{"id":90770,"date":"2023-09-21T07:00:00","date_gmt":"2023-09-21T14:00:00","guid":{"rendered":"https:\/\/honeybook-blog.site.strattic.io\/?p=90770"},"modified":"2023-09-21T07:28:01","modified_gmt":"2023-09-21T14:28:01","slug":"what-is-dkim","status":"publish","type":"post","link":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/what-is-dkim","title":{"rendered":"What is DKIM and how does it work?"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em><em><em><em><em>What is DKIM authentication? Learn about what DKIM signatures are and how they can help secure your messages.<\/em><\/em><\/em><\/em><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"793\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-1024x793.jpg\" alt=\"\" class=\"wp-image-90771\" srcset=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-1024x793.jpg 1024w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-300x232.jpg 300w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-768x594.jpg 768w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-1536x1189.jpg 1536w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Spoofing is one of the most common scams that impact businesses and consumers alike. This is when a hacker hides their true email and uses a company\u2019s domain email, and often some very convincing visuals, to fool its customers into providing personal information.\u00a0<\/p>\n\n\n\n<p>This practice creates some serious issues. Cyber scams have resulted in&nbsp;<a href=\"https:\/\/alluresecurity.com\/2023\/03\/30\/fbi-new-record-for-2022-cyber-enabled-fraud-in-us-driven-by-phishing-investment-scams-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">more than $10 billion<\/a> in annual losses, many of them attributed to spoofing. The good news is that there are ways to protect your brand and your clients from email-related scams. One of the most effective is known as DKIM authentication. &nbsp;<\/p>\n\n\n\n<p><strong>Jump to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is\">What is DKIM?<\/a><\/li>\n\n\n\n<li><a href=\"#signatures\">DKIM signa<\/a><a href=\"#signature\">t<\/a><a href=\"#signatures\">ures<\/a><\/li>\n\n\n\n<li><a href=\"#selector\">DKIM selectors<\/a><\/li>\n\n\n\n<li><a href=\"#why-is\">Why is a DKIM important?<\/a><\/li>\n<\/ul>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">What is DKIM?<\/h2>\n\n\n\n<p>Domain keys identified mail (DKIM) is&nbsp;a type of email authentication. Its function is to guarantee that nothing has intercepted or tampered with the email the end user receives\u2014in other words, that hackers haven\u2019t intercepted the email to make changes to the \u201cfrom\u201d address in an attempt to scam the receiver.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How does DKIM authentication work?&nbsp;<\/h4>\n\n\n\n<p>DKIM authentication works by giving an email recipient a way to verify that it actually came from the authorized sender. To do so, emails that use DKIM authentication include a cryptographic signature (an encrypted header) added to each message.&nbsp;<\/p>\n\n\n\n<p>So, how does the receiver decrypt the header, or&nbsp;DKIM signature, to verify the authenticity of the sender?<\/p>\n\n\n\n<p>The domain owner adds a DKIM record, also known as the&nbsp;DKIM key, to its <a href=\"https:\/\/www.domain.com\/help\/article\/what-is-dns-record\">domain name system<\/a> (DNS) record. The domain owner can choose to add as many DKIM records as they\u2019d like without a need for any special certifications. The email recipient\u2019s server can access this record and use its public key to decrypt the header\u2019s DKIM signature, thereby verifying its authenticity.&nbsp;<\/p>\n\n\n\n<p>Keep in mind, DKIM doesn\u2019t offer end-to-end encryption. It simply proves the message left the sending server and made it to the receiving server without being intercepted and tampered with. The only encryption involved in DKIM authentication is the encrypted DKIM signature in the email\u2019s header.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-ugb-container ugb-container cta-pro-tip ugb-0041221 ugb-container--v2 ugb-container--design-basic ugb-main-block\"><style>.ugb-0041221-wrapper.ugb-container__wrapper{padding-top:0 !important;padding-bottom:0 !important}.ugb-0041221-wrapper > .ugb-container__side{padding-top:35px !important;padding-bottom:35px !important}@media screen and (min-width:768px){.ugb-0041221.ugb-container{padding-top:0px !important}}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-0041221-wrapper\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-0041221-content-wrapper\">\n<div class=\"wp-block-ugb-columns ugb-columns ugb-c9eef97 ugb-columns--design-plain ugb-columns--columns-2 ugb-main-block\"><style>.ugb-c9eef97 > .ugb-inner-block > .ugb-block-content > .ugb-columns__item{grid-template-columns:0.20fr 1.80fr !important}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-columns__item ugb-c9eef97-content-wrapper\">\n<div class=\"wp-block-ugb-column ugb-column ugb-381f79f ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-381f79f-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/03\/asset-4.svg\" alt=\"\" class=\"wp-image-83436\"\/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-ugb-column ugb-column ugb-97eb796 ugb-column--design-plain ugb-main-block\"><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-column__item ugb-97eb796-column-wrapper\"><div class=\"ugb-column__content-wrapper\">\n<h4 class=\"wp-block-heading\"><strong>Pro tip<\/strong> <\/h4>\n\n\n\n<p>If you\u2019re a domain owner, you can test your DKIM records and signature with one of many free DKIM analyzers on the web.