How BIMI Avoids Unauthorized (or Fraudulent) Use of Logos


BIMI provides email security that stands for Brand Indicators for Message Identification which displays the brand logo next to authenticated emails and allows the email users to recognize and avoid fraudulent messages. There is a type of email authentication protocol named DMARC (Domain-based Message Authentication Reporting, Reporting & Conformance) that is used to ensure that the organization’s domain has not been spoofed.

BIMI is built on DMARC which is used with SPF and DKIM. DKIM stands for DomainKeys Identified Mail works on cryptography and ensures that the email messages you send are not modified in transit whereas SPF stands for Sender Policy Framework which is a form of email authentication that checks and specifies that the email servers from where they are being sent with their domain originate from a specific IP address.

A BIMI checker is easy to use where your domain name is the input and you get the results instantly.

Although it is not mandatory to use BIMI, it’s a good practice and your domain is protected which gives the users or recipients peace of mind about their messages which are authenticated.

With BIMI security in place, there is no way that cyber-attacks which consist of Phishing, or Spear-Phishing attacks would jeopardise the system. In July 2021, the search giants Google with their Gmail service in place had officially rolled out BIMI for all Gmail inboxes.

Currently, BIMI is supported by the following mailbox providers:

  • Fastmail
  • Proofpoint
  • Verizon Media (Yahoo!, AOL)
  • Google

If the email is legitimate inside an email inbox where a company logo is displayed with the help of a BIMI record which is a type of DNS TXT.

How BIMI works

The organizations which use the BIMI for authentication of their emails have to use Sender Policy Framework (SPF) or Domain Keys Identified Mail (DKIM) and apply DMARC which provides their validated trademark logos to the organization via a Verified Mark Certificate (VMC).  BIMI makes sure that your organization has adopted DMARC, and that you have validated your logo with a VMC. VMCs are being issued by two BIMI-qualified Certification Authorities i.e. DigiCert and Entrust Datacard.

Requirements to join BIMI

There is a brand trust developed with BIMI and to be a part of the BIMI there are the following conditions which need to be met:

•             The recipient’s domain needs to be DMRAC authenticated.

•             The recipient’s owner needs to obtain the right certification.

•             A standing history needs to be maintained.

Frequently Asked Questions (FAQ)

Ques 1. What is BIMI?

Ans 1. BIMI provides email security that stands for Brand Indicators for Message Identification which displays the brand logo next to authenticated emails and allows the email users to recognize and avoid fraudulent messages.

Ques 2. Why it is important to have BIMI?

Ans 2. To protect your brand and consumers from fraudulent messages it is important to have strong email authentication and identification.

Ques 3. What is the BIMI record?

Ans 3.  It is a type of DNS TXT that is used to record and display the band logos within recipients.

Ques 4. What is BIMI Radar?

Ans 4. BIMI Radar is used to track the DMARC readiness and the adoption of BIMI with companies and organizations’ domains worldwide on a daily basis.

Ques 5. How to set up DMRAC?

Ans 5. To understand how to setup DMRAC, you need to click here

Ques 6. How to set up a BIMI txt record?

Ans 6.  To understand how to set up a BIMI txt record, you need to click here

Ques 7. What are the steps to implement BIMI for your emails?

Ans 7. The steps involved in implementing BIMI for the emails are:

1.            Implement SPF and DKIM

2.            Implement DMARC with the enforcement policy

3.            Publish a BIMI record

Ques 8. Which tools are used to check BIMI?

Ans 8. The easiest way to check the BIMI is with a BIMI lookup tool which can be chosen from BIMI Group, MX Toolbox, Agari and Valimail.

Ques 9. To which email providers does BIMI is supported?

Ans 9. BIMI is supported by the following mailbox providers:

•             Fastmail

•             Proofpoint

•             Verizon Media (Yahoo!, AOL)

•             Google

Ques 10. What is the reason for BIMI Logo Not Appearing in Emails?

