Prevention
How not to get phished âđ

1. Overview
There are some protections in place to do this. In addition, company usually has procedure to deal with this. That said, prevention is still hard and requires afforts (a lots)
2. Description
2.1 Protections
- SPF - a published list of servers that are authorized to send email on behalf of a domain
v=spf1 include:spf.protection.outlook.com -all
v=spf1: the spf check version
- only microsoft 365/exchange online server are authorized to send email
- DKIM - a tamper-evident domain seal associated with a piece of email), to the content of an email
- DMARC use SPF and DMIM to protect domain. For example:
v=DMARC1; p=quarantine; fo=1
- This is telling the receiving server to flag the mail if it fails the underlying checks (either SPF or DKIM)
- Secure/Multipurpose Internet Mail Extensions (S/MIME) - public key encryption + digtal signature + certificate (Alice & Bob)
Short Summary - SPF, DKIM, and DMARC are the three pillars of email authentication designed to combat spoofing and phishing. SPF verifies that the sending serverâs IP address is authorized by the domain owner. DKIM uses a cryptographic signature to verify that the message content has not been altered in transit. Finally, DMARC ties SPF and DKIM together to enforce a policyâtelling the receiving server whether to accept, quarantine, or reject emails that fail both checks, thereby protecting a brandâs reputation and its users from phishing.
2.2 How is it done in Organization?
This section is from TryHackMe.Shout out to them putting everything together!
2.3 Technical Defenses
- Email Filtering:Â Provides filtering based on IP and domain reputation, allowing for blocking or quarantining of suspicious messages.
- Secure Email Gateways (SEGs): Scan messages to detect impersonation attempts, spoofing, and other phishing techniques that other filters might miss.
- Link Rewriting: Replaces suspicious or unknown URLs with safe, redirected ones, giving the system time to scan and verify the link.
- Sandboxing: Isolates and tests suspicious links or attachments in a secure, virtual environment to check for malicious behavior.
To Users
- Trust & Warning Indicators: Modern email platforms display visual cues to help users understand if a message is safe. A banner may read âExternal Sender,â âSuspicious Link,â or signify that a message is from a trusted organization or sender.Â
- Phishing Reporting: Easy, in-email reporting options that let users quickly report suspicious messages.
- User Awareness Training: Train employees on identifying phishing attempts, social engineering tactics, and safe email practices.
- Phishing Simulation Exercises: Run controlled phishing campaigns to test and reinforce employee training.
last modified: 2025-12-12