Reflections on University Email Security - Part 2
Be sure to attend the special webinar on Email Security Updates and Best Practices on Thursday, Dec. 5, at 12:00 p.m.
The evolution of email continues to be a journey to maintain current technology standards and protect students, faculty, researchers, and staff against evolving threats. This story continues that journey, which was first published in Part 1: Reflections on University Email Security on Nov. 20.
A look back
Many universities across the country have been strengthening their safeguards against spam and phishing emails for years. Adam Brokamp, IT Manager, Collaborative Technologies, explains, “Our previous security appliance was often rejecting email without notifying the end user.” Not only was the quarantined email unavailable for them to review, but there was also no way to retrieve it. Frustrated email users would receive confirmation from the sender that the email was sent, but it failed to appear in their inbox.
Email Authentication Protocols
Being Proactive by Moving into the Future
Many companies and organizations around the world are moving forward with implementing DMARC to adhere to industry standards. Although a deeply technical subject, there are several DMARC functions involved in securing email, which include:
- In general, a DMARC policy requires emails sent by an individual to comply with SPF and DKIM authentication. One of those must pass. If neither passes, the DMARC record instructs the recipient mail system on the preferred action for handling email.
- Let’s look at an example from the reverse perspective. if a .gov server receives an email from a yahoo.com server with an apparent address from @arizona.edu, the .gov server looks at our DMARC record to determine what @arizona.edu wants them to do with this email
.If it fails, the .gov server knows this is not a trustworthy email. It is most likely an impersonation of @arizona.edu, and the DMARC record says we do not want it delivered to the intended .gov recipient. The intended recipient does not get the email. The .gov server is taking that action.
Because these standards already exist, many agencies, such as the .mil and .gov institutions, refuse to accept emails from domains without a DMARC record set. This is a huge shift in the industry, and it is why all university emails must adhere to this standard. Google and Yahoo require DMARC records at the .com level. In the near future, this heightened security protocol will affect every vendor the university works with.
Forwarding Email Fails the Test
The email team is beginning to get concerns from university email users who forward their university email to another mailbox like Gmail or Yahoo. Keating explained, “When an email from third parties like Best Buy or Ticketmaster comes to a university email account and is forwarded to a Gmail account, Gmail quarantines the email. It fails SPF because it originated from Best Buy but now says it’s coming from @arizona.edu. And because the Best Buy email comes to the university as an external sender, the External Banner is added, which fails DKIM. Thus, Gmail will not allow the forwarded email to be delivered to your Gmail account.
Securing the email system in this way prevents our institution from being impersonated and prevents nefarious activities from occurring if an email with your_name@arizona.edu on it is used against another person or institution.
This new email security specification is a complex topic that is not easily understood at first glance. The University’s email administration staff will present a special webinar on Email Security Updates and Best Practices on Thursday, Dec. 5, at 12:00 p.m. The agenda is designed to help general email users understand the new industry requirements and how the university is adapting to meet them. Register to attend this webinar.