By this point, you should have tackled both the SPF, and DKIM entries for all of the services sending on your behalf. Well, that you are aware of anyway, there is always more to find and shortly shadow IT, and less than helpful third parties will soon be revealed.
Information Security
A collection of 12 posts
DKIM: Auth me up Scotty
DKIM is discussed extensively by several sources, and this isn't an extensive breakdown of it, ultimately I have working knowledge of it so consider this my idiots guide to the galaxy. DomainKeys Identified Mail (DKIM) as a technology allows us
SPF: Writing the wrongs
Correct and complete SPF configurations seem to escape the grasp and understanding of many a sysadmin, Managed Service Providers, and web developers; from the small business with often simple needs, through to larger firms with dedicated staff to deal with
MSP: Contemplating Our Security Posture
Our Technological approach. As a managed service provider (MSP) - our life blood is built upon a stack of vendors assembled together to provide an end to end solution, covering all aspects from antivirus, to backups, to remote management and
Vendors and Suppliers: Beyond the sales spiel
As the IT world develops and changes at an ever-expanding pace, it is often hard to qualify and validate systems, and the third parties supplying them. Hoping they are all equal; continuously developing, improving, testing, and securing the systems they
MSP Vendors: Security and transparency has to come first, not politics.
So it's been an interesting July so far in the Managed Services world; our communities such as MSPGeek [https://mspgeek.org/] and WinAdmins [https://aka.ms/winadmins] grew further in numbers and quality, and there's now a bimonthly Tuesday night
ISO20000 - Supplier Matrix
As part of ISO20000 there's a requirement for a suppliers matrix to analyse vendors and suppliers. The following spreadsheet averages out the scores of each section, and then averages out the sections to provide an overall rating. Each score is
Security Posture
> All organisations have a security posture whether it is defined or not. Security posture is defined in numerous places, my personal favourite is as follows: > The security status of … networks, information, and systems based on IA resources (e.g., people,
Subscribe to TechFoundry
Subscribe today and get access to a private newsletter and new content every week!