Email And Identity
All articles in this topic area, organized by difficulty level.
Intro (10)
Business Email Compromise: How $50K-$250K Walks Out Your Door
BEC scams cost Gulf Coast SMBs more than ransomware. Learn how these attacks work, who gets hit, and what stops them.
DNS Basics: What You're Paying For Every Year
DNS is the phone book of the internet. Learn what it does, why it matters for your email, and what happens when it's wrong.
Email Security Fundamentals: Protect Your Primary Business Channel
SPF, DKIM, and DMARC explained—what they do, what breaks them, and how to set them up without disrupting your email.
How Email Impersonation Actually Works
Step-by-step breakdown of how attackers fake your email address—and what stops them.
How to Secure Your Domain Registrar
Your domain registrar is the gatekeeper to your entire online presence. Here's how to lock it down.
Identity Basics: Admin Roles and Least Privilege
Not everyone in your company needs admin access. Here's why that matters and how to fix it.
MFA for Email Admins and Business Owners
Your admin accounts are the most valuable targets. Here's why MFA matters more for them than anyone else.
SPF, DKIM, and DMARC in Plain English
The three controls that stop people from faking your email address. Explained without the jargon.
What Is MFA and Why It Matters
Multi-factor authentication stops most account takeovers. Here's what it is, what types exist, and what to enable first.
Why a Branded Email Address Matters
Using free email services for business costs you credibility and exposes you to impersonation. Here's the real impact.
Intermediate (4)
How to Audit Mailbox Rules and Delegations
Detect unauthorized inbox rules and access delegations that could be leaking data or enabling fraud.
How to Move from Free Gmail to Your Domain Email
Switching from Gmail or Yahoo to professional domain email—without losing your data or your mind.
Shared Inboxes and Aliases Done Right
Support@ and sales@ mailboxes are useful—until they're a security hole. Here's how to set them up properly.
Stop Auto-Forwarding and Inbox Rules Abuse
Compromised accounts often have hidden rules forwarding emails to attackers. Here's how to find and stop them.