How BIMI Avoids Unauthorized (or Fraudulent) Use of Logos

BIMI

BIMI provides email security that stands for Brand Indicators for Message Identification which displays the brand logo next to authenticated emails and allows the email users to recognize and avoid fraudulent messages. There is a type of email authentication protocol named DMARC (Domain-based Message Authentication Reporting, Reporting & Conformance) that is used to ensure that the organization’s domain has not been spoofed.

BIMI is built on DMARC which is used with SPF and DKIM. DKIM stands for DomainKeys Identified Mail works on cryptography and ensures that the email messages you send are not modified in transit whereas SPF stands for Sender Policy Framework which is a form of email authentication that checks and specifies that the email servers from where they are being sent with their domain originate from a specific IP address.

A BIMI checker is easy to use where your domain name is the input and you get the results instantly.

Although it is not mandatory to use BIMI, it’s a good practice and your domain is protected which gives the users or recipients peace of mind about their messages which are authenticated.

With BIMI security in place, there is no way that cyber-attacks which consist of Phishing, or Spear-Phishing attacks would jeopardise the system. In July 2021, the search giants Google with their Gmail service in place had officially rolled out BIMI for all Gmail inboxes.

Currently, BIMI is supported by the following mailbox providers:

  • Fastmail
  • Proofpoint
  • Verizon Media (Yahoo!, AOL)
  • Google

If the email is legitimate inside an email inbox where a company logo is displayed with the help of a BIMI record which is a type of DNS TXT.

How BIMI works

The organizations which use the BIMI for authentication of their emails have to use Sender Policy Framework (SPF) or Domain Keys Identified Mail (DKIM) and apply DMARC which provides their validated trademark logos to the organization via a Verified Mark Certificate (VMC).  BIMI makes sure that your organization has adopted DMARC, and that you have validated your logo with a VMC. VMCs are being issued by two BIMI-qualified Certification Authorities i.e. DigiCert and Entrust Datacard.

Requirements to join BIMI

There is a brand trust developed with BIMI and to be a part of the BIMI there are the following conditions which need to be met:

•             The recipient’s domain needs to be DMRAC authenticated.

•             The recipient’s owner needs to obtain the right certification.

•             A standing history needs to be maintained.

Frequently Asked Questions (FAQ)

Ques 1. What is BIMI?

Ans 1. BIMI provides email security that stands for Brand Indicators for Message Identification which displays the brand logo next to authenticated emails and allows the email users to recognize and avoid fraudulent messages.

Ques 2. Why it is important to have BIMI?

Ans 2. To protect your brand and consumers from fraudulent messages it is important to have strong email authentication and identification.

Ques 3. What is the BIMI record?

Ans 3.  It is a type of DNS TXT that is used to record and display the band logos within recipients.

Ques 4. What is BIMI Radar?

Ans 4. BIMI Radar is used to track the DMARC readiness and the adoption of BIMI with companies and organizations’ domains worldwide on a daily basis.

Ques 5. How to set up DMRAC?

Ans 5. To understand how to setup DMRAC, you need to click here

Ques 6. How to set up a BIMI txt record?

Ans 6.  To understand how to set up a BIMI txt record, you need to click here

Ques 7. What are the steps to implement BIMI for your emails?

Ans 7. The steps involved in implementing BIMI for the emails are:

1.            Implement SPF and DKIM

2.            Implement DMARC with the enforcement policy

3.            Publish a BIMI record

Ques 8. Which tools are used to check BIMI?

Ans 8. The easiest way to check the BIMI is with a BIMI lookup tool which can be chosen from BIMI Group, MX Toolbox, Agari and Valimail.

Ques 9. To which email providers does BIMI is supported?

Ans 9. BIMI is supported by the following mailbox providers:

•             Fastmail

•             Proofpoint

•             Verizon Media (Yahoo!, AOL)

•             Google

Ques 10. What is the reason for BIMI Logo Not Appearing in Emails?

Ans 10. To make sure that the BIMI logo appears in emails first make sure that you have an enforced DMARC Policy (p=quarantine or p=reject) and for Gmail, make sure you have a valid VMC.

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Cryptocurrency heard a lot but what is it ???

Blockchain

Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

What is SIEM vs SIAM?

SIEM vs SIAM

SIEM: Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.

How do SIEM works?

It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins. 

SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.

By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management system improves investigative efficiency and reduces time wasted on false positives.

The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.

Main features of SIEM

  • Threat Detection
  • Investigation
  • Time to respond

SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Azure vs AWS (Battle for the No.1 Spot)…!!