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<span id=\"signature\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">What is a DKIM signature?<\/h2>\n\n\n\n<p>A DKIM signature is an encrypted header that mail servers add to emails before sending. The receiving server uses the private keys that the sender provided in its DNS record to decrypt and validate the signature.&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns cta-related-posts is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"related-post-heading\">Related Post<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/can-spam-act\" target=\"_blank\" rel=\"noreferrer noopener\">The CAN-SPAM Act: what is it, and how does it affect email deliverability?<\/a><\/h4>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" width=\"1024\" height=\"793\" src=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2-1024x793.jpg\" alt=\"\" class=\"wp-image-89372\" srcset=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2-1024x793.jpg 1024w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2-300x232.jpg 300w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2-768x594.jpg 768w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2-1536x1189.jpg 1536w, https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/08\/CAN-SPAM-2.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<span id=\"selector\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">What is a DKIM selector?<\/h2>\n\n\n\n<p>DKIM selectors are sets of instructions from the sender\u2019s DNS record that tell the receiving mail server which specific DKIM public key record it should use to decrypt the DKIM signature. The DKIM selector appears as an \u201cs=\u201d tag in the DKIM signature.&nbsp;<\/p>\n\n\n\n<span id=\"why-is\"><\/span>\n\n\n\n<h2 class=\"wp-block-heading\">Why is a DKIM important?<\/h2>\n\n\n\n<p>There are several reasons why it\u2019s important to use DKIM signatures for your business\u2019s emails. Not only do they help prevent your emails from falling into a spam folder, but they could also protect your clients from malicious attacks.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Avoid spam folders<\/h4>\n\n\n\n<p>The last thing you want is for messages you send to your clients to&nbsp;end up in spam folders. That\u2019s a waste of time and money, and it could result in your clients missing out on important updates. This can lead to a poor user experience that may damage your credibility and reputation.&nbsp;<\/p>\n\n\n\n<p>When you use DKIM signatures, you don\u2019t pique the interest of spam&nbsp;<a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/email-filtering\" target=\"_blank\" rel=\"noreferrer noopener\">email filters<\/a>.&nbsp;<\/p>\n\n\n\n<p>Why? The reason is simple. When the recipient server receives a message with a DKIM signature, it\u2019s able to validate the sender\u2019s identity. This validation will prove that you\u2019re a real sender, not a spam bot, so you\u2019ll&nbsp;<a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/prevent-emails-from-going-to-spam\" target=\"_blank\" rel=\"noreferrer noopener\">make it into most inboxes<\/a>. So, be sure to steer clear of being spammy with your email marketing.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Prevent spoofing and phishing attacks<\/h4>\n\n\n\n<p>Scammers send more than&nbsp;<a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/phishing-attack-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">3 billion phishin<\/a>g emails every single day. No wonder these emails cost the U.S. economy billions of dollars per year. The good news is that there are several ways to defend yourself and your clients against phishing attacks.&nbsp;<\/p>\n\n\n\n<p>DKIM signatures are one way to reduce the chances of your clients becoming data phishing victims. That\u2019s because, when you use them, your clients\u2019 incoming mail servers will be able to recognize the difference between your emails and the ones that are phishing for data.&nbsp;<\/p>\n\n\n\n<p>Moreover, these DKIM signatures can also prevent spoofing attacks, in which scammers hide their real email behind a fake company email address. Since you\u2019re using DKIM signatures, the receiving server will have a way to determine if the message is valid, throwing all fake messages that only appear to be from your domain name right into the spam folder.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Increase your email integrity<\/h4>\n\n\n\n<p>Sometimes scammers will attempt to hack an email as it travels from point A to point B. If they succeed, they will be able to tamper with the message. This can become a significant problem for you and your clients.