Email Security Blog

Surprising Information About Your Email Channel

Agari November 12, 2014 Email Security
Fallback Featured Image

The Four Senders of Your Domain’s Email Channel

Imagine you are networking at a cocktail party. While there, you find out that someone at the party is handing out business cards with your name and company logo on them. You have no clue who this person is or what their intentions are. Are they maliciously trying to ruin your reputation or is this some kind of awkward misunderstanding? Luckily, in real life, you could just walk up, confront the individual and find out what’s going on. When the same thing happens online with your company’s email domain, it’s not always as easy to figure out that it’s happening and what to do about it.

Many companies assume that they are the sole users of their own email domain for corporate, marketing and transactional communication – this is almost never the case. There are four main groups of senders that generally use (or abuse) your company’s email domain: your employees & applications using your own email infrastructure, your contracted 3rd party services, benign “forwarders” and, of course, malicious cybercriminals. Do you know how many of each is sending email on your company’s behalf? Do you know what they are saying using your brand and identity? How many of these senders are legitimate and how many are malicious? The answers may surprise you.

True visibility into your email channel is important no matter the size of your company. Whether your company is a Fortune 500 or a scrappy start up, the fact is that when you have different people and departments within the company acting autonomously, you will pretty quickly lose sight of services that are using your domain. In the cocktail party that is the Internet, it’s good to know who’s going around handing out a virtual business card with your company’s logo.

Later this week we will kick off our series on “The Four Types of Senders”  starting with the group you might think is the easiest and most likely to be legitimate- the people and services sending from within your corporate infrastructure.

Stay tuned!

Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

May 9, 2019 Patrick Peterson

Current Email Architecture Transformation Raises the Bar for Security

Enterprise email architecture is evolving, which is good new for cybercriminals. Legacy secure email gateways…

Agari Blog Image

May 2, 2019 Armen Najarian

Agari Research Finds 2020 Presidential Campaigns Vulnerable to Next-Gen Phishing Attacks

The type of email attacks that helped derail Hillary Clinton’s presidential bid during the 2016…

Agari Blog Image

April 30, 2019 Patrick Peterson

2020 Presidential Campaigns Susceptible to Nation-State Email Attacks—Agari Can Help

Three years ago, Russian operatives spear phished the email account of Hillary Clinton's campaign chairman…

Agari Blog Image

April 11, 2019 Raymond Lim

Beware of Phishing Attacks as Tax Day Looms Closer

The April 15th deadline to file taxes in the United States is almost here, which…

Agari Blog Image

March 13, 2019 Ernest Yuen

W-2 Scams Likely to Continue as Driver for Phishing Attacks in 2019

With the 2019 tax season reaching full throttle, a volatile mix of conditions could fuel…

mobile image