AWS vs Azure

Day in day out we talk about the cloud and the services provided by them. The market today is led by AWS followed by Azure and catching up are GCP (Google Cloud Platform).

There are around 160+ services provided by AWS and counts are adding up whereas in Azure the services are lesser than AWS but are also getting added up with time.

Let’s have a sneek peek at some of the important services by these market leaders:

AWS EC2 Vs Azure VM

AWS EC2 Instance Vs Azure VM Scale Sets

AWS S3 Vs Azure Blob Storage

AWS Lambda/Fargate Vs Azure Functions

AWS Beanstalk Vs Azure App Service

AWS SQS Vs Azure Queue Storage

AWS ELB (Elastic Load Balancer) Vs Azure Load Balancer

AWS VPN Vs Azure Virtual Network

AWS DynamoDB Vs Azure Cosmos DB

AWS Shield Vs Azure DDoS

AWS RDS Vs Azure SQL DB

AWS Red Shift Vs Azure Synapse Analytics

AWS Rekognition/Lex/Polly/Transcribe Vs Azure Cognitive Service

For more information on the above AWS services, click here

For more information on the above Azure services, click here

We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.

We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to info@doctoolss.com or contact the undersigned .

DocTooLss

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Let’s Dig Down in AWS…!!

EC2 by AWS

As we know that there are many services which are offered by AWS , lets pick few and try to understand their usage and utility it has for us:

AWS EC 2 (Virtual Servers on Cloud)

  • EC2 stands for Elastic Compute Cloud
  • It is one of the most famous offerings by AWS
  • It is a IaaS platform
  • It is basically renting of VMs
  • Storing data on Virtual Drives (EBS , ELB) and Distributing load across machines
  • Scaling of service using an auto-scaling group (ASG)

There are wide variety of Amazon EC2 Instance types comprise varying combinations of CPU, memory, storage, and networking capacity that gives you the flexibility to choose the appropriate mix of resources for your applications.

Each instance type includes one or more instance sizes, allow you to scale your resources either up or down and in or out to the requirements of your target workload.

Types of EC2 Instance Types

  • General Purpose
  • Memory Optimized
  • Compute Optimized
  • Accelerated Computing
  • Storage Optimized
InstancevCPU*CPU Credits / hourMem (GiB) StorageNetwork Performance
t2.nano130.5EBS-OnlyLow
t2.micro161EBS-OnlyLow to Moderate
t2.small1122EBS-OnlyLow to Moderate
t2.medium2244EBS-OnlyLow to Moderate
t2.large2368EBS-OnlyLow to Moderate
t2.xlarge45416EBS-OnlyModerate
t2.2xlarge88132EBS-OnlyModerate

T2 instances – General Purpose Instance

Source: AWS Website , for more information, click here

EC2 Purchase Options

  • On-Demand Instance
  • Reserved Instance, Convertible Instance and Scheduled Reserve Instance
  • Spot Instance
  • Dedicated Hosts and Dedicated Instance

For more information on these, contact the undersigned

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What we know about IoT Security?

IoT Security

What is Internet of Things (IoT)?

We read a lot about IoT, but not clear what exactly it means, although we know about its definition so here we explain in simple terms. IoT is basically connecting of computing devices, mechanical, digital machines, objects, and people with one another. Ex: wirelessly connecting devices such as smart speakers i.e. our very own Amazon Alexa or Google Home, smart TVs, Apple Watch, internet-connected baby monitors, video doorbells, and even toys, CCTV camera’s controlled by smartphones.

What is IoT Security?

The technology that is concerned with safeguarding the connected devices and networks in the internet of things (IoT).

What is the difference between IoT and AI?

 IoT is a concept based on the idea of everyday physical objects with the ability to communicate directly over the InternetArtificial Intelligence (AI), on the other hand, is an area of computer science to create machines to do intelligent things the way humans do, or possibly even better.

Source: Wikipedia

How to safeguard our IoT from the breachers or attackers?

There are sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted.

  • Security of Things Platform by Mocana
  • IoT Gateway Security by Intel
  • The Forescout Platform by Forescout Technologies
  • Armis Platform by Armis
  • Enhanced Infrastructure Protection by Intel
  • Beacon by Great Bay Software

Source: Gartner

There are many more vendors, for more information on this, please click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What are the emerging Technologies Road Map for the year 2019-21..?

With the emerging outbreaks of the pandemic COVID19 the world has come to a standstill. Due to this, there has been a disconnect between cybersecurity executive and their organization’s security analysts.

There was a study done by the research giants Gartner who in consultation with the leaders have come up with the Road Map for the year 2019-21.

