logo
HiCamp Partners Joins EasyDMARC's MSP Program to Enhance Email Security and Deliverability for Clients

HiCamp Partners Joins EasyDMARC's MSP Program to Enhance Email Security and Deliverability for Clients

DOVER, DE, UNITED STATES, April 11, 2025 / EINPresswire.com / -- EasyDMARC, a vendor of the cloud-native email security and deliverability platform, announced today a strategic partnership with HiCamp Partners, a leading email marketing agency, based in New York, USA.
This partnership will help HiCamp Partners protect their clients' email domains from being used for phishing and other fraudulent activities, as well as improve their email deliverability rate.
Email security has become a significant concern for businesses of all sizes as cyberattacks, such as phishing and spoofing, are becoming increasingly sophisticated. Verizon DBIR mentions that 93% of all successful cyberattacks begin with a phishing email.
In light of this, HiCamp Partners has taken a proactive approach to help its clients secure their email domains and protect their sensitive information.
'At HiCamp Partners, ensuring flawless email deliverability is a top priority for our clients. EasyDMARC has been instrumental in streamlining authentication protocol setup and optimization, helping us fix DNS misalignments that could otherwise block crucial emails. Their platform makes what can be a complex process significantly more manageable, allowing us to focus on driving results for eCommerce brands., ' said Nolan Butler, Co-Founder at HiCamp Partners.
'We are thrilled to welcome HiCamp Partners to our growing partner network. Their commitment to delivering exceptional IT services and support to their clients aligns perfectly with our mission to make email safer for everyone,' said Gerasim Hovhannisyan, CEO of EasyDMARC.
The DMARC standard enables the automatic flagging and removal of receiving emails that are impersonating senders' domains. It is a crucial way to prevent outbound phishing and spoofing attempts.
About HiCamp Partners
HiCamp Partners is a lifecycle marketing agency specializing in email and SMS for eCommerce brands. The company focuses on optimizing deliverability, crafting high-converting campaigns, and building retention strategies that drive long-term revenue.
About EasyDMARC
EasyDMARC is a cloud-native B2B SaaS to solve email security and deliverability problems in just a few clicks. With advanced tools, such as its AI-powered DMARC Report Analyser, DMARC, SPF, DKIM cloud management solutions, and email source reputation monitoring, EasyDMARC's platform helps customers stay safe and maintain the health of their domains without risk.
www.easydmarc.com
Anush Yolyan
EasyDMARC Inc.
+1 8885635277
Legal Disclaimer:
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself
A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

Yahoo

time8 hours ago

  • Yahoo

A New Email Scam Is Shockingly Realistic, Here's Everything You Need To Know About Protecting Yourself

