Why Brand Protection?

If your organisation operates under a “brand” name, you need to protect it. Malicious actors stand to gain a lot from abusing or impersonating your brand, including damaging your reputational trust and affecting your relationship with your customers.

Brand protection is business preservation. Effectively protecting your brand online requires a layered approach using software and automation to combat threats relating to impersonation/imitation and logo abuse.

What is online brand abuse?

Traditionally with physical goods, brand protection involved tackling the counterfeiting and abuse of intellectual property by parties operating externally to your business. But attackers increasingly (and efficiently) now use a combination of digital methods of brand abuse including:

  • Fake or ‘Lookalike’ Websites
  • Online Logo/Asset Misuse
  • Business Email Compromise
  • Email Impersonation
  • Scam Campaigns and Phishing Attacks
  • Fake Social Media Accounts
  • Malicious Mobile Apps

Online brand protection strategies to combat these methods include logo and asset detection and management, domain lookalike takedown, DMARC, and BIMI, in conjunction with cyber-security software to detect phishing attacks and warn the end-user.

What is DMARC?

DMARC stands for ‘Domain-Based Message Authentication, Reporting & Conformance’ and is an email-authentication protocol designed to protect your domain against impersonation. Having NO DMARC configuration on your domain(s) leaves your organisation particularly vulnerable to email impersonation and domain-based phishing attacks.

Your DMARC status is publicly available information:
>>> check the DMARC, SPF and DKIM settings for your all company domains here

When properly configured in a policy of REJECT, DMARC uses existing protocols SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) to ensure that emails sent using your domain are legitimate, preventing hackers from impersonating your brand and damaging your reputation.

DMARC can also improve deliverability rates for marketing/bulk emails by indicating they have come from a reputable source, as the protocol creates a record with metadata about the validation status of each email it receives from each organisation.

DMARC Policies

There are three policy stages of DMARC implementation. Achieving the policy of p=reject is the ultimate aim for your company’s email security, deliverability and brand reputation.

However for your DMARC record to carry on protecting your organisation, it needs regular care and attention, especially as the email sending habits of your domain will change over time.

  • REPORT (p=none) … you are in reporting mode; this policy allows all emails to reach the receiver, regardless of whether or not they have been authorised
  • QUARANTINE (p=quarantine) … emails which fail DMARC validation will be sent to the receiver’s junk/spam folder
  • REJECT (p=reject) … your DMARC is properly configured.

Examples of elements that could potentially affect your DMARC configuration even once you are in ‘p=reject’ include:

  • Email Forwarding – your SPF could break when someone forwards an email
  • Misalignment – your DKIM keys can get out of sync if you use third-party sending services
  • Server Overload – sometimes an ISP may turn off DKIM checks if high processing is required

To provide the necessary visibility with notifications and the tools to put things right again, we highly recommend a monitoring and reporting product like OnDMARC from Red Sift.

To help you understand whether your domains are at risk or not, get in touch with us for a free, no-obligation DNS Intelligence Report using Red Sift’s tool which will:

  • give you a full overview of your DNS configuration
  • identify all email sending sources, both legitimate and illegitimate
  • identify shadow IT
  • display locations of any illegitimate sending sources
  • provide intelligence into any IPs sending emails on behalf of your organisation
  • provide full detail on how to protect your clients against impersonation

More Cyber Security Solutions

Get in touch with us today

Book a Call
Black-and-white headshot of a bald man with a beard, wearing a checked shirt, looking slightly to the side. The photo is framed in a circular border.
A young man with short brown hair smiles at the camera. He is wearing a dark blazer over a light shirt, and there is a decorative mug on a shelf in the blurred background. The photo is framed in a circular shape.

1 of 6

Managed Backups

"We needed a reliable cloud backup and storage service that didn’t take too much time to manage. Autodata's Cloudlake solution is straightforward, secure, and sensibly priced. It’s helped us get on top of our data protection goals and tick off a few compliance boxes too. It’s also been easier to work with Autodata than some of the bigger names."

Gavin Bidgood Infrastructure and Security Manager, Hotel Chocolat

Microsoft 365 Backup

"We needed S3 object storage offsite to bolster our backup environment, initially for M365 then for our server infrastructure as well. Autodata’s Cloudlake solution has allowed us to leverage immutable cloud repositories giving us reassurance that our data will be safe. It’s easy to setup, easy to manage, and backs up with no problems whatsoever."

Neil Fleetwood IT Helpdesk Support Manager, Kimal

Managed Backups

"We were already an existing Veeam user, however we were overprovisioned and looking to increase our protection against ransomware by introducing immutability. Autodata took our requirements and provided an easier to manage, more affordable service backed by prompt support. The service has improved our level of confidence in our backups whilst reducing costs."

Luke Cox IT Support Engineer, HQW Aerospace

Managed Backups

"Autodata's Cloudlake solution is really easy to use and is cost effective against other types of backup and cloud storage available yet offers advanced functionality. It has given us extra layers of security and helps us to assure stakeholders that we have the right technology in place for data protection and restoration. The solution just works!"

Ian Robertson Director of ICT, The Regenda Group

Microsoft 365 Backup

"When it came to implementing an offsite immutable storage repository to protect our entire M365 environment and provide ransomware protection, Autodata's unique offering represented a significant cost saving. They were able to offer us a fully managed Veeam M365 backup solution with immutable storage for only a marginal increase in what we had been paying for Veeam licences alone."

Stephen Clark Solutions Architect, Greencore

Immutable Cloud Storage

"We wanted a cloud storage service that worked well with Veeam and provided immutability to enable us to lockdown our data and recover backups in the event of a ransomware attack. Autodata's Cloudlake Storage solution powered by Wasabi provides cloud storage at an affordable price with added cyber security protection - which is precisely what we were looking for."

Alan Pereira CIO, Gibraltar Financial Services Commission

We Partner with Leading Global Technology Vendors