Ans 10. To make sure that the BIMI logo appears in emails first make sure that you have an enforced DMARC Policy (p=quarantine or p=reject) and for Gmail, make sure you have a valid VMC.

If you want to more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Cryptocurrency heard a lot but what is it ???


Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin: | WordPress:

Cyber Strategies in the New Normal

We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write this blog many would be working from home and some who have joined their work task force are trying to adjust the new normal.

This year where not even the IT officials but the students or kids are attending their classes from home. Since everyone is working from home there has been an increase in bandwidth and data utilization around the globe.

The organization which has a business continuity plan ready had a smooth transformation to work from the environment without any hindrances it was proved that CS having a foresight had an efficient way for the organization. A new area of cyber is cyber innovation, risk is mitigated risk is all about taking a risk. Cyber innovation is an area to look at. 

As per Gartner, there are five principles:
  • Continuous adaptive risk and trust assessment based on agility.
  • Secure DevOps
  • Replace the one-time security gate
  • Put the continuous security pro-actively 
  • Build the architecture with security, not with silos 

The average knowledge about cyber-attack prevention is deficient. Yes, cybercriminals are getting better all the time. But if we become proactive in our approach instead of reactive, they can be pushed back continually and hopefully sit mostly on the drawing board!

There is some positive aspect of COVID 19, that it has helped companies to identify that employees to work from their living room, whereas lots of expenditure has been spent on companies infrastructure. Even our environment which has been polluted has been saved by not using the vehicles on a daily basis. 

So, things to keep in mind during this pandemic is to secure your computer systems and wear a mask to protect yourself and others around you.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Linkedin:

What we know about IoT Security?

IoT Security

What is Internet of Things (IoT)?

We read a lot about IoT, but not clear what exactly it means, although we know about its definition so here we explain in simple terms. IoT is basically connecting of computing devices, mechanical, digital machines, objects, and people with one another. Ex: wirelessly connecting devices such as smart speakers i.e. our very own Amazon Alexa or Google Home, smart TVs, Apple Watch, internet-connected baby monitors, video doorbells, and even toys, CCTV camera’s controlled by smartphones.

What is IoT Security?

The technology that is concerned with safeguarding the connected devices and networks in the internet of things (IoT).

What is the difference between IoT and AI?

 IoT is a concept based on the idea of everyday physical objects with the ability to communicate directly over the InternetArtificial Intelligence (AI), on the other hand, is an area of computer science to create machines to do intelligent things the way humans do, or possibly even better.

Source: Wikipedia

How to safeguard our IoT from the breachers or attackers?

There are sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted.

  • Security of Things Platform by Mocana
  • IoT Gateway Security by Intel
  • The Forescout Platform by Forescout Technologies
  • Armis Platform by Armis
  • Enhanced Infrastructure Protection by Intel
  • Beacon by Great Bay Software

Source: Gartner

There are many more vendors, for more information on this, please click here.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

What is Vulnerability Management?

Vulnerability management (VM) which is a program that consists of a variety of technologies that identify, evaluates, treats, and reports on security vulnerabilities in a system. There are tools that are used to identify Cyber Exposure risks across an entire organization, and aligns them with your operational goals and objectives.

In cyberseuirty terms there are some important good to know what vulnerabilities, threats, and exploits mean:

  • Cybersecurity Vulnerabilities. A vulnerability is a potential weakness in a security architecture that opens an organization or individual to cyberattacks.
  • Cybersecurity Threats. “Cybersecurity threat” refers to a combination of tools and methods involved in a cyberattack. These threats are not inherent to the network. Instead, they leverage vulnerabilities on the network.
  • Cybersecurity Exploits. Exploits are those when a cybersecurity threat is applied to a vulnerability to conduct some form of malicious activity. Impacts of these exploits may vary by threat and vulnerability type.

