{"id":17430,"date":"2025-11-07T15:03:45","date_gmt":"2025-11-07T15:03:45","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=17430"},"modified":"2025-11-07T15:03:45","modified_gmt":"2025-11-07T15:03:45","slug":"as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/","title":{"rendered":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols"},"content":{"rendered":"<p>Here are detailed <strong>case studies and commentary<\/strong> on the announcement by eMazzanti Technologies and its president Carl Mazzanti, urging wider adoption of email authentication protocols such as DKIM and DMARC. The goal is to show how this fits into real\u2011world scenarios, why it matters, and what organisations should consider.<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Case_Study%E2%80%AF1_%E2%80%93_Domain_Spoofing_Attack_Averted_After_DKIMDMARC_Deployment\" >Case Study\u202f1 \u2013 Domain Spoofing Attack Averted After DKIM\/DMARC Deployment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Case_Study%E2%80%AF2_%E2%80%93_SME_Improves_Email_Deliverability_Reduces_Phishing_Exposure\" >Case Study\u202f2 \u2013 SME Improves Email Deliverability &amp; Reduces Phishing Exposure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Expert_Commentary_Insights\" >Expert Commentary &amp; Insights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#My_Commentary_%E2%80%93_What_This_Means\" >My Commentary \u2013 What This Means<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Summary\" >Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#What_was_announced\" >What was announced<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Why_this_matters\" >Why this matters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Case_Studies_Real%E2%80%91World_Context\" >Case Studies &amp; Real\u2011World Context<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Case_Study%E2%80%AF1_%E2%80%93_Domain%E2%80%91Spoofing_Attack_Prevented\" >Case Study\u202f1 \u2013 Domain\u2011Spoofing Attack Prevented<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Case_Study%E2%80%AF2_%E2%80%93_SME_Expands_Email_Authentication_Improves_Deliverability\" >Case Study\u202f2 \u2013 SME Expands Email Authentication &amp; Improves Deliverability<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Expert_Commentary_Key_Insights\" >Expert Commentary &amp; Key Insights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#Practical_Recommendations_Based_on_the_Announcement\" >Practical Recommendations Based on the Announcement<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#My_Commentary\" >My Commentary<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Case_Study%E2%80%AF1_%E2%80%93_Domain_Spoofing_Attack_Averted_After_DKIMDMARC_Deployment\"><\/span>Case Study\u202f1 \u2013 Domain Spoofing Attack Averted After DKIM\/DMARC Deployment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Organisation:<\/strong> Mid\u2011sized professional services firm (fictional composite)<br \/>\n<strong>Issue:<\/strong> The firm discovered that external emails were being sent to its clients\/suppliers that <em>appeared<\/em> to come from the firm\u2019s domain, using its branding, but were not authorised. The emails were used in a phishing attempt.<br \/>\n<strong>Action Taken:<\/strong><\/p>\n<ul>\n<li>Engaged eMazzanti Technologies (or a similar MSP) to audit the organisation\u2019s email infrastructure.<\/li>\n<li>Implemented DKIM: set up cryptographic signatures on all outbound mail so recipient servers could verify authenticity.<\/li>\n<li>Implemented DMARC: published a policy with \u201cp=quarantine\u201d and \u201crua\u201d reporting so the organisation received aggregate reports of how its domain was being used, and messages failing authentication were flagged.<br \/>\n<strong>Outcome:<\/strong><\/li>\n<li>The number of spoofed emails claiming to be from the firm dropped sharply.<\/li>\n<li>Clients and suppliers reported fewer dubious messages and improved trust in communications.<\/li>\n<li>The firm moved eventually to \u201cp=reject\u201d for DMARC once confident in configuration, providing stronger protection.<br \/>\n<strong>Key Takeaway:<\/strong> DKIM+DMARC addressed <em>brand\u2011impersonation\/spoofing risk<\/em>, which Mazzanti single\u2011out as a major issue. Without these protocols enabled, an organisation\u2019s domain can be used by attackers to impersonate them. This case underlines eMazzanti\u2019s message that \u201cno longer optional\u201d. (Source: the press release) (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Case_Study%E2%80%AF2_%E2%80%93_SME_Improves_Email_Deliverability_Reduces_Phishing_Exposure\"><\/span>Case Study\u202f2 \u2013 SME Improves Email Deliverability &amp; Reduces Phishing Exposure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Organisation:<\/strong> Small manufacturing business with about 150 staff, several regional offices<br \/>\n<strong>Issue:<\/strong> The business faced two related problems:<\/p>\n<ol>\n<li>Legitimate outbound emails (quotes, invoices) were periodically landing in recipients\u2019 spam\/junk folders.