Best Practices for Protecting Your Small or Medium Size Business from Best Practices for Protecting Your Small or Medium | Page 6

Domain name spoofing protection Any phishing solution you deploy should protect you and your customers from domain name spoofing. The best way to do that is by sending cryptographically signed emails from an authenticated email server. There are few methods to authenticate email servers. These include DKIM (DomainKeys Identified Mail) and SPF (Sender Policy Framework), often in conjunction with DMARC (Domain-based Message Authentication, Reporting and Conformance). Protect your customers. Authenticate your domains and send cryptographically-signed emails so when they receive your message they’ll know it hasn’t been tampered with, which means they cannot get phished by domains you control. More than just checking the email Checking the email is just the starting point The starting point for any good anti-phishing technology is link click protection. Any time an email contains an embedded link, it should be checked against multiple URL databases which contain whitelisted and blacklisted websites. In the event a site is marked unsafe, users should be prompted with a warning that they are going to an unsafe website and they should be prevented from opening the malicious links. In addition to link checking, the headers, the domain information and the body content should also be scanned for inconsistencies. Suspicious messages and payloads should be quarantined as spam, tagged or simply rejected before making it to the user’s inbox. But checking the formatting and content of an email itself is just the starting point. Thorough phishing prevention goes a step further and checks the linked-to website itself. That’s because a link that shows up good could point to a malicious website. Best Practices for Protecting Your Small or Medium Size Business from Phishing 6