An email hits your inbox from an unknown sender that includes a picture of your house and address, followed by a threat: 'Don't even try to hide from this. You have no idea what I'm capable of….I've got footage of you doing embarrassing things in your house (nice setup, by the way).' Sounds like a scene out of a horror film, right? Instead, it's one of the latest phishing scams. Like many other email and text scams, this particular extortion scheme uses specific personal information to deceive people into sending money. The email convinces people the hacker knows more about them and that they must exchange payment or Bitcoin in order to keep their information safe. 'I received a PDF over email that included my address and photo of the address and made outrageous claims about my private behavior, and claimed to have video documentation captured from spyware on my computer,' Jamie Beckland, a chief product officer at the tech company APIContext, told HuffPost. 'The scammer threatened to release the video if I didn't pay them via Bitcoin.' If you get a similar email, here are the steps you can take to figure out if it's a scam so you protect yourself: Confirm the house and street imagery on Google Maps. Related: Many phishing emails are often riddled with grammatical errors and poor formatting, which make them easier to identify. However, this scam, which includes images of people's homes, is a newer, darker twist. You might be asking yourself, how exactly was the scammer able to identify your house address? According to Al Iverson, a cyber expert and industry research and community engagement lead at the software company Valimail, the sender likely found your address from a prior data breach that leaked personal data, and then used a Google Maps photo to put together an email. Beckland was able to confirm this is a scam by comparing the image in the PDF to the Google Maps street view of his house. Most images in these scams are pulled from online sources, so he recommends that people check to see if the image was copied from the internet. If so, it's clearly not legitimate. Examine the email address and check for legitimacy. Related: Iverson recommended checking the email address' legitimacy whenever you receive any correspondence from unknown users. 'Check whether the sender's email domain matches the official organization's website,' he said as one example. 'Also, if using Gmail, look for 'show original message' and review SPF, DKIM, and DMARC results.' These are essentially methods that verify the emailer's domain to prevent spam, phishing attacks and other email security risks. To do this, click on the three-dot hamburger menu at the top right of your email and click 'Show Original.' 'All three should ideally pass authentication checks,' Iverson said. In other words, it would say 'PASS' next to all three options. Scammers have become very sophisticated when masking domains. As a result, beware of 'lookalike' domains with slight spelling variations. According to Iverson, if something seems too good (or too bad) to be true, it probably is. Another thing to keep an eye out for is if a scammer sends a message 'from' your own email address. Oftentimes, they are just spoofing your email address in the 'from' address header. 'These scammers don't have the time or ability to actually hack into your email accounts. They haven't found some secret treasure trove of compromising photos. They're just trying to scare unsuspecting people into coughing up money (or Bitcoin),' Iverson added. Don't click unfamiliar links, especially related to payments. If an email seems legitimate, you might accidentally click on the links it contains for more information. Zarik Megerdichian, founder of Loop8, a company that protects personal data and privacy from data breaches and hackers, strongly cautions against this. 'Exercise caution any time you're asked to click on a link in an email,' Megerdichian said. 'Bitcoin transactions are irreversible, as are many other common payment methods including Cash App and Zelle.' Further, scams that demand remuneration should be reported to the Federal Trade Commission by filing a report online or via phone. Megerdichian also noted that if a hacker has obtained details about your financials, monitor your bank accounts closely and dispute fraudulent charges with your bank, cancel your cards and preventatively stop future charges. Update and change your passwords. Related: It's also highly advisable when confronted with an elaborate scam to change all of your passwords. According to Yashin Manraj, CEO of Pvotal Technologies, a company that creates secure tech infrastructures for businesses, it's important to protect your data right away if you suspect it's been compromised. 'Use a new email address if possible and move critical financial or utilities to it, and then start reporting the case to the local police, the FBI and making sure your family is aware of the potential threat of a public shaming in the unlikely event that they did manage to steal some compromising data,' Manraj said. Do not engage with the scammer. Related: It might feel tempting to respond to an email (especially ones that seem very realistic) to negotiate with the scammer. However, Manraj recommends disengaging and ignoring these emails because responding can actually place you on call logs and target databases that will make you vulnerable to further attacks. It's also advisable to isolate your home network via a separate Wi-Fi or router, using a VPN to connect to the internet. Most importantly, do not ask for specific help on public forums, especially when uploading logs or error messages. 'Be especially careful when using virtual numbers and password managers on unpopular websites to avoid reusing personally identified information that could be used to access your important financial services,' Manraj explained. Finally, be mindful about what data you are sharing in the future. Users should remember that data is a commodity, and businesses today collect too much information (often more than they need to complete the transaction at hand). When signing up for new websites or downloading apps, Megerdichian suggests avoiding oversharing. 'Always ask yourself, do they really need to know that? It's up to consumers to be proactive when it comes to their personal data,' Megerdichian article originally appeared on HuffPost. Also in Goodful: Also in Goodful: Also in Goodful:

Alert: Stay Safe From New Email Scam
Alert: Stay Safe From New Email Scam

Buzz Feed

timea day ago

  • Buzz Feed

Alert: Stay Safe From New Email Scam

An email hits your inbox from an unknown sender that includes a picture of your house and address, followed by a threat: 'Don't even try to hide from this. You have no idea what I'm capable of….I've got footage of you doing embarrassing things in your house (nice setup, by the way).' Sounds like a scene out of a horror film, right? Instead, it's one of the latest phishing scams. Like many other email and text scams, this particular extortion scheme uses specific personal information to deceive people into sending money. The email convinces people the hacker knows more about them and that they must exchange payment or Bitcoin in order to keep their information safe. 'I received a PDF over email that included my address and photo of the address and made outrageous claims about my private behavior, and claimed to have video documentation captured from spyware on my computer,' Jamie Beckland, a chief product officer at the tech company APIContext, told HuffPost. 'The scammer threatened to release the video if I didn't pay them via Bitcoin.' If you get a similar email, here are the steps you can take to figure out if it's a scam so you protect yourself: Confirm the house and street imagery on Google Maps. Many phishing emails are often riddled with grammatical errors and poor formatting, which make them easier to identify. However, this scam, which includes images of people's homes, is a newer, darker twist. You might be asking yourself, how exactly was the scammer able to identify your house address? According to Al Iverson, a cyber expert and industry research and community engagement lead at the software company Valimail, the sender likely found your address from a prior data breach that leaked personal data, and then used a Google Maps photo to put together an email. Beckland was able to confirm this is a scam by comparing the image in the PDF to the Google Maps street view of his house. Most images in these scams are pulled from online sources, so he recommends that people check to see if the image was copied from the internet. If so, it's clearly not legitimate. Iverson recommended checking the email address' legitimacy whenever you receive any correspondence from unknown users. 'Check whether the sender's email domain matches the official organization's website,' he said as one example. 'Also, if using Gmail, look for 'show original message' and review SPF, DKIM, and DMARC results.' These are essentially methods that verify the emailer's domain to prevent spam, phishing attacks and other email security risks. To do this, click on the three-dot hamburger menu at the top right of your email and click 'Show Original.' 'All three should ideally pass authentication checks,' Iverson said. In other words, it would say 'PASS' next to all three options. Scammers have become very sophisticated when masking domains. As a result, beware of 'lookalike' domains with slight spelling variations. According to Iverson, if something seems too good (or too bad) to be true, it probably is. Another thing to keep an eye out for is if a scammer sends a message 'from' your own email address. Oftentimes, they are just spoofing your email address in the 'from' address header. 'These scammers don't have the time or ability to actually hack into your email accounts. They haven't found some secret treasure trove of compromising photos. They're just trying to scare unsuspecting people into coughing up money (or Bitcoin),' Iverson added. Don't click unfamiliar links, especially related to payments. If an email seems legitimate, you might accidentally click on the links it contains for more information. Zarik Megerdichian, founder of Loop8, a company that protects personal data and privacy from data breaches and hackers, strongly cautions against this. 'Exercise caution any time you're asked to click on a link in an email,' Megerdichian said. 'Bitcoin transactions are irreversible, as are many other common payment methods including Cash App and Zelle.' Further, scams that demand remuneration should be reported to the Federal Trade Commission by filing a report online or via phone. Megerdichian also noted that if a hacker has obtained details about your financials, monitor your bank accounts closely and dispute fraudulent charges with your bank, cancel your cards and preventatively stop future charges. It's also highly advisable when confronted with an elaborate scam to change all of your passwords. According to Yashin Manraj, CEO of Pvotal Technologies, a company that creates secure tech infrastructures for businesses, it's important to protect your data right away if you suspect it's been compromised. 'Use a new email address if possible and move critical financial or utilities to it, and then start reporting the case to the local police, the FBI and making sure your family is aware of the potential threat of a public shaming in the unlikely event that they did manage to steal some compromising data,' Manraj said. Do not engage with the scammer. It might feel tempting to respond to an email (especially ones that seem very realistic) to negotiate with the scammer. However, Manraj recommends disengaging and ignoring these emails because responding can actually place you on call logs and target databases that will make you vulnerable to further attacks. It's also advisable to isolate your home network via a separate Wi-Fi or router, using a VPN to connect to the internet. Most importantly, do not ask for specific help on public forums, especially when uploading logs or error messages. 'Be especially careful when using virtual numbers and password managers on unpopular websites to avoid reusing personally identified information that could be used to access your important financial services,' Manraj explained. Finally, be mindful about what data you are sharing in the future. Users should remember that data is a commodity, and businesses today collect too much information (often more than they need to complete the transaction at hand). When signing up for new websites or downloading apps, Megerdichian suggests avoiding oversharing. 'Always ask yourself, do they really need to know that? It's up to consumers to be proactive when it comes to their personal data,' Megerdichian said. HuffPost.

Google Warns This Email Means Your Gmail Is Under Attack
Google Warns This Email Means Your Gmail Is Under Attack

Forbes

time26-07-2025

  • Forbes

Google Warns This Email Means Your Gmail Is Under Attack

You do not want to get this email. With all the cyber security attacks compromising smartphones and PCs, it would be easy to conclude there's little you can do to stay safe. But the truth is very different. Most attacks are easily prevented with a few basic safeguards and some know-how. In reality, a number of simple changes can defend against most attacks. So it is with the FBI's two warnings this week. The first a resurgence of the Phantom Hacker attacks which trick PC users into installing rogue apps. And the second a raft of fake Chrome installs and updates which provide initial access for ransomware. If you just avoid installing linked apps in this way you will steer clear of those attacks. It's the same with a new Amazon impersonation attack that has surged 5000% in just two weeks. Don't click links in messages — even if they seem to come from Amazon. And now Gmail attack warnings are turning up again on social media, which will likely frustrate Google, because their advice has been clear but is not yet landing with users. The latest Gmail warnings come courtesy of a refreshed EasyDMARC article covering the 'no-reply' attacks from earlier this year, hijacking 'no-reply@ to trick users into clicking links and giving up their Google account sign-in credentials. Here again the advice is very simple. It shouldn't matter whether an email appears to come from Google. If it links to a sign-in page, it's an attack. Period. And that means any email that seems to come from Google but has a sign-in link must be deleted. 'Sometimes,' Google warns, 'hackers will copy Google's 'Suspicious sign-in prevented' emails and other official Google emails to try to steal someone's account information.' But the company tells all account holders that 'Google emails will never take you to a sign-in page. Authentic emails sent from Google to your Google Account will never ask you to sign in again to the account they were sent to.' It's as simple as that. Similarly, Google will never 'ask you to provide your password or other sensitive information by email or through a link, call you and ask for any forms of identification, including verification codes, send you a text message directing you to a sign-in page, or send a message via text or email asking you to forward a verification code.' With that in mind, you should not fall victim to these Google impersonation attacks, and if you stick to the basic rules on installs, links and attachments, then you'll likely stay safe from most of the other ones as well.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store