{"id":6473,"date":"2023-01-21T22:53:42","date_gmt":"2023-01-21T22:53:42","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6473"},"modified":"2023-03-27T08:24:21","modified_gmt":"2023-03-27T08:24:21","slug":"domainkeys-identified-mail-dkim","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/","title":{"rendered":"DomainKeys Identified Mail (DKIM)"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">What is a DKIM record?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a public key that can be used to verify the authenticity and integrity of emails sent from a domain.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Example<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Here is an example of a DKIM record for the domain &#8220;example.com&#8221; using the selector &#8220;dkim&#8221;:<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">dkim._domainkey.example.com IN TXT &#8220;v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDYKcNow4xqnJdYXcF7ouD1nX8X9Ld1J1z8Bm7L5o6sC7lYXJcYgV7c9r6I4g6N\/LSdzRVJEq3+j3ZqPY3b\/D3y+Gt0L\/E1H+jNvR+G8Kv1ZpO8YlhFyHCQQZBcJg3D8ZKLHnZz+ZBdJQZ2EZbVcO9I7c9MbLnkEKBBkcDUZoKe2vQIDAQAB&#8221;<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">This record specifies that the domain &#8220;example.com&#8221; is using DKIM with a selector of &#8220;dkim&#8221; and a public key that begins with &#8220;MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDYKcNow4xqnJdYXcF7ouD1nX8X9Ld1J1z8Bm7L5o6sC7lYXJcYgV7c9r6I4g6N\/LSdzRVJEq3+j3ZqPY3b\/D3y+Gt0L\/E1H+jNvR+G8Kv1ZpO8YlhFyHCQQZBcJg3D8ZKLHnZz+ZBdJQZ2EZbVcO9I7c9MbLnkEKBBkcDUZoKe2vQIDAQAB&#8221;.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">The exact format of the DKIM record will depend on the DNS server software you are using. Consult the documentation for your DNS server for more information on how to create and publish DKIM records.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A DKIM record is typically stored in the DNS zone file for the domain and has a name that begins with &#8220;dkim&#8221; and ends with the selector, which is a name that identifies the key. The record also contains other information about the email signing configuration, such as the list of email headers that are covered by the signature.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">To use DKIM, the email sender&#8217;s domain needs to have a DKIM record published in the DNS, and the email server needs to be configured to add the DKIM signature to outgoing messages. When the email is received, the receiving server can use the public key in the DKIM record to verify the signature and ensure that the message is legitimate.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">What is a DKIM signature?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A DomainKeys Identified Mail (DKIM) signature is a digital signature that is added to the header of an email message to enable DKIM email authentication. The signature is used to verify that the email was actually sent by the domain it claims to be sent from, and that it hasn&#8217;t been modified during transmission.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">To create a DKIM signature, the email sender&#8217;s server uses a private key to generate a unique message digest for the email, which is then encrypted and added to the email header as the DKIM signature. The private key is kept secret, and a corresponding public key is published in the DNS records for the domain.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">When the email is received, the receiving server can use the public key to verify the signature and ensure that the message is legitimate. This helps to protect against spam, phishing, and other types of email fraud<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">How does DKIM work?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Here is a summary of how DomainKeys Identified Mail (DKIM) works:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">The email sender&#8217;s server generates a digital signature for the email using a private key. The signature is a unique message digest that is encrypted with the private key.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">The email server adds the DKIM signature to the email header. The signature includes the domain name of the sender, the selector (a name that identifies the key), and the message digest.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">The email is sent to the recipient.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">When the email is received, the receiving server retrieves the public key for the sender&#8217;s domain from the DNS records.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">The receiving server uses the public key to verify the DKIM signature. It does this by decrypting the signature with the public key and comparing the result to its own calculation of the message digest. If the results match, it means that the email was sent by the domain it claims to be sent from and has not been modified during transmission.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">If the DKIM signature is verified, the email is considered to be legitimate and is delivered to the recipient&#8217;s inbox. If the signature is not verified, the email may be flagged as spam or rejected.<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">This process helps to protect against spam, phishing, and other types of email fraud by allowing the recipient to verify the authenticity and integrity of the email.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Why use DKIM for Email?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">There are several reasons why you might want to use DomainKeys Identified Mail (DKIM) for email:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">To protect against spam and phishing: DKIM helps to prevent spam and phishing by allowing the recipient to verify the authenticity of the email. If the DKIM signature does not verify, the email may be flagged as spam or rejected.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">To prevent email spoofing: DKIM helps to prevent email spoofing, which is when an attacker sends an email that appears to be from a legitimate domain but is actually fake. With DKIM, the recipient can verify that the email was actually sent by the domain it claims to be sent from.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">To protect against email tampering: DKIM helps to protect against email tampering by allowing the recipient to verify that the email has not been modified during transmission. This is especially important for emails that contain sensitive or confidential information.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">To improve email deliverability: Using DKIM can improve email deliverability by helping to ensure that legitimate emails are not mistaken for spam. This is because many email servers will give priority to emails with a valid DKIM signature when deciding whether to deliver the email to the recipient&#8217;s inbox.<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Overall, using DKIM can help to improve the security and reliability of email communication, and is a good best practice for anyone who sends email.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">How do I know if DKIM is working?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">There are several ways to check if DomainKeys Identified Mail (DKIM) is working:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Check the email headers: You can check the email headers to see if the email has a DKIM signature. To do this, you will need to view the full email headers. The DKIM signature should be included in a header field that begins with &#8220;DKIM-Signature&#8221;.