Antispam, Best practices, BIMI
Antispam, Best practices, BIMI
The AuthIndicators Working Group (BIMI Group) recently announced that Apple systems such as iOS 16, iPadOS 16, and macOS Ventura will support BIMI starting this fall. Thus, the infographic showing the list of providers supporting the standard has been updated with the tile below:
Since the first screenshots from Apple’s native mailbox have already appeared on the Internet, which show a message sender with a graphic logo in place of initials (which looks like BIMI) and the signature “Digitally Certified“, it can be assumed that the change has already been implemented, which could be related to the ongoing WWDC 2022 (Apple Worldwide Developers Conference) in early June. By joining other providers who already support BIMI (e.g. Gmail, Yahoo!, Fastmail), Apple is emphasizing the importance of protecting the identity of the sender, continuing its work on email security which we have written about previously.
BIMI (Brand Indicators for Message Identification) is an authentication standard that allows organizations whose domain has been properly secured with DMARC to display a legally protected logo in place of the sender’s avatar in the mailbox.
Obtaining a Verified Mark Certificate (VMC) from an approved Certificate Authority (CA) and placing it in the BIMI record, authenticates that the logo belongs to the real sender, thus increasing its credibility. It is also a requirement for logo display by some mailbox providers – such as Gmail.
One of the most important conditions for organizations wishing to have BIMI is the aforementioned implementation of DMARC (with a strict quarantine or reject policy) to protect their sending domains from spoofing attempts by cybercriminals. The support of the BIMI standard by such an organization as large as Apple is a clear example to others to maintain a more secure digital environment. The more senders implement BIMI, the more difficult it will be to launch cyber attacks via email – a recognizable logo will make it easier for recipients to determine whether an email is fake or real.
Read about why BIMI provides an anti-phishing shield.
BIMI has a clear benefit for organizations that want to secure their email communications. Research (such as that conducted by Red Sift) shows that a sender logo in an email can significantly increase the number of emails opens and lead to higher conversions. Apple’s support of BIMI means that a new group (a huge part of consumers), will be able to see sender logos when checking email on their devices like iPhones or MacBooks. Considering how many consumers believe that brand recognition is a crucial factor in whether an email is opened or lands in the trash, it’s so important for brands to make sure they already have a registered logo and to move urgently to implement an identity security standard like BIMI, allowing it to be displayed in mailboxes.
EmailLabs™ offers a service related to assistance in its implementation. Thanks to cooperation with Domeny.pl, the only distributor of VMC certificates in Poland, you can obtain it on very preferential terms. Do you have any questions? Contact our Support Team
Gmail has announced significant changes in the requirements for email senders to maintain a good reputation and proper classification of messages in user inboxes starting from February 1, 2024....
Vercom S.A. public joint-stock company to which the EmailLabs project belongs, has been assessed and certified to be compliant with the ISO/IEC 27001 and ISO/IEC 27018 standards. The Vercoms’...
The increasing number of phishing attacks each year, and the projection that this trend will continue to escalate, aren’t likely to astonish anyone. This can be attributed, in part,...
Out of all the things that can go wrong when sending out marketing emails, having your emails end up in the recipient’s spam folder is arguably the most dreaded...
Email Authentication, Security
DMARC is an email authentication protocol that is designed to give domain owners the ability to protect their domain from unauthorized use, commonly known as email spoofing. Spoofing occurs...
With the emergence of the Covid-19 pandemic, many brands have been challenged to adapt in a short period to the changed reality and new consumer attitudes. That meant reorganizing...
What is the darknet? Shrouded in mystery for many years and often associated with ominous connotations, the darknet is a part of the internet that evokes curiosity, fascination, and...
A few weeks ago, at Vercom, we began the process of implementing the NIS2 Directive and preparing to meet the requirements of the Digital Operational Resilience Act (DORA). What...
If you’ve been following our updates, you’re likely aware of the recent changes in email sender requirements introduced by major global providers like Gmail and Yahoo. As of February...
What is the darknet? Shrouded in mystery for many years and often associated with ominous connotations, the darknet is a part of the internet that evokes curiosity, fascination, and...
A few weeks ago, at Vercom, we began the process of implementing the NIS2 Directive and preparing to meet the requirements of the Digital Operational Resilience Act (DORA). What...
If you’ve been following our updates, you’re likely aware of the recent changes in email sender requirements introduced by major global providers like Gmail and Yahoo. As of February...
Have you ever sent an email in haste and immediately wished you hadn’t? It happens more often than we’d like to admit. If you ever find yourself in this...
One safe and easy way to keep track of your digital interactions is to save emails as PDFs. However, do you know the best ways to easily turn your emails into PDF files? In this article, we’ll look into the different ways you can do to turn your emails into accessible PDF files. Let’s start! Key Takeaways To save emails...
Sending large files online can sometimes feel like maneuvering through a maze with unexpected twists and turns. The frustration of hitting attachment size limits or dealing with slow uploads...
Are you a bit baffled by email protocols like IMAP, POP3, and SMTP? Have no fear – this article is here to explain it all. If you have ever...
In 2024, global providers like Gmail and Yahoo have implemented a series of changes, primarily targeting bulk senders. These changes, already in effect, are part of a continuous update...
In the face of dynamic technological advancements and increasingly sophisticated cyber threats, ensuring network security has become crucial. Dozen security incidents present a challenge that we cannot afford to...