Combating email spoofing involves a multi-faceted approach. Implementing SPF, DKIM, and DMARC with a 'reject' policy is crucial, though DMARC doesn't protect the Reply-To address. Regularly monitor DMARC reports to detect unauthorized senders. Secure website forms and prevent email list scraping. Train employees and educate customers on identifying spoofed emails. Monitor domain reputation using tools like Google Postmaster Tools and consider implementing BIMI. Employ subdomains, a dedicated IP address, and monitor security breaches. Report incidents to authorities and consider DNSSEC and MTA-STS. If DMARC is set correctly, the responsibility falls on receiving domains to honour the policy.
11 marketer opinions
To combat email spoofing, implement strong authentication measures such as SPF, DKIM, and DMARC with a strict 'reject' policy. Regularly monitor DMARC reports to identify unauthorized senders and spoofing attempts. Train employees to recognize spoofed emails and report incidents. Proactively prevent email list scraping on your website using CAPTCHAs and rate limiting. Monitor your domain's reputation using tools like Google Postmaster Tools. Consider implementing BIMI to display your brand logo in supporting inboxes, and use subdomains to isolate the impact of attacks. Using a dedicated IP and monitoring for security breaches are beneficial. Remember that DMARC does not protect the Reply-To address.
Marketer view
Email marketer from MXToolbox shares monitoring your domain's reputation with services like Google Postmaster Tools can help you identify if your domain is being used for malicious purposes and take steps to mitigate the damage.
27 Jul 2023 - MXToolbox
Marketer view
Email marketer from EasyDMARC explains using subdomains for different email purposes (e.g., marketing, transactional) can help isolate the impact of spoofing attacks and make it easier to implement security policies.
29 Apr 2022 - EasyDMARC
4 expert opinions
Experts recommend several steps to combat email spoofing. Firstly, secure your website's forms to prevent spammers from abusing them to send authenticated spam. Secondly, report email spoofing incidents to government agencies like the FTC or IC3. Additionally, advise your customers about the possibility of email spoofing and educate them on how to identify suspicious emails. Finally, implement DMARC to protect your domain from spoofing and phishing attacks.
Expert view
Expert from Spam Resource explains that you can report email spoofing incidents to government agencies like the FTC (Federal Trade Commission) or the FBI’s Internet Crime Complaint Center (IC3).
6 Jan 2025 - Spam Resource
Expert view
Expert from Spam Resource shares advising your customers about the possibility of email spoofing and how to identify suspicious emails can help protect them from phishing attacks that use your spoofed domain. This can be done through website announcements, social media posts, or email newsletters.
31 May 2025 - Spam Resource
5 technical articles
Technical documentation highlights several key steps to prevent email spoofing. SPF records authorize sending sources for your domain, DKIM adds a digital signature for message integrity, and DMARC builds on these by defining handling policies for failed authentication. DNSSEC secures DNS records against tampering, while MTA-STS enforces TLS encryption for SMTP connections. Implementing these measures in your DNS settings and email platform configurations is crucial.
Technical article
Documentation from DMARC.org explains DMARC builds upon SPF and DKIM by allowing you to specify how receiving servers should handle emails that fail authentication checks (e.g., reject, quarantine). Implement a DMARC policy in your domain's DNS settings.
19 Aug 2021 - DMARC.org
Technical article
Documentation from RFC Editor explains MTA-STS (Mail Transfer Agent Strict Transport Security) is a mechanism enabling mail service providers (MSPs) to declare their ability to receive TLS 1.2 or higher encrypted SMTP connections and for sending MTAs to discover and enforce such policies.
2 Nov 2021 - RFC Editor
How can a phishing email pass SPF and DKIM authentication checks?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can I protect my domain from being spoofed and blacklisted?
How can I stop someone from using my email address to send spam?
How can you identify the source of unsolicited emails and prevent data leaks?
How do I handle spoofing when DMARC reject is set but not enforced on inbound mail server?