
February 11, 2026
Do we need an AI policy for ISO 27001?
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read MoreHow can you trust that an email really came from the sender it claims to be? That's where SPF (Sender Policy Framework) comes in—a vital tool in the fight against email fraud and phishing.
Have you ever received an email claiming to be from your bank, but something felt off?
This is phishing—cybercriminals impersonating trusted entities to trick you.
Enter DMARC (Domain-based Message Authentication, Reporting, and Conformance), your email superhero!
DMARC is an email authentication protocol that ensures legitimate emails from your domain are delivered while keeping fraudulent ones out.
Think of it as your email’s bouncer, checking IDs before letting messages through.
Before DMARC can do its job, it relies on two sidekicks: SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail).
In simple terms:
These work together to provide the groundwork for DMARC’s magic.
For more information on What SPF is? And What is DKIM? Check out the detailed blogs.
DMARC isn’t just a tech buzzword—it’s a business necessity.
Here’s how it protects you and your clients:
DMARC builds on SPF and DKIM to determine whether an email is legitimate.
Here’s a simplified breakdown of its process:
This layered approach keeps fraudulent emails at bay, protecting your brand and your customers from harm.
Reports received can be difficult to read, coming in an XML format and looking something along the following

I generally don’t advocate for tools, but it may be worth the investment if your mail volume is significant. The following is a visual output of the above XML, which I am sure you can agree is a little easier to read.

Phishing isn’t just a nuisance; it’s a costly threat. Without DMARC, your business risks financial losses, reputational damage, and legal repercussions. Implementing DMARC shows your clients and partners you take security seriously—a crucial trust builder in today’s digital world.
For more insights why not explore our other blog posts, or if you have a specific question that requires personalised guidance, please do get in touch.

February 11, 2026
Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.
Read More
August 14, 2025
Penetration testing simulates real-world cyberattacks to uncover vulnerabilities before malicious hackers can exploit them. This article explains the types of pen testing, the process, and why it’s essential for strengthening your organisation’s cyber defences.
Read More
August 6, 2025
ISO 27001 certification is a recognised security standard—but does it guarantee better protection? This article explores whether certification truly enhances security or if a risk-based approach without the badge can be just as effective.
Read More