
Recent Posts
How you can stop cyber criminals impersonating you.

Email is the primary tool used in business, from internal communication to customers, making it an effective place for cyber criminals to target their victims. According to Avanan’s phishing statistics, 1 in every 99 emails is a phishing attack. This amounts to 4.8 emails per employee in a five-day work week!
Because of this and other statistics, people are increasingly beginning to recognise that emails should not be trusted automatically. Most users of email will have received strange emails from spoofed accounts. However, some are extremely sophisticated and therefore hard to detect, especially for individuals who may not be as vigilant as we would hope.
Interested in learning more about cyber security best practices? Download our FREE White Paper
Email spoofing is the fabrication of an email header, in the hope of deceiving the recipient into thinking the email originated from someone other than the intended source. Business Email Compromise (BEC) is a common way cyber criminals spoof emails in order to swindle money out of organisations. It is a threat we have noticed more and more of our customers are experiencing. In fact, research has revealed that BEC has overtaken ransomware and data breaches as the main reason companies filed a cyber-insurance claim in EMEA.
The UK’s most impersonated company is, perhaps unsurprisingly, Her Majesty’s Revenue and Customs. In just 2014 and 2015 alone, it was estimated that taxpayers received half a billion emails each year alleging to be from the @HMRC.gov.uk email addresses, trying to cheat unsuspecting taxpayers out of money.
As a part of our commitment to providing proactive IT support, we have introduced Domain-based Message Authentication, Reporting & Conformance (DMARC) into our portfolio of services. DMARC is an email security protocol that prevents spoof emails from reaching users’ inboxes. To help with this, there are two standards we use to ensure legitimate emails are properly authenticated; Sender Policy Framework (SFP) and Domain Keys Identified Mail (DKIM).
Simply speaking, SPF lists all the IP address that are allowed to legitimately send as you and DKIM applies encryption to the header on an email (not the message itself) which certifies that the sender is legitimate for that domain. Using these standards means DMARC is unique as it is the only widely deployed technology that can make the ‘header from’ address trustworthy and reliable. Additionally, it creates a place where you can view reports and data on whether your domain is being faked.
Three net outcomes that result from implementing such as service include:
- The closing down of the sending of spam and malware in your name
- Reporting on who is sending as you
- An improved email reputation and, in most cases, a rise in deliverability rates
Many companies have already proven to hugely benefit from these outcomes. For example, looking back at HMRC, the number of spam emails claiming to be from @hmrc.gov.uk decreased by 300 million in 2016; a figure that has continued to fall.
The impacts of email spoofing can go far beyond monetary loss. Brands are built on trust, so the reputational damage it can have is far more concerning and inevitably causes more damage than is initially noticeable. In a study of 2,000 survey participants, nearly 87% said they would not (or were not very likely to) do business with a company that has faced a data breach involving credit or debit card information.
entrustIT is a Managed Service Provider (MSP) with over a decade of experience in protecting businesses against these sorts of threats and preventing the impacts they can have on a business. We will work with you to establish all the places that send email as you, and then monitor the DMARC reporting over the forthcoming weeks to ensure everything is under control. When safe, we will set the policies that are to be rejected and continue with ongoing monitoring.
Email spoofing is a trend that we expect to grow over the next decade. If businesses are not prepared for this and fail to put solutions in place, they run the risk of cyber criminals ruining their reputation by attempting to appear as them in order to scam victims. DMARC with entrustIT is a proactive measure you can choose to have put in place, which will give you peace of mind that spoofed emails are not being sent as you– at a low cost!
Interested in becoming a cyber security champion? Why not download our FREE White Paper >>
Subscribe here!