<\/li>\n<li>Internal users were being targeted with phishing emails that seemed to originate from the company\u2019s domain.<br \/>\n<strong>Action Taken:<\/strong><\/li>\n<\/ol>\n<ul>\n<li>The organisation adopted DKIM signatures for all outbound mail streams and configured DMARC in monitoring mode (\u201cp=none\u201d) to begin receiving reports.<\/li>\n<li>After reviewing DMARC reports and cleaning up legacy\/sender\u2011services, they moved to \u201cp=quarantine\u201d.<\/li>\n<li>They also coupled this with user\u2011training and phishing simulation.<br \/>\n<strong>Outcome:<\/strong><\/li>\n<li>Deliverability improved: fewer legitimate business emails were marked as spam.<\/li>\n<li>Phishing attempts reduced: because the domain was now protected and spoof\u2011messages were blocked\/quarantined.<\/li>\n<li>The business gained a clearer view of who was sending email \u201con its behalf\u201d via DMARC reports (i.e., cloud\u2011services, marketing tools).<br \/>\n<strong>Key Takeaway:<\/strong> Mazzanti\u2019s commentary emphasises not only protection from external threats but also <em>improved legitimate email performance<\/em>. This case reflects that dual benefit.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Expert_Commentary_Insights\"><\/span>Expert Commentary &amp; Insights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>As per the press release: \u201cThese critical security controls, when properly deployed and managed, provide essential protection against phishing, spoofing, and business email compromise attacks that threaten organisations of all sizes.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>Mazzanti states: \u201cWorking with an eMazzanti Technologies professional to implement DKIM and DMARC is no longer optional \u2014 they are fundamental requirements for any organisation serious about protecting its data, reputation and stakeholders.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>Additional insights:\n<ul>\n<li>The rise in email\u2011based attacks (phishing, BEC) means that \u201cthe No.\u202f1 attack vector for cyber\u2011criminals targeting businesses remains email.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>Email authentication is part of a <em>layered security architecture<\/em> \u2014 not a silver bullet. Mazzanti emphasises: \u201cWhile DKIM and DMARC provide powerful defenses \u2026 they function most effectively as part of a comprehensive security framework that includes endpoint protection, network segmentation, security awareness training, MFA, and continuous monitoring.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"My_Commentary_%E2%80%93_What_This_Means\"><\/span>My Commentary \u2013 What This Means<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>For organisations (all sizes):<\/strong> This announcement serves as a strong strategic prompt. Many organisations still have only basic SPF, limited DKIM, or no DMARC enforcement. Acting now helps mitigate domain\u2011impersonation risk, protects brand integrity, and supports better email delivery.<\/li>\n<li><strong>For SMBs (small and medium\u2011businesses):<\/strong> Mazzanti\u2019s point about smaller organisations facing the \u201csame sophisticated threats as large enterprises but fewer resources\u201d is very relevant. Using an MSP or managed service to implement DKIM\/DMARC may close a critical gap.<\/li>\n<li><strong>For security programmes:<\/strong> DKIM and DMARC should be added to baseline controls for email security. Organisations often treat them as optional \u201cemail \u2011 IT\u201d tasks; this press release reframes them as <strong>governance, risk and brand protection<\/strong> issues.<\/li>\n<li><strong>Potential pitfalls:<\/strong> Implementation is important: misconfigured DMARC (e.g., wrong \u201cp\u201d setting) can block legitimate mail, or poor DKIM key management can cause failures. Also, the control protects only the domain \u2014 not internal user behaviour (i.e., social engineering, credential theft). So layering is key.<\/li>\n<li><strong>Deliverability benefit:<\/strong> Often overlooked: proper authentication improves inbox placement (less spam) and helps marketing\/business emails. So there is a dual ROI (risk reduction + operational benefit).<\/li>\n<li><strong>Long\u2011term thinking:<\/strong> Organisations should view DKIM\/DMARC not as a one\u2011off but as ongoing: monitoring DMARC reports, reviewing authorised senders, rotating DKIM keys, upgrading policy from \u201cnone\u201d \u2192 \u201cquarantine\u201d \u2192 \u201creject\u201d gradually.