LifeCycle of VM

Find below the phases of the Vulnerability Management Lifecycle:

PHASE 1 – The Cloud Platform that provides multiple technologies, including scanner appliances, agents, sensors, and connectors to help you detect and discover both on-premise and cloud-based host assets.

PHASE 2 – The scanners, agents, sensors, and connectors work together to identify host assets throughout your entire enterprise architecture.

PHASE 3 – The primary objective of the assessment phase is to find vulnerabilities on the host assets in your VM subscription.

PHASE 4 – Regardless of the data collection techniques you use, all findings are securely stored in the Cloud Platform, where reporting tools and features allow you to identify the vulnerabilities that pose the greatest risk to your organization, and share these findings with your patch and operational teams.

PHASE 5 – The remediation tools and features built-in to the VM application, will help you to prioritize detected vulnerabilities and identify the vulnerabilities that have been successfully mitigated.

PHASE 6 – Verify any vulnerabilities that have been patched or fixed. This task is performed automatically every time a scanner appliance, agent or sensor provides new assessment data to the Cloud Platform.

Note: The above information on VM lifecycle has been taken from Qualys Training sites, for more information , please click here.

To know more about VM or its best practices please connect with us below.

We make Technology Eazy via Docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

What is an Endpoint Security?

Endpoint Security

Endpoints to the generic audience it would be meaning that something which is connected at the end of something as if we are talking about at the end of a land shore .

So basically an endpoint are the end-user devices such as desktops, laptops, and mobile devices which need to be secured from the exploits by an malicious actors. Endpoint security is the practice of securing the entry points of the end-user devices.

To give you a more clearer picture check out the diagram below:

API Architecture

To understand the working of this API Architecture, you could checkout my earlier blogs on this link

So here I would like to tell you about the end-users which are the applications or the laptops/desktops/smartphones used by the users like us starting from the Web servers > Internet Platform > Systems/machines on which we work, this is how it works at the background.

The security related to the endpoint is the prime concern as the antivirus softwares provides comprehensive protection from sophisticated malware and evolving zero-day threats. As today endpoint protection systems are designed to quickly detect, analyze, block, and contain attacks in progress.

There are endpoint security providers by BlueCoat Proxy, Cylance End Point Security and many others in the market. To know more about the best practices or to understand the technology contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website:| Tumblr: | Facebook: | Medium:

What is MS Intune?

MS Intune is a cloud-based management solution which provides mobile and OS device management.

To give you an example of MS intune, as in when you download any application from a play store whether it is a Google or Apple iOS, there are applications which doesn’t allow you to do some activities ex: taking screenshots these are blocked by some background applications which are also downloaded along with your main application, because of security. MS In tune is downloaded to secure your official data as if incase you lost your device the same data could be erased through in tune before your data gets in the hands of an attacker.

Lets understand some best practices to be followed, when using MS intune:

  • Create security groups for Intune deployment rings
  • Configure Windows 10 software update rings
  • Setup Office 365 apps deployment for Windows 10
  • Setup App protection policies
  • Create Company terms and conditions
  • Customize Company Portal branding
  • Configure Device clean-up rules on a weekly/monthly time frame
  • Configure Apple MDM push certificates
  • Setup Device Configuration profiles

Intune Deployment Rings

Create a basic group using the Azure Active Directory (Azure AD) portal, a basic group is added to a single resource by the resource owner (administrator) and includes specific members (employees) that need to access that resource.

Windows 10 software update rings

The MDM’s should be updated with the latest software of windows to secure it from any cyberattacks.

Setup App protection policies

Create and assign Microsoft Intune app protection policies (APP) for users of your organization. App protection policies can apply to apps running on devices that may or may not be managed by Intune.

Company terms and conditions

As an Intune admin, you must require that users accept your company’s terms and conditions before using the Company’s Portal

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: | Website: | Facebook:

Website Built with

Up ↑

Create your website with
Get started