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Use a DKIM checker tool: There are many online tools that can check the DKIM signature of an email for you. Some popular options include DKIM Core Validator and MXtoolbox. To use these tools, you will need to provide the email headers or the entire email message.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Check the email logs: If you are the administrator of the email server, you can check the email logs to see if the DKIM signature is being added to outgoing emails.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Send a test email: You can send a test email to yourself or to another email address and then check the email headers or use a DKIM checker tool to verify the DKIM signature.<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">If the DKIM signature is present and verifies, it means that DKIM is working properly. If the signature is not present or does not verify, it could indicate that there is a problem with the DKIM configuration.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">What happens when DKIM fails?<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">If a DomainKeys Identified Mail (DKIM) signature fails to verify, it means that the email was either not sent by the domain it claims to be sent from, or that it has been modified during transmission. In this case, the recipient&#8217;s email server may take one of several actions:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">Flag the email as spam: The email may be marked as spam and delivered to the recipient&#8217;s spam folder, or it may be rejected altogether.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Quarantine the email: The email may be quarantined, which means that it will be held in a separate area and not delivered to the recipient&#8217;s inbox. The recipient may be notified that the email has been quarantined and given the option to release it.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Deliver the email: In some cases, the email may still be delivered to the recipient&#8217;s inbox even if the DKIM signature does not verify. This may happen if the email server is not configured to check for DKIM signatures or if the email is from a domain that is not signed with DKIM.<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Overall, a failed DKIM signature can indicate that the email is not legitimate and may be a spam or phishing attempt. It is generally a good idea to treat emails with a failed DKIM signature with caution.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Why DKIM-Only Isn\u2019t Safe Enough<\/span><\/p>\n[\/heading][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">While DomainKeys Identified Mail (DKIM) is an important email authentication method, it is not foolproof and should not be relied upon as the sole means of protecting against spam, phishing, and other types of email fraud. Here are a few reasons why DKIM-only may not be safe enough:<\/p>\n<ol style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\" type=\"1\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\" value=\"1\"><span style=\"font-family: Calibri; font-size: 11.0pt; font-weight: normal; font-style: normal;\">DKIM can be compromised: It is possible for an attacker to compromise a domain&#8217;s DKIM keys and use them to send fraudulent emails that appear to be legitimate. This can happen if the domain&#8217;s private key is stolen or if the attacker is able to impersonate the domain&#8217;s email server.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Not all email servers check for DKIM: Some email servers may not be configured to check for DKIM signatures, which means that emails with a fake DKIM signature could still be delivered.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Not all domains use DKIM: Not all domains use DKIM to sign their emails, which means that emails from these domains will not have a DKIM signature. This means that relying on DKIM-only could result in legitimate emails being flagged as spam.<\/span><\/li>\n<\/ol>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">For these reasons, it is important to use multiple email authentication methods in order to provide the best protection against spam, phishing, and other types of email fraud. Some other email authentication methods that can be used in conjunction with DKIM include SPF, DMARC, and BIMI.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6481,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[30,76],"class_list":{"0":"post-6473","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-cyber-security","9":"tag-dkim"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-21T22:53:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:24:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"653\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"DomainKeys Identified Mail (DKIM)\",\"datePublished\":\"2023-01-21T22:53:42+00:00\",\"dateModified\":\"2023-03-27T08:24:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/\"},\"wordCount\":2763,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hand-pressing-envelope-that-is-sent-world.jpg\",\"keywords\":[\"Cyber Security\",\"DKIM\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/\",\"name\":\"DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hand-pressing-envelope-that-is-sent-world.jpg\",\"datePublished\":\"2023-01-21T22:53:42+00:00\",\"dateModified\":\"2023-03-27T08:24:21+00:00\",\"description\":\"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hand-pressing-envelope-that-is-sent-world.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/hand-pressing-envelope-that-is-sent-world.jpg\",\"width\":1000,\"height\":653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/domainkeys-identified-mail-dkim\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DomainKeys Identified Mail (DKIM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity","description":"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/","og_locale":"en_US","og_type":"article","og_title":"DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity","og_description":"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-01-21T22:53:42+00:00","article_modified_time":"2023-03-27T08:24:21+00:00","og_image":[{"width":1000,"height":653,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"DomainKeys Identified Mail (DKIM)","datePublished":"2023-01-21T22:53:42+00:00","dateModified":"2023-03-27T08:24:21+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/"},"wordCount":2763,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg","keywords":["Cyber Security","DKIM"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/","name":"DomainKeys Identified Mail (DKIM) - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg","datePublished":"2023-01-21T22:53:42+00:00","dateModified":"2023-03-27T08:24:21+00:00","description":"What is a DKIM record? A DomainKeys Identified Mail (DKIM) record is a type of DNS record that is used to enable DKIM email authentication. It contains a","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hand-pressing-envelope-that-is-sent-world.jpg","width":1000,"height":653},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/domainkeys-identified-mail-dkim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"DomainKeys Identified Mail (DKIM)"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6473"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6473\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6481"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}