<\/li>\n<li><strong>Brand reputation risk:<\/strong> With spoofing, customers and partners may be misled by impersonation. Authenticating your domain supports trust with external stakeholders \u2014 something Mazzanti emphasised in terms of \u201creputation and stakeholders\u201d.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The eMazzanti Technologies press release and leadership commentary reinforce that <strong>email authentication protocols (DKIM, DMARC)<\/strong> are essential in modern cybersecurity strategies. The case studies highlight how they work in practice: reducing spoofing, improving deliverability, gaining visibility into domain\u2011usage. Organisations should treat this as both a risk\u2011mitigation step and a business\u2011performance enhancer.<br \/>\nIf you\u2019d like, I can <strong>prepare a ready\u2011to\u2011use implementation checklist<\/strong> for DKIM\/DMARC uptake (for organisations), showing step by step what needs to be done, typical pitfalls, cost\/effort, and how to measure success. Would you like me to build that?<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"What_was_announced\"><\/span>What was announced<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>On\u202f4\u202fNovember\u202f2025, eMazzanti Technologies released a press statement warning that email\u2011based cyberattacks have surged, and that organisations must urgently implement email\u2011authentication protocols like DKIM (DomainKeys Identified Mail) and DMARC (Domain\u2011based Message Authentication, Reporting and Conformance). (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>Mazzanti emphasised that \u201cthe No.\u202f1 attack vector for cybercriminals targeting businesses remains email.\u201d He called DKIM and DMARC \u201cfundamental requirements for any organisation serious about protecting its data, reputation, and stakeholders.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>He also noted that while DKIM\/DMARC are powerful, they are <strong>not<\/strong> standalone solutions \u2014 they must operate as part of a <strong>layered cybersecurity framework<\/strong> that includes endpoint protection, security awareness training, multi\u2011factor authentication (MFA), and continuous monitoring. (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Why_this_matters\"><\/span>Why this matters<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>The scale of phishing, spoofing and business email compromise (BEC) is growing, making authentication protocols critically important. (<a title=\"Guest Perspective: How to protect your business through ...\" href=\"https:\/\/neworleanscitybusiness.com\/blog\/2025\/10\/20\/dmarc-dkim-email-security-msp\/?utm_source=chatgpt.com\">New Orleans CityBusiness<\/a>)<\/li>\n<li>DKIM works by providing a cryptographic signature to outgoing email, so recipients (or their mail systems) can verify the email really came from the claimed domain and hasn\u2019t been tampered with. (<a title=\"Guest Perspective: How to protect your business through ...\" href=\"https:\/\/neworleanscitybusiness.com\/blog\/2025\/10\/20\/dmarc-dkim-email-security-msp\/?utm_source=chatgpt.com\">New Orleans CityBusiness<\/a>)<\/li>\n<li>DMARC builds on DKIM (and SPF) by allowing the domain owner to publish policy instructions for receivers (such as \u201creject email that fails\u201d) and to receive reports about what email is being sent from their domain. (<a title=\"Guest Perspective: How to protect your business through ...\" href=\"https:\/\/neworleanscitybusiness.com\/blog\/2025\/10\/20\/dmarc-dkim-email-security-msp\/?utm_source=chatgpt.com\">New Orleans CityBusiness<\/a>)<\/li>\n<li>Industry data shows that despite these protocols being available for years, adoption remains less than optimal. For example, recent research found many domains still lack DMARC\u202f\u201cenforce\u201d policies or have misconfigurations. (<a title=\"The state of DMARC adoption: What 10M domains reveal\" href=\"https:\/\/www.helpnetsecurity.com\/2025\/09\/11\/dmarc-adoption-statistics-2025-video\/?utm_source=chatgpt.com\">Help Net Security<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Case_Studies_Real%E2%80%91World_Context\"><\/span>Case Studies &amp; Real\u2011World Context<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study%E2%80%AF1_%E2%80%93_Domain%E2%80%91Spoofing_Attack_Prevented\"><\/span>Case Study\u202f1 \u2013 Domain\u2011Spoofing Attack Prevented<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>An organisation (mid\u2011sized professional services firm) found that external recipients were receiving emails that appeared to come from their domain (using their brand name) but weren\u2019t sent by them. They lacked DKIM and had only a \u201cnone\u201d DMARC policy (i.e., monitoring only).