{"id":3946,"date":"2024-12-09T22:05:42","date_gmt":"2024-12-09T19:05:42","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=3946"},"modified":"2024-12-09T22:57:58","modified_gmt":"2024-12-09T19:57:58","slug":"dmarc-spf-and-dkim-the-foundations-of-email-authentication","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/","title":{"rendered":"DMARC, SPF, and DKIM: The Foundations of Email Authentication"},"content":{"rendered":"<p>Email remains one of the most vital communication tools for businesses and individuals. Unfortunately, it\u2019s also a favorite attack vector for cybercriminals, with phishing, spoofing, and email fraud becoming increasingly common. To combat these threats, businesses must implement robust email authentication protocols. Three key technologies\u2014DMARC, SPF, and DKIM\u2014form the backbone of modern email authentication. Let\u2019s explore what they are, how they work, and why they\u2019re crucial for your organization\u2019s security.<\/p>\n<p>READ ALSO: <a title=\"Email Authentication: The Ultimate Anti-Phishing Solution\" href=\"https:\/\/mailsafi.com\/blog\/email-authentication-the-anti-phishing-solution\/\" rel=\"bookmark\">Email Authentication: The Ultimate Anti-Phishing Solution<\/a><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69f180de8a970\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69f180de8a970\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Understanding_Email_Authentication\" title=\"Understanding Email Authentication\">Understanding Email Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#What_is_SPF_Sender_Policy_Framework\" title=\"What is SPF (Sender Policy Framework)?\">What is SPF (Sender Policy Framework)?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#How_SPF_Works\" title=\"How SPF Works\">How SPF Works<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Benefits_of_SPF\" title=\"Benefits of SPF\">Benefits of SPF<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Limitations_of_SPF\" title=\"Limitations of SPF\">Limitations of SPF<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#What_is_DKIM_DomainKeys_Identified_Mail\" title=\"What is DKIM (DomainKeys Identified Mail)?\">What is DKIM (DomainKeys Identified Mail)?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#How_DKIM_Works\" title=\"How DKIM Works\">How DKIM Works<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Benefits_of_DKIM\" title=\"Benefits of DKIM\">Benefits of DKIM<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#What_is_DMARC_Domain-based_Message_Authentication_Reporting_and_Conformance\" title=\"What is DMARC (Domain-based Message Authentication, Reporting, and Conformance)?\">What is DMARC (Domain-based Message Authentication, Reporting, and Conformance)?<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#How_DMARC_Works\" title=\"How DMARC Works\">How DMARC Works<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#DMARC_Policies\" title=\"DMARC Policies\">DMARC Policies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Benefits_of_DMARC\" title=\"Benefits of DMARC\">Benefits of DMARC<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#How_to_Setup_DMARC_in_3_Steps\" title=\"How to Setup DMARC in 3 Steps\">How to Setup DMARC in 3 Steps<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#How_DMARC_SPF_and_DKIM_Work_Together\" title=\"How DMARC, SPF, and DKIM Work Together\">How DMARC, SPF, and DKIM Work Together<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#The_Importance_of_Email_Authentication\" title=\"The Importance of Email Authentication\">The Importance of Email Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Best_Practices_for_Effective_Email_Authentication\" title=\"Best Practices for Effective Email Authentication\">Best Practices for Effective Email Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"Understanding_Email_Authentication\"><\/span><strong>Understanding Email Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Email authentication ensures that emails claiming to come from your domain are genuinely from you. It protects your organization from domain spoofing, phishing, and other email-based threats. Without email authentication protocols like <strong>DMARC<\/strong>,<strong> SPF<\/strong>, and <strong>DKIM<\/strong>, malicious actors can impersonate your domain, damaging your reputation and compromising your data security.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_is_SPF_Sender_Policy_Framework\"><\/span><span style=\"text-decoration: underline;\"><strong>What is SPF (Sender Policy Framework)?<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>SPF is a protocol that allows domain owners to specify which mail servers are permitted to send emails on behalf of their domain.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"How_SPF_Works\"><\/span><strong>How SPF Works<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ol>\n<li><strong>DNS Record Setup<\/strong>: The domain owner publishes an SPF record in their domain\u2019s DNS (Domain Name System). This record lists the authorized IP addresses or mail servers.