Recent Posts
Posts by tag
- technology (125)
- Security (107)
- cyber security (95)
- IT Security (93)
- Microsoft 365 (68)
- Cloud (66)
- modern technology (66)
- Managed Service (65)
- business (61)
- IT support (60)
- cloud computing (60)
- cyber attack (59)
- cloud it (56)
- microsoft (55)
- workplace (54)
- Microsoft Teams (53)
- cybersecurity (53)
- Working from home (51)
- productivity (49)
- office (46)
- office 365 (44)
- IT (43)
- Password Security (41)
- employees (39)
- entrustit (39)
- Uncategorised (38)
- flexible work (37)
- Remote (33)
- Cyber (31)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- cyber privacy (27)
- school ict (27)
- collaboration (26)
- email security (26)
- it support bournemouth (26)
- 2023 (25)
- public cloud (24)
- computing (23)
- it support dorset (22)
- password (20)
- entrust (19)
- it support hampshire (19)
- passwords (19)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- IT audit (16)
- data (16)
- it consultancy bournemouth (16)
- it support southampton (16)
- ransomware (16)
- teamwork (16)
- Coronavirus (15)
- cloud cctv (15)
- it consultancy (15)
- msp (15)
- GDPR (14)
- cctv (14)
- hackers (14)
- it consultancy hampshire (14)
- office 365 support (14)
- Protection (13)
- covid-19 (13)
- hack (13)
- internet (13)
- it consultancy dorset (13)
- it consultancy southampton (13)
- it support winchester (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- IT costs (12)
- Windows Virtual Desktop (12)
- hardware (12)
- hybrid cloud (12)
- internet safety (12)
- windows 10 (12)
- 2020 (11)
- 2022 (11)
- Microsoft Planner (11)
- vulnerabilities (11)
- data breach (10)
- digital (10)
- phishing (10)
- uk (10)
- windows (10)
- Backup (9)
- awards (9)
- bitwarden (9)
- planning (9)
- software (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- partnership (8)
- staff (8)
- usecure (8)
- Bournemouth (7)
- Google (7)
- Hampshire (7)
- IT Director (7)
- OneDrive (7)
- cloud storage (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- 2019 (6)
- Apple (6)
- Dorset (6)
- ISO (6)
- News (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- artificial intelligence (6)
- child protection (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- resources (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Case Studies (5)
- Desktop (5)
- Microsoft Copilot (5)
- Risk assessment (5)
- Windows 7 (5)
- award winning (5)
- brexit (5)
- designer (5)
- personal data (5)
- smartphone (5)
- surrey (5)
- united kingdom (5)
- website (5)
- AI (4)
- Access Management (4)
- Attacks (4)
- BYOD (4)
- Cyber Essentials (4)
- Cyber Essentials Plus (4)
- DR (4)
- DR planning (4)
- Facebook (4)
- Government (4)
- Microsoft Forms (4)
- SharePoint (4)
- Thames Valley Tech & Innovation Awards (4)
- VPN (4)
- WannaCry (4)
- computer performance (4)
- ddos (4)
- disaster recovery (4)
- internet of things (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- sophos (4)
- 2021 (3)
- 2024 (3)
- AI CCTV (3)
- ChatGPT (3)
- EDR (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Local (3)
- Multi-Site Business (3)
- NHS (3)
- New Forest (3)
- The Business Magazine (3)
- Tiva (3)
- Zoom (3)
- award (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- copilot (3)
- copilot pro (3)
- digital hub (3)
- digital transformation (3)
- guide (3)
- innovation (3)
- instagram (3)
- london (3)
- meetings (3)
- sme (3)
- storage (3)
- teaching (3)
- trump (3)
- twitter (3)
- windows 11 (3)
- wireless internet bournemouth (3)
- 2016 (2)
- 2018 (2)
- Bourne Group (2)
- Burhill (2)
- Burhill Group (2)
- CAD (2)
- Dorset Chamber (2)
- Environment (2)
- Firewall (2)
- GPT-4 (2)
- Gen Z (2)
- ISBA (2)
- MDR (2)
- Macs (2)
- Microsoft Autopilot (2)
- Mr Mulligans (2)
- PaaS (2)
- Privacy Shield (2)
- Sydenhams (2)
- Tech Company of the Year (2)
- Tech Growth (2)
- Thames Valley (2)
- XDR (2)
- acquisition (2)
- afc bournemouth (2)
- afcb (2)
- android (2)
- bcs (2)
- berkshire (2)
- blockchain (2)
- broadband (2)
- camcloud (2)
- cryptocurrency (2)
- downtime (2)
- dropbox (2)
- east grinstead (2)
- exhibition (2)
- finalist (2)
- iot (2)
- legalex (2)
- machine learning (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- serval systems (2)
- solent (2)
- strategy (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BGL Company (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burnout (1)
- CEO (1)
- Central South Business Awards (1)
- Cloud VMS (1)
- Cloudtango (1)
- Fourth Industrial Revolution (1)
- Go Integrator (1)
- Growth 100 (1)
- Harvey Jones Kitchens (1)
- High Growth (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Intune (1)
- LLM (1)
- Leaders (1)
- Loop (1)
- M&A (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Reid Steel (1)
- South Coast Tech & Innovation Awards (1)
- Surrey Business Awards (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- brand (1)
- builders merchant (1)
- business growth (1)
- business process audit (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- co op (1)
- compliance (1)
- copyright (1)
- crime (1)
- dark web (1)
- defence (1)
- dkim (1)
- dmarc (1)
- dns (1)
- donald (1)
- dyn (1)
- eagle eye networks (1)
- election (1)
- epos (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- knights of old (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- meltdown (1)
- millennials (1)
- mimecast (1)
- mirai (1)
- modern work (1)
- no-deal (1)
- number plate detection (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- private equity (1)
- procrastination (1)
- reading (1)
- recruitment (1)
- research (1)
- retail (1)
- samsic (1)
- sharefile (1)
- smart buildings (1)
- smishing (1)
- snowden (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- spf (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)
- zero touch deployment (1)
- zero-trust (1)