Google has introduced new security requirements for mass mailers

Google and Yahoo, two major Big Tech email providers . Will require bulk senders who send more than 5,000 emails per day to deploy additional security measures to prevent abuse. Reduce spam, and stop phishing attacks. This is surprising because the technology itself is not new. These security measures are a good move, but none of these technologies are new. Hopefully, these new requirements will push other companies to improve their email security configuration.

Google has announced that they will begin enforcing stricter security measures for .  All accounts that send more than 5,000 emails per day to individual Gmail users. The change  Betting Data is an attempt by the big tech email . Provider to combat phishing and spam targeting users of its Gmail service. Gmail is the world’s most popular email provider and a leading source of spam worldwide. As part of these new measures. They will require so-called “bulk senders” to implement previously optional security settings for their custom domain email addresses. These settings include DMARC, SPF, and DKIM, and as of 2019, they will be mandatory for Tuta custom domain users to enable these security settings.

In the following article, we’ll explore what these acronyms mean and how they can protect custom email domain addresses from being misused for spam or phishing.

These include

New safety standards

Together, the new security requirements introduced by Google offer a different approach to ensuring email authenticity. As with anything in IT, there are a few acronyms to unpack and interpret. Of note, these standards apply to custom domain addresses used by bulk senders who want to send email to Gmail users.

DMARC: Domain-based Message Authentication, Reporting, and Conformance

DMARC stands for Domain-based Message  ASB Directory Authentication, Reporting, and Conformance. It is an email authentication protocol that allows custom domain users to prevent others from using their domains without permission. When fraudsters send emails pretending to be local businesses, this behavior is called “email spoofing”, and DMARC adds an extra check to prevent this behavior. After adding a DMARC entry in the DNS settings panel of your domain provider, email servers that receive emails from this custom domain can verify the emails according to the instructions set by the custom domain owner. If the check passes, the email can be sent; if the check fails, the email is rejected according to the configured rules of the domain owner.

DMARC acts as a rule maker, deciding what actions to take when SPF and DKIM checks do not pass correctly.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top