<\/li>\n<li><strong>Email Validation<\/strong>: When an email is sent, the recipient\u2019s email server checks the SPF record to verify that the sending server\u2019s IP address is authorized.<\/li>\n<li><strong>Pass or Fail<\/strong>: If the sending server matches the authorized IPs, the email passes SPF validation. Otherwise, it fails, and the recipient server may reject the email or mark it as spam.<\/li>\n<\/ol>\n<h4><span class=\"ez-toc-section\" id=\"Benefits_of_SPF\"><\/span><strong>Benefits of SPF<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>It prevents unauthorized servers from sending emails on your behalf.<\/li>\n<li>It helps reduce spam and phishing attacks targeting your domain.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Limitations_of_SPF\"><\/span><strong>Limitations of SPF<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>It does not prevent email spoofing in the &#8220;From&#8221; address seen by users.<\/li>\n<li>SPF checks fail for forwarded emails because the forwarding server&#8217;s IP might not appear in the SPF record.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"What_is_DKIM_DomainKeys_Identified_Mail\"><\/span><span style=\"text-decoration: underline;\"><strong>What is DKIM (DomainKeys Identified Mail)?<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DKIM is an email authentication protocol that uses cryptographic signatures to verify the integrity and authenticity of an email.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"How_DKIM_Works\"><\/span><strong>How DKIM Works<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ol>\n<li><strong>Public-Private Key Pair<\/strong>: The domain owner generates a public-private key pair. Publish the public key in the domain\u2019s DNS as a TXT record.<\/li>\n<li><strong>Signing Emails<\/strong>: The sending mail server uses the private key to add a cryptographic signature to outgoing emails, which are stored in the email\u2019s header.<\/li>\n<li><strong>Verification<\/strong>: The recipient\u2019s mail server retrieves the public key from the DNS and uses it to verify the email\u2019s signature. If the signature matches, the email is verified as genuine and untampered.<\/li>\n<\/ol>\n<h4><span class=\"ez-toc-section\" id=\"Benefits_of_DKIM\"><\/span><strong>Benefits of DKIM<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>Ensures that the email content hasn\u2019t been altered in transit.<\/li>\n<li>Confirms that the email originates from an authorized server.<\/li>\n<li>Enhances email deliverability by building trust with email providers.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"What_is_DMARC_Domain-based_Message_Authentication_Reporting_and_Conformance\"><\/span><span style=\"text-decoration: underline;\"><strong>What is DMARC (Domain-based Message Authentication, Reporting, and Conformance)?<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC is an advanced email authentication protocol that works with SPF and DKIM to provide domain-level protection against email spoofing and phishing attacks.<\/p>\n<p>RELATED: <a href=\"https:\/\/mailsafi.com\/blog\/what-is-dmarc-and-how-does-it-work\/\" rel=\"bookmark\">What is DMARC and How Does it Work<\/a><\/p>\n<h4><span class=\"ez-toc-section\" id=\"How_DMARC_Works\"><\/span><strong>How DMARC Works<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ol>\n<li><strong>Policy Specification<\/strong>: The domain owner publishes a DMARC record in the DNS. This record defines how to handle emails that fail SPF and DKIM checks (e.g., none, quarantine, or reject).<\/li>\n<li><strong>Alignment Check<\/strong>: DMARC ensures that the \u201cFrom\u201d header domain aligns with the SPF and DKIM validation domain.<\/li>\n<li><strong>Reporting<\/strong>: DMARC provides feedback to the domain owner by sending reports on authentication results, helping them monitor unauthorized activity.<\/li>\n<\/ol>\n<h4><span class=\"ez-toc-section\" id=\"DMARC_Policies\"><\/span><strong>DMARC Policies<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>None<\/strong>: Monitor emails without taking any action.<\/li>\n<li><strong>Quarantine<\/strong>: Send failing emails to the recipient\u2019s spam folder.<\/li>\n<li><strong>Reject:<\/strong>\u00a0Block emails that fail DMARC authentication.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"Benefits_of_DMARC\"><\/span><strong>Benefits of DMARC<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>Protects your domain from spoofing and phishing attacks.<\/li>\n<li>Provides detailed insights through DMARC reports.<\/li>\n<li>Increases trust in your domain by ensuring email integrity.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"How_to_Setup_DMARC_in_3_Steps\"><\/span><strong>How to Setup DMARC in 3 Steps<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ol>\n<li>Publish a DMARC record in your DNS.<\/li>\n<li>Start with a \u201cnone\u201d policy to monitor email traffic.