<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Email Security Setup Guides on SolCyber Knowledgebase</title><link>https://kb.solcyber.com/email-security-setup-guides/</link><description>Recent content in Email Security Setup Guides on SolCyber Knowledgebase</description><generator>Hugo</generator><language>en</language><atom:link href="https://kb.solcyber.com/email-security-setup-guides/index.xml" rel="self" type="application/rss+xml"/><item><title>Guide to DMARC, DKIM, and SPF</title><link>https://kb.solcyber.com/email-security-setup-guides/guide-to-dmarc-dkim-and-spf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/guide-to-dmarc-dkim-and-spf/</guid><description>&lt;p&gt;This article aims to provide a complete guide to implementing SPF, DKIM, and DMARC for your organization, and suggest the best practices for doing so. It is written in hopes that this will clear up confusion about what steps to take to achieve an effective DMARC deployment to secure business email and improve email deliverability.&lt;/p&gt;
&lt;p&gt;A quick rundown on benefits of implementing SPF, DKIM, and DMARC:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;stops email spoofing/phishing from your domain;&lt;/li&gt;
&lt;li&gt;provides important information about the emails you sent, which can be used get all legitimate emails properly authenticated;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/why-are-my-emails-going-to-spam-junk-instead-of-inbox-check-dmarc"&gt;improves sender reputation and email deliverability&lt;/a&gt;; your legitimate emails are more likely to reach the inbox.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Target audience: marketers, brand owners, domain owners, domain administrators, IT administrators, etc. and anyone who wants to prevent attackers from sending malicious emails using their domains.&lt;/p&gt;</description></item><item><title>O365 Email Security Deployment and Configuration Guide</title><link>https://kb.solcyber.com/email-security-setup-guides/o365-email-security-deployment-and-configuration-guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/o365-email-security-deployment-and-configuration-guide/</guid><description>&lt;p&gt;Phishing is the root cause of 95% of security breaches that lead to financial loss and brand damage. SolCyber uses Cloudflare Email Security (&lt;em&gt;formerly Area1&lt;/em&gt;), a cloud based service that stops phishing attacks, the #1 cybersecurity threat, across all traffic vectors - email, web and network.&lt;/p&gt;
&lt;p&gt;With globally distributed sensors &amp;amp; comprehensive attack analytics, Cloudflare Email Security proactively identifies phishing campaigns, attacker infrastructure, and attack delivery mechanisms during the earliest stages of a phishing attack cycle. Using flexible enforcement platforms, Cloudflare Email Security allows customers to take preemptive action against these targeted phishing attacks across all vectors - email, web and network; either at the edge or in the cloud.&lt;/p&gt;</description></item><item><title>Google Workspace Email Security Deployment and Configuration Guide</title><link>https://kb.solcyber.com/email-security-setup-guides/google-workspace-email-security-deployment-and-configuration-guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/google-workspace-email-security-deployment-and-configuration-guide/</guid><description>&lt;p&gt;Phishing is the root cause of 95% of security breaches that lead to financial loss and brand damage. SolCyber uses Cloudflare Email Security (&lt;em&gt;formerly Area1&lt;/em&gt;), a cloud based service that stops phishing attacks, the #1 cybersecurity threat, across all traffic vectors - email, web and network.&lt;/p&gt;
&lt;p&gt;With globally distributed sensors &amp;amp; comprehensive attack analytics, Cloudflare Email Security proactively identifies phishing campaigns, attacker infrastructure, and attack delivery mechanisms during the earliest stages of a phishing attack cycle. Using flexible enforcement platforms, Cloudflare Email Security allows customers to take preemptive action against these targeted phishing attacks across all vectors - email, web and network; either at the edge or in the cloud.&lt;/p&gt;</description></item><item><title>PhishArm Button Deployment: Office365</title><link>https://kb.solcyber.com/email-security-setup-guides/phisharm-button-deployment-office365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/phisharm-button-deployment-office365/</guid><description>&lt;p&gt;The PhishArm button (provided by Right-Hand Cybersecurity) is used to report suspicious email directly to the SolCyber SOC. The reported email will be sent as an attachment to the SolCyber SOC. The email will also be moved to the user&amp;rsquo;s junk folder.&lt;/p&gt;
