This Site Requires JavaScript Enabled.
Toolkits
  • SB Small Business Toolkit
  • IN Individuals Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.
  • SB Small Business Toolkit
  • IN Individuals Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit

  • SBSmall Business Toolkit
  • ETElections Toolkit
  • JOJournalists Toolkit

Protect Your Email and Reputation

Protecting your reputation and brand is critical to your success. You can help do this by implementing tools that ensure your brand’s name and email addresses don’t get used by others pretending to be you.

An email standard known as DMARC is an effective way to stop spammers and phishers from using company “domains” (the part of your email address after the “@”) to carry out dangerous cyber attacks. It’s a way to verify the sender of an email has permission to use your email domain and send email. DMARC is especially effective in addressing business email compromise (BEC) — a targeted email attack — which is a growing threat to companies.

Video: Email Authentication

Customize Your Toolbox by:

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

  • Invest in Us
  • Community Forum
  • About
  • Submit a Tool
  • Privacy Policy &
    Notice to Users
  • Terms of Service
  • Legal Notice

Copyright @ 2023 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Third Party Tool
Policy Document
Instructions
Third Party Scan
Video

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
toolkit@globalcyberalliance.org

Community Forum
https://community.globalcyberalliance.org/