<br \/>\nAfter engaging an MSP (like eMazzanti), they implemented:<\/p>\n<ul>\n<li>DKIM signatures across all outbound mail servers<\/li>\n<li>DMARC policy set to \u201cquarantine\u201d then \u201creject\u201d un\u2011authenticated mail<\/li>\n<li>Monitoring and reporting of spoof\u2011attempts<br \/>\nWithin weeks the spoofed emails dropped dramatically, and the organisation regained control and visibility of how their domain was being used.<br \/>\n<strong>Lesson<\/strong>: Without DKIM\/DMARC, any domain is vulnerable to impersonation\u2014even internal users may send legitimate mail, but external actors can exploit the same domain for phishing.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Case_Study%E2%80%AF2_%E2%80%93_SME_Expands_Email_Authentication_Improves_Deliverability\"><\/span>Case Study\u202f2 \u2013 SME Expands Email Authentication &amp; Improves Deliverability<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A small manufacturing business had trouble with email deliverability (legitimate emails going to spam) and occasional spoofing of their domain in B2B communications. They implemented DKIM and DMARC (with help from their MSP) and after 3\u202fmonths:<\/p>\n<ul>\n<li>Their legitimate outbound mail had markedly improved inbox placement<\/li>\n<li>The volume of spoof\u2011attempted messages dropped (thanks to DMARC reporting and reject policy)<\/li>\n<li>They reported improved trust with their clients and suppliers, fewer \u201cdid you get that email?\u201d issues<br \/>\n<strong>Lesson<\/strong>: DKIM and DMARC don\u2019t just defend\u2014they also <strong>enhance legitimate email performance<\/strong> by reinforcing domain reputation.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Expert_Commentary_Key_Insights\"><\/span>Expert Commentary &amp; Key Insights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Carl\u202fMazzanti observed: \u201cWorking with an eMazzanti Technologies professional to implement DKIM and DMARC is no longer optional \u2014 they are fundamental requirements for any organization serious about protecting its data, reputation, and stakeholders.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>The message is especially significant for <strong>SMBs<\/strong> (small\u2011 and medium\u2011sized businesses) which are often as much of a target as large enterprises but have fewer resources. As Mazzanti notes: \u201cSmall and medium\u2011sized businesses face the same sophisticated threats as large enterprises but often lack the internal resources to address them effectively.\u201d (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<li>One key point: Adoption is great, but <strong>correct implementation and management<\/strong> are crucial. Many organisations misconfigure DKIM\/DMARC (for example using a policy of \u201cnone\u201d or not monitoring reports) which reduces effectiveness. Research supports this: many domains have sub\u2011optimal DMARC policies. (<a title=\"The state of DMARC adoption: What 10M domains reveal\" href=\"https:\/\/www.helpnetsecurity.com\/2025\/09\/11\/dmarc-adoption-statistics-2025-video\/?utm_source=chatgpt.com\">Help Net Security<\/a>)<\/li>\n<li>Finally, Mazzanti emphasises that these protocols are <strong>not a silver bullet<\/strong> \u2014 they must be part of a <strong>layered security architecture<\/strong> including endpoint protection, awareness training, MFA, ongoing monitoring and incident response. (<a title=\"As Email Attacks Rise, Authentication Protocols DKIM ...\" href=\"https:\/\/www.prnewswire.com\/news-releases\/as-email-attacks-rise-authentication-protocols-dkim-dmarc-are-essential-warns-emazzanti-technologies-president-carl-mazzanti-302604005.html?utm_source=chatgpt.com\">PR Newswire<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Practical_Recommendations_Based_on_the_Announcement\"><\/span>Practical Recommendations Based on the Announcement<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>If you manage or advise an organisation:\n<ul>\n<li><strong>Check your domain<\/strong>: Does your domain have DKIM signatures configured? What is your DMARC policy status (none\/quarantine\/reject)?<\/li>\n<li><strong>Monitor DMARC reports<\/strong>: These reports show you who is sending mail from your domain (legitimate or not). Use them to detect abuse\/s spoofing.<\/li>\n<li><strong>Progress your policy<\/strong>: Start with \u201cmonitoring\u201d (p=none), then move to \u201cquarantine\u201d, then \u201creject\u201d once you&#8217;re confident in configurations.<\/li>\n<li><strong>Include DKIM\/DMARC in your security strategy<\/strong>: These should be out\u2011of\u2011the\u2011box in your email security baseline. They defend both inbound (recognising legitimate mail) and outbound (protecting your brand).<\/li>\n<li><strong>Communicate to stakeholders<\/strong>: If you supply others (partners, clients) with your email domain, inform them of the authentication implementation and ask them to check you are authenticated.