If we see the road map and concentrate on Cloud and CyberSecurity technologies:

Security

As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .

We at DocToolss have often talked about Endpoint Detection and Response (EDR) , Virtualized Firewalls. The terms which we will be further talking about in our future blogs would be Statis Application Security Testing (SAST), Threat Intelligence Services, Network Sandboxing, User and Entry Behaviour Analytics, Signature Endpoint Detection or Protection and Database Audit and Protection etc.

If we further drive deep in the Road map curves, we will find out about cloud technology though we haven’t talked about it much in our past blogs but will plan to do it in our future blogs.

Cloud Technology

As we go down the map we realize the four phases “Monitoring”, “In Planning” , In Pilot and “In Deployment” .

The PaaS technology which has been categorized under “In Deployment” phase has already been talked about in our past blogs, you can click here to know more.

Further technologies terms would be explained in our future blogs, or if there is anything which you want us to explain or to drive in, we will always be happy to hear from you.

The inputs for this blogs has been taken from Gartner website, for more information on this, click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What is Vulnerability Management?

Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a system. There are tools that are used to identify Cyber Exposure risks across an entire organization, and aligns them with your operational goals and objectives.

In cyberseuirty terms there are some important good to know what vulnerabilities, threats, and exploits mean:

  • Cybersecurity Vulnerabilities. A vulnerability is a potential weakness in a security architecture that opens an organization or individual to cyberattacks.
  • Cybersecurity Threats. “Cybersecurity threat” refers to a combination of tools and methods involved in a cyberattack. These threats are not inherent to the network. Instead, they leverage vulnerabilities on the network.
  • Cybersecurity Exploits. Exploits are those when a cybersecurity threat is applied to a vulnerability to conduct some form of malicious activity. Impacts of these exploits may vary by threat and vulnerability type.

LifeCycle of VM

Find below the phases of the Vulnerability Management Lifecycle:

PHASE 1 – The Cloud Platform that provides multiple technologies, including scanner appliances, agents, sensors, and connectors to help you detect and discover both on-premise and cloud-based host assets.

PHASE 2 – The scanners, agents, sensors, and connectors work together to identify host assets throughout your entire enterprise architecture.

PHASE 3 – The primary objective of the assessment phase is to find vulnerabilities on the host assets in your VM subscription.

PHASE 4 – Regardless of the data collection techniques you use, all findings are securely stored in the Cloud Platform, where reporting tools and features allow you to identify the vulnerabilities that pose the greatest risk to your organization, and share these findings with your patch and operational teams.

PHASE 5 – The remediation tools and features built-in to the VM application, will help you to prioritize detected vulnerabilities and identify the vulnerabilities that have been successfully mitigated.

PHASE 6 – Verify any vulnerabilities that have been patched or fixed. This task is performed automatically every time a scanner appliance, agent or sensor provides new assessment data to the Cloud Platform.

Note: The above information on VM lifecycle has been taken from Qualys Training sites, for more information , please click here.

To know more about VM or its best practices please connect with us below.

We make Technology Eazy via Docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What is MS Intune?

MS Intune is a cloud-based management solution which provides mobile and OS device management.

To give you an example of MS intune, as in when you download any application from a play store whether it is a Google or Apple iOS, there are applications which doesn’t allow you to do some activities ex: taking screenshots these are blocked by some background applications which are also downloaded along with your main application, because of security. MS In tune is downloaded to secure your official data as if incase you lost your device the same data could be erased through in tune before your data gets in the hands of an attacker.

Lets understand some best practices to be followed, when using MS intune:

  • Create security groups for Intune deployment rings
  • Configure Windows 10 software update rings
  • Setup Office 365 apps deployment for Windows 10
  • Setup App protection policies
  • Create Company terms and conditions
  • Customize Company Portal branding
  • Configure Device clean-up rules on a weekly/monthly time frame
  • Configure Apple MDM push certificates
  • Setup Device Configuration profiles

Intune Deployment Rings

Create a basic group using the Azure Active Directory (Azure AD) portal, a basic group is added to a single resource by the resource owner (administrator) and includes specific members (employees) that need to access that resource.

Windows 10 software update rings

The MDM’s should be updated with the latest software of windows to secure it from any cyberattacks.

Setup App protection policies

Create and assign Microsoft Intune app protection policies (APP) for users of your organization. App protection policies can apply to apps running on devices that may or may not be managed by Intune.

Company terms and conditions

As an Intune admin, you must require that users accept your company’s terms and conditions before using the Company’s Portal

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started