What is DMARC and how to set up a DMARC record?

What is DMARC and how to set up a DMARC record?

  • E-Mail security

How can you spot fraudulent emails if they use a known sender name and look like familiar newsletters or service emails? One way is to use the DMARC verification protocol, which triggers appropriate measures if an email doesn’t pass certain checks. In this article we explain how DMARC can give you an early warning about possible misuse of your sender name.

What is DMARC and how to set up a DMARC record?
Outlook spam filter: How to set it up, customize it and check the junk filter

Outlook spam filter: How to set it up, customize it and check the junk filter

  • E-Mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: How to set it up, customize it and check the junk filter
What is email encryption and how does is work

What is email encryption and how does is work

  • E-Mail security

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection…

What is email encryption and how does is work
What is email whitelisting and how to create an email whitelist

What is email whitelisting and how to create an email whitelist

  • E-Mail security

What is an allowlist and how can allowlisting help you have more smooth email communication? Formerly known as email whitelisting, allowlisting uses a curated list of permitted senders to prevent dangerous or unwelcome content from entering your inbox. How do you create such a list? Keep reading to find out.

What is email whitelisting and how to create an email whitelist
What does spear phishing mean? Definition, example and protection

What does spear phishing mean? Definition, example and protection

  • E-Mail security

Internet users are constantly the target of cyberattacks. Most attacks are easy to fend off, but a new form of scam has proven to be especially dangerous. Spear phishing messages don’t contain absurd claims or bad spelling. These deceitful messages target specific individuals and look frighteningly real. How do these attacks work?

What does spear phishing mean? Definition, example and protection
How to protect your website email address from spam

How to protect your website email address from spam

  • E-Mail security

Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address.

How to protect your website email address from spam
How to recognize phishing e-mails and protect your data

How to recognize phishing e-mails and protect your data

  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to recognize phishing e-mails and protect your data
How to change password in Outlook for mail accounts, data files, and in the web app

How to change password in Outlook for mail accounts, data files, and in the web app

  • E-Mail security

Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But…

How to change password in Outlook for mail accounts, data files, and in the web app
What is a DKIM record and how to create a DKIM record?

What is a DKIM record and how to create a DKIM record?

  • E-Mail security

Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?

What is a DKIM record and how to create a DKIM record?
How to recognize spam e-mails and how to prevent them

How to recognize spam e-mails and how to prevent them

  • E-Mail security

Billions of spam e-mails are sent daily. These annoying messages cost time and get on your nerves, especially when malware finds its way onto your computer or private data falls into the wrong hands. Just a few small tricks and a bit of caution when dealing with e-mails can remedy the situation.

How to recognize spam e-mails and how to prevent them
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.