DMARC for UK SMEs; the email control that blocks brand spoofing, and why it’s still not enforced
March 11, 2026







Gibraltar: Wednesday, 11 March 2026 – 07:00 CET
DMARC for UK SMEs; the email control that blocks brand spoofing, and why most domains still do not enforce it
By: Iain Fraser – Cybersecurity Journalist
Published in Collaboration with SECURUS Communications
Google Indexed on: 110326 at 09:25 CET
SMECyberInsights.co.uk | First for SME Cybersecurity News
#SMECyberInsights #SMECybersecurity #SMECyberInsights #SME #CyberSafe #CyberSecurity #Cybersecurity #Phishing #DMARC
DMARC for UK SMEs; the email control that blocks brand spoofing, and why most domains still do not enforce it
If you run a UK SME, phishing is not an abstract risk. It is the daily reality behind invoice fraud, payroll diversion, and “urgent” supplier bank change requests. Attackers do not need to hack your network to cause damage. They only need to send an email that looks like it came from your domain, or from someone you trust.
That is why email authentication is showing up more often in sme cybersecurity news and advisory conversations. Analysts often describe DMARC as a foundational phishing defence, and some industry benchmarking suggests fewer than 10 percent of domains meaningfully enforce DMARC at a blocking level. Whether the exact figure is 8 percent or 18 percent, the practical point for UK small businesses is the same. Most organisations still allow their brand to be spoofed. That creates avoidable risk for customers, staff, and suppliers.
DMARC in plain English; what it does, and what it does not
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a DNS based policy that tells other mail systems what to do when emails claiming to be from your domain fail authentication checks. It also provides reporting so you can see who is sending mail “as you”.
DMARC works with two supporting controls:
* SPF (Sender Policy Framework); a DNS record listing which mail servers are allowed to send email for your domain.
* DKIM (DomainKeys Identified Mail); a cryptographic signature added to outgoing mail so recipients can verify the message has not been altered and is authorised by your domain.
What DMARC helps with:
* Stops direct domain spoofing; criminals cannot easily send “from yourdomain.co.uk” using random infrastructure if you enforce DMARC.
* Improves trust; it reduces customer and supplier exposure to impersonation.
What DMARC does not solve:
* If a real mailbox is compromised, the attacker can send authenticated email. As a result, DMARC must sit alongside MFA and access control.
NCSC guidance on email security and anti-spoofing covers DMARC, SPF and DKIM as practical steps to reduce impersonation risk. (Reference: NCSC Email security and anti-spoofing collection.)
Actionable guidance; a staged DMARC rollout that will not break your email
Most SMEs fail with DMARC for one reason. They jump to “reject” before they know which systems legitimately send email.
Step 1; inventory every sender
List every platform that sends email using your domain:
* Microsoft 365 or Google Workspace
* Marketing tools and newsletters
* CRM, ticketing, booking, invoicing, payroll
* Website contact forms and web servers
Step 2; fix SPF and enable DKIM
* Ensure you have one SPF record; keep it tidy.
* Enable DKIM signing for your main email platform and key third parties.
Step 3; publish DMARC in monitor mode
Start with p=none and set reporting addresses. Review reports weekly with your MSP or vCISO.
Step 4; move to quarantine, then reject
* Move to p=quarantine first.
* Then move to p=reject once reports show only legitimate sources are aligned.
Step 5; operationalise it
Add a simple rule. Any new supplier system that “sends email as us” must be added to the sender inventory and aligned before go live.
Compliance and best practice fit; Cyber Essentials, UK GDPR, and NIST
DMARC supports SME cyber security best practices by reducing spoofing, but it should be paired with controls that Cyber Essentials focuses on, such as access control, secure configuration, and patching. DMARC plus MFA (multi-factor authentication) on email admin accounts is a strong baseline for SME cyber resilience.
From a compliance for SMEs perspective, the ICO expects organisations to implement appropriate technical and organisational measures to protect personal data. Reducing impersonation and fraud risk through email authentication is a defensible, proportionate measure, especially where email is used for customer communications. (Reference: ICO Guide to data security.)
If you use NIST Cybersecurity Framework language with boards, DMARC is a clean “Protect” control, with reporting that supports “Detect”.
Quick checklist; what to ask your MSP this week
* Do we have SPF, DKIM, and DMARC published for all domains we use?
* Are we at p=none, quarantine, or reject; and what is the plan to progress?
* Who reviews DMARC reports; and how often?
* Is MFA enforced for email admins and high-risk users?
* Do we have a process for supplier and marketing platforms that send mail as our domain?
SECURUS Communications Ltd
Securus is a managed communications Operator, providing next-generation network infrastructure and value added services to Managed Hosting providers and the ‘cloud generation’ of enterprises. Securus priority is to offer communication services that represent excellent value for money and are backed by exceptional levels of support.
Contact Securus
Securus Communications Ltd
Station Road, Landmark house, Hook, England RG27 9HA, GB
T: Enquiries: 03451 283457 | Service Desk: 03451 283458
Securus on LinkedIn | Securus on “X” | https://securuscomms.com
