John Howard

John Howard

John is a content writer at 101domain with a specialization in Domain-Based Enterprise Technology and Cybersecurity.

What is “Header From” spoofing?

DMARC

What is “Header From” spoofing?

"Header From" spoofing is a common email impersonation tactic where a malicious actor forges the visible "From" address of an email to appear as a legitimate sender.

Understanding SPF Lookup Count Limitations and Their Impact on Your Business

DMARC

Understanding SPF Lookup Count Limitations and Their Impact on Your Business

The Sender Policy Framework (SPF) is a crucial email authentication protocol that helps protect your domain from spoofing and phishing attacks. However, SPF has a significant limitation known as the "lookup limit," which can impact your email deliverability and business operations if not managed properly.

Choosing a DMARC service: managed or unmanaged?

DMARC

Choosing a DMARC service: managed or unmanaged?

At 101domain, we offer both managed and unmanaged DMARC solutions to cater to varied needs. But how do you decide which option is right for your business? Let's explore the differences between managed and unmanaged DMARC services to help you make an informed decision.

Real world cases of Business Email Compromise (BEC)

DMARC

Real world cases of Business Email Compromise (BEC)

In the email-driven business world of today, Business Email Compromise (BEC) attacks are a formidable threat to enterprises worldwide. Let's take a look into three notable cases of BEC attacks and how you might learn from them.

Understanding DDoS attacks and how to mitigate them

Cloudflare

Understanding DDoS attacks and how to mitigate them

Among the many cybersecurity threats businesses face, Distributed Denial of Service (DDoS) attacks stand out as particularly disruptive. This introductory guide aims to help you understand what is a DDoS attack, how they operate, and the steps you can take to assess your vulnerability in order to mitigate potential threats.