<\/li>\n<li>Move gradually to \u201cquarantine\u201d or \u201creject\u201d policies after resolving any issues.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"How_DMARC_SPF_and_DKIM_Work_Together\"><\/span><strong>How DMARC, SPF, and DKIM Work Together<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>While DMARC, SPF, and DKIM each serve unique purposes, their combined use provides comprehensive email authentication. Here\u2019s how they work together:<\/p>\n<ol>\n<li><strong>SPF<\/strong>: Verifies that emails are sent from authorized servers.<\/li>\n<li><strong>DKIM<\/strong>: Ensures the email content hasn\u2019t been tampered with and verifies sender authenticity.<\/li>\n<li><strong>DMARC<\/strong>: Enforces alignment and specifies how to handle unauthorized emails, providing an additional layer of security.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"The_Importance_of_Email_Authentication\"><\/span><strong>The Importance of Email Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li><strong>Protects Your Brand Reputation<\/strong> Email spoofing can damage your brand\u2019s credibility. Implementing DMARC, SPF, and DKIM ensures that customers and partners trust your emails.<\/li>\n<li><strong>Prevents Financial Loss<\/strong> Cybercriminals often use spoofed emails for business email compromise (BEC) attacks. Email authentication reduces the risk of such costly fraud.<\/li>\n<li><strong>Improves Email Deliverability<\/strong> Email providers like Gmail and Microsoft prioritize authenticated emails, ensuring your messages reach the inbox instead of the spam folder.<\/li>\n<li><strong>Compliance with Regulations<\/strong> Many industries require email authentication to comply with data protection laws like GDPR and CCPA.<\/li>\n<\/ol>\n<p>While SPF, DKIM, and DMARC are powerful, implementing them requires careful planning:<\/p>\n<ol>\n<li><strong>Complex Configuration<\/strong> Setting up DNS records for DMARC, SPF, and DKIM can be technical and time-consuming.<\/li>\n<li><strong>Monitoring and Reporting<\/strong> DMARC generates reports that require regular analysis to identify and address issues.<\/li>\n<li><strong>Maintaining Alignment<\/strong> Ensuring alignment across DMARC, SPF, and DKIM policies is critical but challenging, especially for large organizations with multiple email domains.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"Best_Practices_for_Effective_Email_Authentication\"><\/span><strong>Best Practices for Effective Email Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ol>\n<li><strong>Start with SPF.<\/strong> Publish an SPF record listing all authorized mail servers and regularly update it to include new servers.<\/li>\n<li><strong>Implement DKIM<\/strong> Set up DKIM to sign outgoing emails and verify their authenticity.<\/li>\n<li><strong>Adopt DMARC Gradually<\/strong> Start with a \u201cnone\u201d policy for monitoring. Once confident, move to stricter policies like \u201cquarantine\u201d or \u201creject.\u201d<\/li>\n<li><strong>Regularly Monitor Reports<\/strong> Analyze DMARC reports to detect unauthorized activities and refine your policies.<\/li>\n<li><strong>Work with Experts<\/strong> Consider partnering with email security providers like MailSafi to simplify the implementation and monitoring process.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>DMARC, SPF, and DKIM are the cornerstones of email authentication. They offer businesses a powerful defense against email spoofing, phishing, and other cyber threats. Implementing these protocols protects your organization from potential attacks, enhances email deliverability, and builds trust with recipients.<\/p>\n<p>Ready to secure your email communications?<\/p>\n<p>MailSafi protects your mailbox and network with DMARC, SPF, and DKIM authentication. Implementing these protocols can be complex. <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.mailsafi.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Contact us<\/strong><\/a><\/span>\u00a0to learn more about\u00a0<a href=\"https:\/\/www.mailsafi.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">MailSafi Email Security<\/span><\/strong><\/a>\u00a0mail validation technology.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3946\" class=\"pvc_stats all  \" data-element-id=\"3946\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Email remains one of the most vital communication tools for businesses and individuals. Unfortunately, it\u2019s also a favorite attack vector for cybercriminals, with phishing, spoofing, and email fraud becoming increasingly common. To combat these threats, businesses must implement robust email authentication protocols. Three key technologies\u2014DMARC, SPF, and DKIM\u2014form the backbone of modern email authentication. Let\u2019s [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3946\" class=\"pvc_stats all  \" data-element-id=\"3946\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":4,"featured_media":3947,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[207,208,201,206],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DMARC, SPF, and