related malware and phishing scams. Working from home transition opens the door to more attacks and email security becomes more challenging.


Users must be especially aware of these issues:

  • Do you know the sender of the email?
  • Was I expecting this e-mail?
  • Are proposed links consistent with the subject mentioned?
  • Does this e-mail employ the emotional content of fear, greed, or curiosity, or, most important, does it try to get me to take an action?

If any doubt, check the message authenticity by another channel (telephone, SMS, etc.) and apply organizational measures to prevent scams. Fraudulent transfer requests, that seem to come from a manager is a widespread type of cyberattack, also called “CEO fraud”. Moreover, the redirection of professional messages to a personal email must be prohibited.  It may constitute an irremediable information leak from the organization. If necessary, controlled and secure methods for remote access to professional email must be offered.


Whether the organization hosts or has their email system hosted, to provide best email security it must ensure:

  1. that it has an anti-virus analysis system upstream of the mailboxes of users to prevent the receipt of infected files
  2. that it has activated TLS encryption for exchanges between email servers (from the organization or public) as well as between the user devices and servers hosting the mailboxes.
  3. not directly exposing the mailbox servers to the Internet is preferable. In this case, a relay server dedicated to send and receive messages must be implemented in case the Internet is cut off.
  4. while spam – whether malicious or not – accounts for the majority of email exchanges on the Internet, the deployment of an anti-spam service must be able to remove this source of risks.

Finally, the email expert will ensure the implementation of authenticity verification mechanisms. The correct configuration of public DNS records linked to its email infrastructure

  • MX
  • SPF
  • DKIM

Check Your Domain


Protect your account with 2-Factor Authentication

Two-factor authentication (also known as 2FA) is a method of electronic authentication, which adds an extra layer of security to your account in case your password is stolen. After you set up authentication in EasyDMARC, you’ll sign in to your account in two steps using: Step...

Read More

How to Implement DMARC with EasyDMARC

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a policy that protects organizations from Business Email Compromise attacks and allows them to receive DMARC reports from mail service providers.  Also, DMARC is an email authentication protocol, that is designed to give email domain owners...

Read More

How does DMARC work: why you should use DMARC?

Protecting your email domain can do more than just prevent hackers from sending embarrassing emails on your behalf. It can also help you build a trusted relationship with business partners and employees by assuring their information is secure. Research shows that phishing attacks are...

Read More