&lt;h2 id="admin-configuration"&gt;Admin Configuration&lt;a class="anchor" href="#admin-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Login to your domain &lt;strong&gt;Admin center&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt; - Click &lt;strong&gt;Integrated Apps&lt;/strong&gt; and Choose &lt;strong&gt;Upload Custom apps&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/Screenshot_2021-03-24_at_4.48.37_PM%20%281%29.png" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Under &lt;strong&gt;Deploy New App&lt;/strong&gt; select &lt;strong&gt;Choose how to upload app&lt;/strong&gt; Upload manifest File(.xml) provided to you by SolCyber.&lt;/p&gt;</description></item><item><title>PhishArm Add-in Deployment: Google Workspace</title><link>https://kb.solcyber.com/email-security-setup-guides/phisharm-add-in-deployment-google-workspace/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/phisharm-add-in-deployment-google-workspace/</guid><description>&lt;p&gt;The PhishArm plug-in (provided by Right-Hand Cybersecurity) is used to report suspicious email directly to the SolCyber SOC. The reported email will be sent as an attachment to the SolCyber SOC. The email will also be moved to the user&amp;rsquo;s spam folder.&lt;/p&gt;
&lt;h2 id="install-phisharm-plug-in-for-entire-domain-or-specific-ous"&gt;Install Phisharm Plug-in For Entire Domain (or specific OUs)&lt;a class="anchor" href="#install-phisharm-plug-in-for-entire-domain-or-specific-ous"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the &lt;a href="https://admin.google.com"&gt;Google Workspace Admin portal&lt;/a&gt;. In the left-hand menu, click &lt;strong&gt;Apps &amp;gt; Google Workspace Marketplace Apps &amp;gt; Apps List.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Utilizing the BEC List</title><link>https://kb.solcyber.com/email-security-setup-guides/utilizing-the-bec-list/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/utilizing-the-bec-list/</guid><description>&lt;p&gt;Area1&amp;rsquo;s BEC (Business Email Compromise) list provides an additional layer of security to complement your email protection measures protects against these attacks by adding an attribute to any spoofed email messages matching the email addresses you provide. It serves as a valuable tool in identifying potential attackers attempting to impersonate high-level executives within an organization, with the intention of triggering malicious actions.&lt;/p&gt;
&lt;h2 id="what-is-business-email-compromise"&gt;What is Business Email Compromise?&lt;a class="anchor" href="#what-is-business-email-compromise"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;BEC emails are a major concern for most companies, as they employ sophisticated phishing techniques that &lt;strong&gt;do not rely on typical indicators of malicious messages such as links or attachments&lt;/strong&gt;. Instead, these emails &lt;strong&gt;exploit the power dynamics within a company by using the names of key individuals, esteemed customers, and even board members to deceive employees into carrying out fraudulent activities&lt;/strong&gt;, such as unauthorized money transfers.&lt;/p&gt;</description></item><item><title>Text Add-Ons for Spoofs</title><link>https://kb.solcyber.com/email-security-setup-guides/text-add-ons-for-spoofs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/text-add-ons-for-spoofs/</guid><description>&lt;p&gt;Sometimes, emails identified as suspicious can be legitimate. This is a common case for emails that are flagged as a &lt;strong&gt;SPOOF&lt;/strong&gt;. SolCyber does not quarantine emails labeled as &amp;ldquo;SPOOF&amp;rdquo;, however, we do recommend that customers add an extra layer of protection by enabling an optional add-on.&lt;/p&gt;
&lt;p&gt;These text add-ons display in the subject and/or body of an email when a user receives an email that has been determined to be a “classic” SPOOF by Area1. &lt;/p&gt;</description></item></channel></rss>