DKIM: The Foundations of Email Authentication<\/title>\n<meta name=\"description\" content=\"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DMARC, SPF, and DKIM: The Foundations of Email Authentication\" \/>\n<meta property=\"og:description\" content=\"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-09T19:05:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T19:57:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chelsea Muthoka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsea Muthoka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\"},\"author\":{\"name\":\"Chelsea Muthoka\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/6670d7f4065c0d5d58f808a2ff3d705e\"},\"headline\":\"DMARC, SPF, and DKIM: The Foundations of Email Authentication\",\"datePublished\":\"2024-12-09T19:05:42+00:00\",\"dateModified\":\"2024-12-09T19:57:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\"},\"wordCount\":1058,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png\",\"keywords\":[\"DKIM\",\"DMARC\",\"email authentication\",\"SPF\"],\"articleSection\":[\"Email Hosting\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\",\"name\":\"DMARC, SPF, and DKIM: The Foundations of Email Authentication\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png\",\"datePublished\":\"2024-12-09T19:05:42+00:00\",\"dateModified\":\"2024-12-09T19:57:58+00:00\",\"description\":\"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png\",\"width\":1080,\"height\":1080,\"caption\":\"DMARC SPF and DKIM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DMARC, SPF, and DKIM: The Foundations of Email Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/6670d7f4065c0d5d58f808a2ff3d705e\",\"name\":\"Chelsea Muthoka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/130136da51d17cee6e3e2b9145d3b21e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/130136da51d17cee6e3e2b9145d3b21e?s=96&d=mm&r=g\",\"caption\":\"Chelsea Muthoka\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DMARC, SPF, and DKIM: The Foundations of Email Authentication","description":"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/","og_locale":"en_US","og_type":"article","og_title":"DMARC, SPF, and DKIM: The Foundations of Email Authentication","og_description":"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.","og_url":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2024-12-09T19:05:42+00:00","article_modified_time":"2024-12-09T19:57:58+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png","type":"image\/png"}],"author":"Chelsea Muthoka","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"Chelsea Muthoka","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/"},"author":{"name":"Chelsea Muthoka","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/6670d7f4065c0d5d58f808a2ff3d705e"},"headline":"DMARC, SPF, and DKIM: The Foundations of Email Authentication","datePublished":"2024-12-09T19:05:42+00:00","dateModified":"2024-12-09T19:57:58+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/"},"wordCount":1058,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png","keywords":["DKIM","DMARC","email authentication","SPF"],"articleSection":["Email Hosting"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/","url":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/","name":"DMARC, SPF, and DKIM: The Foundations of Email Authentication","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png","datePublished":"2024-12-09T19:05:42+00:00","dateModified":"2024-12-09T19:57:58+00:00","description":"Essentials of DMARC, SPF, and DKIM: Protect against email spoofing and phishing while boosting deliverability and trust.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2024\/12\/Black-and-Yellow-Modern-Elegant-Tips-To-Improve-Your-Career-Development-Linkedin-Carousel-51.png","width":1080,"height":1080,"caption":"DMARC SPF and DKIM"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/dmarc-spf-and-dkim-the-foundations-of-email-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DMARC, SPF, and DKIM: The Foundations of Email Authentication"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/6670d7f4065c0d5d58f808a2ff3d705e","name":"Chelsea Muthoka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/130136da51d17cee6e3e2b9145d3b21e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/130136da51d17cee6e3e2b9145d3b21e?s=96&d=mm&r=g","caption":"Chelsea Muthoka"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3946"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=3946"}],"version-history":[{"count":1,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3946\/revisions"}],"predecessor-version":[{"id":3948,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3946\/revisions\/3948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/3947"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=3946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=3946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=3946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}