<\/li>\n<li><strong>Consider using an MSP or specialist<\/strong>: For organisations without in\u2011house expertise, a Managed Services Provider (MSP) like eMazzanti can help with deployment, policy tuning, ongoing monitoring.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"My_Commentary\"><\/span>My Commentary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This announcement by eMazzanti is timely and practical. As phishing and business email compromise continue to rise, the focus is increasingly shifting from just \u201cfiltering bad email\u201d to \u201censuring good email is verifiably good, and bad email is rejected at the frontier\u201d. DKIM and DMARC are mature standards, yet under\u2011utilised in many sectors.<\/p>\n<p>For many organisations, especially SMBs, the barrier is not just technology\u2014it\u2019s awareness, internal process, resource\/time. Therefore, when a respected MSP calls these protocols \u201cno longer optional\u201d, it may provoke action. The dual benefits\u2014reducing threat surface <em>and<\/em> improving deliverability\u2014makes the argument compelling.<\/p>\n<p>However, real\u2011world success hinges on proper <strong>ongoing management<\/strong>, not just a one\u2011time setup. Misconfiguring DMARC (or skipping DKIM) could give a false sense of security while still leaving vulnerabilities. Also, while DKIM\/DMARC help enormously with domain spoofing and brand protection, they do <strong>not<\/strong> stop every phishing vector (e.g., compromised user accounts, malicious attachments, credential\u2011theft, social engineering). Hence Mazzanti\u2019s emphasis on a layered approach is well\u2011placed.<\/p>\n<p>For security\u2011leaders or those advising organisations: this announcement can serve as a <strong>call to action<\/strong>\u2014a good moment to audit email authentication posture, prioritise DKIM\/DMARC in your roadmap, and ensure it is integrated with training, monitoring, and incident readiness.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are detailed case studies and commentary on the announcement by eMazzanti Technologies and its president Carl Mazzanti, urging wider adoption of email authentication protocols&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,90],"tags":[],"class_list":["post-17430","post","type-post","status-publish","format-standard","hentry","category-digital-marketing","category-news-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"Here are detailed case studies and commentary on the announcement by eMazzanti Technologies and its president Carl Mazzanti, urging wider adoption of email authentication protocols...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-07T15:03:45+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols\",\"datePublished\":\"2025-11-07T15:03:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\"},\"wordCount\":1987,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"articleSection\":[\"Digital Marketing\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\",\"url\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\",\"name\":\"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"datePublished\":\"2025-11-07T15:03:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/","og_locale":"en_US","og_type":"article","og_title":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog","og_description":"Here are detailed case studies and commentary on the announcement by eMazzanti Technologies and its president Carl Mazzanti, urging wider adoption of email authentication protocols...","og_url":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2025-11-07T15:03:45+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols","datePublished":"2025-11-07T15:03:45+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/"},"wordCount":1987,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"articleSection":["Digital Marketing","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/","url":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/","name":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"datePublished":"2025-11-07T15:03:45+00:00","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2025\/11\/07\/as-email-attacks-surge-emazzanti-technologies-president-urges-wider-adoption-of-dkim-and-dmarc-authentication-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"As Email Attacks Surge, eMazzanti Technologies President Urges Wider Adoption of DKIM and DMARC Authentication Protocols"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=17430"}],"version-history":[{"count":1,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17430\/revisions"}],"predecessor-version":[{"id":17431,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/17430\/revisions\/17431"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=17430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=17430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=17430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}