Email security - laptop with email interface
๐Ÿ‡ฆ๐Ÿ‡บ Australia โ† All posts

Your Business Email Is Probably Being Spoofed Right Now โ€” Here's How to Stop It

De4sec Technology ยท Feb 2026 ยท 4 min read ยท ๐Ÿ‡ฆ๐Ÿ‡บ Australia

Email spoofing lets attackers send fake invoices and instructions that appear to come from your domain โ€” without ever touching your systems. Here's the three-record fix most Brisbane businesses haven't implemented.

Last month, a Brisbane accounting firm discovered that their clients had been receiving invoices โ€” apparently from them โ€” asking for urgent payment to a new bank account. Except the firm never sent them. No system was hacked. No password was stolen. The attacker never even touched their network. They just spoofed the domain.

What Is Email Spoofing โ€” and Why Should You Care?

Email spoofing is when someone sends an email that appears to come from your domain โ€” your business address โ€” without ever having access to your email account or servers. It exploits gaps in how email was originally designed, and it's one of the most common techniques used in business email compromise (BEC) attacks.

The result? Your clients, suppliers, and partners receive emails that look exactly like they came from you. Fake invoices. Fraudulent payment requests. Urgent 'CEO' instructions. All appearing to be from your trusted domain. In Australia, BEC is consistently among the top reported cybercrime categories โ€” and the majority of victims are small and medium businesses.

The Three Records That Determine Whether You're Exposed

Whether your domain can be spoofed comes down to three DNS records most businesses have never heard of:

1. SPF (Sender Policy Framework)

SPF tells the world which mail servers are authorised to send email on behalf of your domain. If it's missing or misconfigured, anyone can send email claiming to be from you@yourbusiness.com.au.

2. DKIM (DomainKeys Identified Mail)

DKIM adds a cryptographic signature to your outgoing emails. Receiving mail servers use it to verify the message actually came from you and wasn't tampered with in transit. Without it, your emails carry no authentication stamp.

3. DMARC (Domain-based Message Authentication, Reporting & Conformance)

DMARC is the enforcement layer. It tells receiving servers what to do when an email fails SPF or DKIM checks โ€” quarantine it, reject it, or let it through. Without DMARC, even if you have SPF and DKIM, there's no instruction to act on failures.

Most Brisbane SMBs have SPF partially configured. Very few have DKIM set up correctly. Almost none have DMARC enforced.

How to Check If You're Vulnerable Right Now

You can check your own domain in under two minutes using a free tool like MXToolbox (mxtoolbox.com). Search for your domain and run the SPF, DKIM, and DMARC lookups. If any show as missing, failing, or set to 'p=none' (DMARC with no enforcement), your domain is open.

A correctly configured DMARC record set to 'p=reject' means unauthenticated emails claiming to be from your domain are automatically rejected before they reach anyone's inbox.

This Isn't Just a Technical Problem

The consequences of email spoofing aren't just reputational. When a client transfers money based on a fraudulent invoice that appeared to come from you, the relationship is damaged โ€” even though you did nothing wrong. In some cases, businesses have faced legal disputes over losses they didn't cause. The fix isn't expensive or complex. It's a configuration task. But it needs to be done correctly โ€” partial implementation creates a false sense of security.

What Proper Email Authentication Looks Like

โœ“SPF record published and covering all legitimate sending sources (including Microsoft 365 or Google Workspace)
โœ“DKIM configured and signing all outbound mail from your primary domain
โœ“DMARC published with a policy of at least p=quarantine, working toward p=reject
โœ“DMARC reporting enabled so you can see who is sending email on your domain's behalf
โœ“Regular review of DMARC reports to catch misconfigurations early

Email domain hardening is one of the first things De4Sec checks in any IT assessment โ€” because it's one of the easiest wins with the highest real-world impact.

// NOT SURE WHERE YOU STAND?

Book a free IT & security check.

We identify your top 3 risks and tell you exactly what to fix โ€” no jargon, no obligation.

Book a Free Discovery Call โ†’
RELATED SERVICES:
Microsoft 365 SecurityCybersecurity & RiskEssential Eight