New email standards: what you need to know

In a major step toward improving email security, Google and Yahoo will implement new email authentication protocols for major email providers starting in February 2024. This initiative aims to strengthen cybersecurity by requiring bulk senders who distribute more than 5,000 messages daily to adhere to strict validation. standards. The protocols, including Domain-based Message Authentication, Reporting and Conformance (DMARC), Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM), aim to prevent list abuse, improve sender authentication and reducing phishing risks.

DMARC is especially crucial in the fight against cyber attacks because it authenticates sender addresses to block phishing and domain impersonation. In an age where AI-driven phishing attempts are becoming increasingly sophisticated, tools like DMARC, SPF, and DKIM are essential for protecting email recipients. SPF protects domain names by verifying the sender’s IP address, while DKIM adds a layer of cryptographic authentication to validate message ownership.

Senders of high volume emails must prepare now to meet these new standards to maintain customer trust and the reach of their messages. Non-compliance can lead to emails being blocked, which can impact important business functions such as customer acquisition and promotions. To meet these requirements, senders should review their current email authentication measures, assess the number of spam complaints, and standardize email practices.

Gerasim Hovhannisyan

CEO/co-founder of EasyDMARC.

Simple steps high-volume senders should take to ensure future email delivery

To avoid deliverability issues, high-volume senders should take proactive steps to ensure that emails:

Check current email authentication protocols: Test existing measures against the new standards. Ensure that all necessary authentication protocols are in place and functioning properly.

Configure SPF: Set up the Sender Policy Framework to protect email domains. SPF works by verifying an email’s source IP address against an authorized list, helping to combat domain spoofing and impersonation.

Implement DKIM: Use DomainKeys Identified Mail to prove email ownership. DKIM signs messages in a verifiable manner, using cryptographic authentication to distinguish legitimate senders from malicious ones.

Implement DMARC: Implement domain-based message authentication, reporting, and compliance to verify sender addresses. DMARC compares the sender’s address to domain name records and blocks emails that don’t match, preventing phishing and domain impersonation.

Evaluate email practices: Standardize email formatting, content style, links, and sending practices to align with conventional sender guidelines and maintain consistency.

Monitor and customize email lists: Monitor the spam complaint rate and aim to keep it below 0.3%, with an ideal target below 0.1%. Improve list transparency by viewing subscription flows and opt-out processes in email preference centers.

The broader effort to reduce cyber attacks

These measures are not just about adhering to new protocols; they are part of a broader effort by major email providers to distinguish legitimate emails from potentially malicious ones. Email is a common channel for various cyber threats. Phishing attacks, the most common form of cybercrime, abuse users’ trust to obtain sensitive information. With the sophistication of AI, these phishing attempts are becoming more and more convincing, making it challenging for individuals to identify malicious emails. Business Email Compromise (BEC) scams, where attackers pose as company executives or partners, are another major threat, abusing the perceived legitimacy of email communications.

The implementation of email authentication protocols such as DMARC, SPF and DKIM by Google and Yahoo plays a crucial role in combating these threats. These protocols improve the integrity of email communications by ensuring emails come from verified sources, significantly reducing the risk of phishing and BEC attacks. This verification process plays an important role in building trust with the recipient, a crucial factor in the effectiveness of email as a communication tool. Additionally, authenticated emails are less likely to contain malware, protecting users from accidentally downloading malicious content. By securing email channels, these protocols also help protect sensitive data from interception or misuse by cybercriminals.

The introduction of these requirements underlines the need for an industry-wide evolution towards better email security practices. While implementing these protocols can be complex and require some investment, the consequences of non-compliance – including potential data breaches and loss of user trust – are much more serious.

Looking ahead: the future of email security

As we move forward, the continued evolution of AI and its use in cyberattacks will only make robust email security practices even more essential. Organizations of all sizes must recognize the critical nature of email in cybersecurity and take proactive steps to secure their email communications. Google and Yahoo’s efforts are just the beginning of what should be a unified approach to securing digital communications against ever-evolving cyber threats.

The broader effort to reduce email cyberattacks is not just a technical necessity, but a fundamental aspect of maintaining trust in the digital age. The commitment of industry leaders to implement these email authentication protocols is a positive step towards a more secure and reliable digital future.

We have listed the best customer database software.

This article was produced as part of Ny BreakingPro’s Expert Insights channel, where we profile the best and brightest minds in today’s technology industry. The views expressed here are those of the author and are not necessarily those of Ny BreakingPro or Future plc. If you are interested in contributing, you can read more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Related Post