How implementing the email authentication protocol DMARC can secure your organization. Credit: Thinkstock Cyberattacks are a dime a dozen these days, with a new phishing or malware scam making headlines almost every week. The frequency at which these attacks are occurring is alarming to say the least, particularly when some of the seemingly most secure institutions in the world (like the White House, for example) are falling victim to hacks. If it took one prankster sending out a fake party e-invite impersonating Jared Kushner to trick Homeland Security Adviser Tom Bossert, what is going to stop an email hacker from obtaining any organization’s sensitive information?The problem is hackers are becoming more and more advanced in their tactics, strategically targeting individuals with access to mission-critical data and impersonating their bosses to convince them to send that information along. The increased use of smartphones also exacerbates the problem. Smartphones typically only show the “display name” and not the email address, making it easy to look quickly at an email, read the display name and not realize the actual email address is from a fake account.It’s a tactic that contributed to the 2,370 percent increase in identified exposed dollar losses in the U.S. between January 2015 and December 2016, according to the FBI. It’s not surprising then that LinkedIn’s “2017 Cybersecurity Trends Report” – which surveyed 1,900 cybersecurity professionals – found that phishing attacks are a top concern for 37 percent of respondents, ahead of insider threats (33 percent) and malware (32 percent).With those alarming stats in mind, Congress has made combating email hackers a top priority. Oregon Senator Rob Wyden proposed a protocol earlier this summer requesting that all federal agencies implement stricter controls in order to prevent hackers from impersonating government officials via email. The protocol is called Domain-based Message Authentication Reporting and Conformance, or DMARC for short. DMARC is an email authentication, policy and reporting protocol building on the popular Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) protocols. It offers linkage to the author’s domain name, published policies for recipient handling of authentication failures and reporting from receivers to senders. The protocol helps remove the guesswork from the receiver’s handling of messages that fail to pass authentication, limiting or eliminating their exposure to potentially harmful phishing or spam tactics. Current mechanisms work in isolation from one another, making it difficult for receivers to make decisions about how to evaluate messages and preventing legitimate domain owners from getting any feedback.While DMARC adoption is currently a major priority for government agencies and hospitals, the protocol can – and should be – used by every organization to help detect and prevent email spoofing. And yet, only one-third of organizations use DMARC protocol and less than 10 percent use the strongest available setting, according to the Federal Trade Commission. For the two-thirds of companies that have yet to implement DMARC, they may want to consider the benefits of having a system in place that helps employees at all levels identify fake emails and avoid potentially detrimental scams. LinkedIn’s 2017 study also found that two of the biggest obstacles to stronger cybersecurity are a lack of skilled employees (45 percent) and a lack of security awareness among employees (40 percent) – proof that having a backup system in place is all the more important. Organizations interested in making email security a top priority should check out the process the DMARC coalition recommends in order to effectively implement the protocol. While the tips will vary depending on industry, company size and email/communications trends, all companies will want to:Correctly implement DKIM and SPF protocol.Create a DMARC record in DNS and start monitoring a domain to see where email traffic using that domain is coming from.Set mail receiver policy to “none” to receive DMARC data reports while ensuring messages are still being delivered.Analyze the breadth of data provided in the DMARC reports to make informed decisions about the organization’s communications system.And finally, as an organization gains experience with DMARC, they should consider modifying DMARC policy flags from “none” to “quarantine” or “reject”; this moves the system from monitoring mode to proactive protection.Organizations should get both the IT department and security professionals on the same page to make this happen. If the process of implementing DMARC still feels daunting, they should consider using a third-party service with expertise in ensuring maximum security.Whatever an organization decides to do, the best advice is to not wait. Hackers are evolving their tactics regularly and nobody wants to be their next target – especially if they’re unprepared. Related content opinion X-ray your SaaS apps to reveal hidden security vulnerabilities Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications. By Greg Arnette Jun 08, 2018 5 mins Technology Industry SaaS Application Security opinion Exploring the paradigm shift from backup to data protection Smart organizations evaluate their overall data footprint and transform their traditional back office IT to a streamlined data protection approach for both cloud and on-premises data. By Greg Arnette May 01, 2018 5 mins Backup and Recovery Cloud Security Disaster Recovery opinion The wild west of cryptocurrency security – and what the future holds Time will tell how virtual currency security issues ultimately get resolved, but as we wait, keep changing those passwords and please, try not to throw away your key. By Greg Arnette Feb 23, 2018 4 mins Financial Services Industry Technology Industry Data and Information Security opinion How the International Olympic Committee can win gold in cybersecurity While hackers like “Fancy Bears” may continue their mission to create headline-grabbing attacks and disruptive behavior, there are steps every institution across the world and in varying industries can take so they don’t fall victim By Greg Arnette Feb 05, 2018 4 mins Technology Industry Data and Information Security Network Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe