{"id":18731,"date":"2021-09-23T13:31:44","date_gmt":"2021-09-23T13:31:44","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18731"},"modified":"2025-05-07T22:03:29","modified_gmt":"2025-05-07T22:03:29","slug":"real-life-phishing-email-examples-and-their-impact","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/","title":{"rendered":"Real-Life Phishing Email Examples and Their Impact: Module 4"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As we\u2019ve already mentioned in the <a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/\">previous modules<\/a>, cyberthreats result in significant losses in companies of any size and industry. In module four, we\u2019ll give you some <\/span>phishing email examples<span style=\"font-weight: 400;\"> from real life phishing campaigns, show you the recovery process, and lessons learned.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-18742 aligncenter\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-4-image-1024x768.png\" alt=\"cybercriminal with a phishing email \" width=\"480\" height=\"360\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-4-image-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-4-image-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-4-image-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/Module-4-image.png 1200w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<h2><b>Phishing email examples<\/b><\/h2>\n<h3><b>Case 1: Loss of $407,000 by a Hospital<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As per a contract for emergency services coverage, a rural hospital partnered with ED group. Every month, they received an email invoice and the hospital paid $200.000 and more for the services. The phishing emails continued for a couple of months until somebody discovered that ED group never sent any payment requests via email. As a result of this scam, the hospital lost $407,000.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Human error is the door to fraudulent activity in all <\/span>phishing attack examples<span style=\"font-weight: 400;\">. However, in this case, there&#8217;s a sure way the hospital personnel could at least recognize the scam. The payment for the first month got rejected once from ED group\u2019s side due to a blocked account. Once the money returned, the hospital sent another payment to a new bank account number.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After this incident, the hospital made cybersecurity training and two-factor email authentications for all managers a priority. They also changed the transfer procedures, including a mandatory oral confirmation from a given vendor for financial transactions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First of all, this <\/span>example of phishing email,<span style=\"font-weight: 400;\"> shows how important it is to pay attention to the email sender and verify the address, especially while dealing with large amounts of money.<\/span><\/p>\n<h3><b>Case 2: CEO Fraud in Upsher-Smith Laboratories<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CEO Fraud is an <\/span>example of phishing email<span style=\"font-weight: 400;\"> that exploits the name of the company\u2019s CEO tricking employees into disclosing information or making financial transfers. In the case of <a href=\"https:\/\/www.fox9.com\/news\/ceo-spoofing-costs-drug-company-50-million\">Upsher-Smith Laboratories<\/a>, the attackers made the Accounts Payable Coordinator to urgently transfer around $50 million in nine different transactions to the \u201cCEO\u2019s account.\u201d Of course, the bank account turned out to belong to the cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is one of those <\/span>phishing examples<span style=\"font-weight: 400;\">, where the employee is to blame the most. However, other issues are in play here. The transfers were large and frequent, so a bank representative should\u2019ve called to verify the deal before letting them through. On the other hand, if the company had a set procedure regarding large transactions, an unnecessary loss could be prevented.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although the process got interrupted at $39 million, the damage was already done. Sure enough the company couldn\u2019t recover the money. The company learned an expensive lesson about confirming unusual requests even if they\u2019re urgent and come from the CEO. Plus, it might be challenging and time consuming to set procedures, but it has tremendous value.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, the outcomes from both of these <\/span>examples of phishing email<span style=\"font-weight: 400;\"> could be avoided if the company had strong guidelines and enough cybersecurity know-how.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the next module, you\u2019ll learn more about another social engineering attack type, where the victim might not lose money outright, but whole networks may be infected.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we\u2019ve already mentioned in the previous modules, &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-18731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing Email Examples and Their Impact | EasyDMARC<\/title>\n<meta name=\"description\" content=\"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Real-Life Phishing Email Examples and Their Impact: Module 4\" \/>\n<meta property=\"og:description\" content=\"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-23T13:31:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-07T22:03:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Real-Life Phishing Email Examples and Their Impact: Module 4\",\"datePublished\":\"2021-09-23T13:31:44+00:00\",\"dateModified\":\"2025-05-07T22:03:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/\"},\"wordCount\":499,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/\",\"name\":\"Phishing Email Examples and Their Impact | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"datePublished\":\"2021-09-23T13:31:44+00:00\",\"dateModified\":\"2025-05-07T22:03:29+00:00\",\"description\":\"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/real-life-phishing-email-examples-and-their-impact\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"Real-Life Phishing Email Examples and Their Impact: Module 4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Email Examples and Their Impact | EasyDMARC","description":"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/","og_locale":"en_US","og_type":"article","og_title":"Real-Life Phishing Email Examples and Their Impact: Module 4","og_description":"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.","og_url":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-23T13:31:44+00:00","article_modified_time":"2025-05-07T22:03:29+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Real-Life Phishing Email Examples and Their Impact: Module 4","datePublished":"2021-09-23T13:31:44+00:00","dateModified":"2025-05-07T22:03:29+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/"},"wordCount":499,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/","url":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/","name":"Phishing Email Examples and Their Impact | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","datePublished":"2021-09-23T13:31:44+00:00","dateModified":"2025-05-07T22:03:29+00:00","description":"In this article, we will present phishing email examples from real life phishing campaigns, show you the recovery process, and lessons learned.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","width":1440,"height":910,"caption":"top image 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"Real-Life Phishing Email Examples and Their Impact: Module 4"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18731"}],"version-history":[{"count":2,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18731\/revisions"}],"predecessor-version":[{"id":47303,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18731\/revisions\/47303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18703"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}