This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.

STEP 6

Protect Your Email
and Reputation

Protecting the reputation and brand of your business is critical to your success. You can help do this by implementing tools that ensure your brand’s name and email addresses don’t get used by others pretending to be you.

An email standard known as DMARC is an effective way to stop spammers and phishers from using company “domains” (the part of your email address after the “@”) to carry out dangerous cyber attacks. It’s a way to verify the sender of an email has permission to use your email domain and send email. DMARC is especially effective in addressing business email compromise (BEC) — a targeted email attack — which is a growing threat to companies.

A side benefit to using DMARC protection is that it may lead to better delivery of email to your customers’ inboxes instead of to their spam folder! The tools below can help you set up DMARC and also to understand the information it provides.

Trademark monitoring tools give you visibility in to how your business name or brand is being misused, allowing you to take action to protect your reputation. “Look-alike” domains (slightly misspelled or with a different ending, e.g. BestBusiness.com becomes BestBusness.org or BestBusiness.net).

Attackers set up similar websites or domains and trick your customers and users to visit or open them to defraud them, resulting in damage to your reputation and brand and harm to your customers. This is known a typo-squatting.

6.1 Implement DMARC

Narrow your search by selecting your OS
Type
3
Level
0h 5min
Time

Valimail Monitor

This tool is a fully automated DMARC monitoring solution that lets you see all email senders using your domain.

Type
4
Level
3h 0min
Time

dmarcian

Get reporting, service, and support around the implementation of the DMARC email authentication system.

Type
4
Level
3h 0min
Time

OnDMARC

Actively block phishing attacks and stop email impersonation with OnDMARC.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Salesforce Trailhead

Salesforce Trailhead is a place where you can learn in-demand skills, earn resume-worthy credentials and connect to career...

Read More

Hootesuite Social Media Audit

Social media is an invaluable extension of your brand. Make sure the people you engage with online maintain confidence in...

Read More

Understanding Cyber Risk for Small Business

GCA created the GCA Learning Portal to offer additional training and resources supplemental to the Cybersecurity Toolkit....

Read More

Phishing Policy

Use/customize this template to build your company's phishing policy.

Read More