&nbsp;<\/p>\n\n\n\n<p>DKIM signatures only show up if no one has tampered with the final message. As such, you can be sure that using them will protect your messages from interception and interference before they reach your clients.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Is DKIM all you need for completely secure emails?<\/h4>\n\n\n\n<p>DKIM authentication is an important aspect of creating a meaningful email security ecosystem for your business, but it\u2019s not the only aspect you should consider. DKIM can work with other email authentication standards like domain-based message authentication, reporting and conformance (DMARC), and sender policy framework (SPF). It\u2019s important to use all available email authentication standards to ensure that your sending domain gains and maintains a positive reputation for thoroughness and&nbsp;<a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/email-deliverability\" target=\"_blank\" rel=\"noreferrer noopener\">strong email deliverability<\/a>.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What are the differences between DKIM, SPF, and DMARC authentication?<\/h4>\n\n\n\n<p>Here\u2019s a breakdown of the differences between these three common types of email authentication:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DKIM: This method adds a digital signature, verifying that the email was sent by the domain it says it\u2019s from. It also verifies that the email wasn\u2019t changed in transit.&nbsp;<\/li>\n\n\n\n<li>SPF: This type of authentication verifies the sending mail server by looking for it in a list of the domain\u2019s authorized servers. If the server doesn\u2019t appear, SPF blocks the email or sends it to spam.&nbsp;<\/li>\n\n\n\n<li>DMARC: This approach takes advantage of both technologies. Most notably, DMARC authentication tells email receivers how they should handle unauthenticated messages. So, while DKIM and SPF offer their own layers of security, DMARC makes it possible to give the receiving server-specific instructions about how to handle incoming mail. This helps to further reduce the risk of their domain being used in spoofing or phishing attacks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How HoneyBook can help<\/strong><\/h2>\n\n\n\n<p>HoneyBook is a complete clientflow management platform. When you use HoneyBook, you\u2019re able to manage all of your client touchpoints in one place, including filtering, viewing, and sending client emails. If you use a custom domain name through Gmail, you can use HoneyBook\u2019s authentication tracker to ensure your emails are authenticated and your clients receive your transaction emails\u2014every time.<\/p>\n\n\n\n<p><a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">Start your free trial<\/a> now to see how HoneyBook can help you better manage your email-based client communications along with all other client flow tasks.&nbsp;<\/p>\n\n\n\n<div class=\"aligncenter wp-block-ugb-container ugb-container ugb-6bb1d93 ugb-container--v2 ugb-container--design-basic ugb-main-block\"><style>.ugb-6bb1d93-wrapper.ugb-container__wrapper{border-radius:12px !important;background-image:url(https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/03\/Banner-CTA-Background2.jpg)}.ugb-6bb1d93-wrapper.ugb-container__wrapper:before{opacity:0.5}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-container__wrapper ugb-6bb1d93-wrapper ugb--has-background-overlay\"><div class=\"ugb-container__side\"><div class=\"ugb-container__content-wrapper ugb-6bb1d93-content-wrapper\">\n<h2 class=\"wp-block-heading has-text-align-center\">Stay current on email best practices<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Get the top tips on independent business management straight from the experts.<\/p>\n\n\n\n<div class=\"wp-block-ugb-button ugb-button-wrapper ugb-9def6fd ugb-main-block\"><style>.ugb-9def6fd .ugb-button1{background-color:#000000}.ugb-9def6fd .ugb-button1 .ugb-button--inner,.ugb-9def6fd .ugb-button1 svg:not(.ugb-custom-icon){color:#ffffff !important}<\/style><div class=\"ugb-inner-block\"><div class=\"ugb-block-content\"><div class=\"ugb-button-container\"><a class=\"ugb-button1 ugb-button ugb-button--size-normal\" href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/newsletter-sign-up\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"\"><span class=\"ugb-button--inner\">Join our newsletter<\/span><\/a><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is DKIM authentication? Learn about what DKIM signatures are and how they can help secure your messages. Spoofing is one of the most common scams that impact businesses and consumers alike. This is when a hacker hides their true email and uses a company\u2019s domain email, and often some very convincing visuals, to fool [&hellip;]<\/p>\n","protected":false},"author":840,"featured_media":90771,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20],"tags":[542,508,540,311],"class_list":["post-90770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-best-practices","tag-business-best-practices","tag-client-communication","tag-email-deliverability","tag-email-marketing"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg",2000,1548,false],"thumbnail":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-150x150.jpg",150,150,true],"medium":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-300x232.jpg",300,232,true],"medium_large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-768x594.jpg",768,594,true],"large":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-1024x793.jpg",1024,793,true],"1536x1536":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM-1536x1189.jpg",1536,1189,true],"2048x2048":["https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg",2000,1548,false]},"post_excerpt_stackable_v2":"<p>What is DKIM authentication? Learn about what DKIM signatures are and how they can help secure your messages. Spoofing is one of the most common scams that impact businesses and consumers alike. This is when a hacker hides their true email and uses a company\u2019s domain email, and often some very convincing visuals, to fool its customers into providing personal information.\u00a0 This practice creates some serious issues. Cyber scams have resulted in&nbsp;more than $10 billion in annual losses, many of them attributed to spoofing. The good news is that there are ways to protect your brand and your clients from&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/category\/business-best-practices\" rel=\"category tag\">Business best practices<\/a>","author_info_v2":{"name":"Joshua Rodriguez","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/joshua-rodriguez"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is DKIM and How Does It Work? | HoneyBook<\/title>\n<meta name=\"description\" content=\"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DKIM and How Does It Work? | HoneyBook\" \/>\n<meta property=\"og:description\" content=\"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim\" \/>\n<meta property=\"og:site_name\" content=\"HoneyBook\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/honeybook.co\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-21T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T14:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joshua Rodriguez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@honeybook\" \/>\n<meta name=\"twitter:site\" content=\"@honeybook\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Rodriguez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim\",\"name\":\"What Is DKIM and How Does It Work? | HoneyBook\",\"isPartOf\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg\",\"datePublished\":\"2023-09-21T14:00:00+00:00\",\"dateModified\":\"2023-09-21T14:28:01+00:00\",\"author\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/acd1251cff2e5cce85f5eb1fb90ead98\"},\"description\":\"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage\",\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg\",\"contentUrl\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg\",\"width\":2000,\"height\":1548},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hbb.reliablepenguin.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business best practices\",\"item\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is DKIM and how does it work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/\",\"name\":\"HoneyBook\",\"description\":\"Resources to empower independent business owners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/acd1251cff2e5cce85f5eb1fb90ead98\",\"name\":\"Joshua Rodriguez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bcb79b41208ee6495873ce26db9d2a737a6ab44c7fbc4069d5d25c34af13841d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bcb79b41208ee6495873ce26db9d2a737a6ab44c7fbc4069d5d25c34af13841d?s=96&d=mm&r=g\",\"caption\":\"Joshua Rodriguez\"},\"description\":\"Joshua is a personal finance and investing writer with more than 10 years of experience. His work has been featured on several mainstream websites and his expertise is followed by tens of thousands of readers every month.\",\"url\":\"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/joshua-rodriguez\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is DKIM and How Does It Work? | HoneyBook","description":"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim","og_locale":"en_US","og_type":"article","og_title":"What Is DKIM and How Does It Work? | HoneyBook","og_description":"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.","og_url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim","og_site_name":"HoneyBook","article_publisher":"https:\/\/www.facebook.com\/honeybook.co","article_published_time":"2023-09-21T14:00:00+00:00","article_modified_time":"2023-09-21T14:28:01+00:00","og_image":[{"width":2000,"height":1548,"url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg","type":"image\/jpeg"}],"author":"Joshua Rodriguez","twitter_card":"summary_large_image","twitter_creator":"@honeybook","twitter_site":"@honeybook","twitter_misc":{"Written by":"Joshua Rodriguez","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim","name":"What Is DKIM and How Does It Work? | HoneyBook","isPartOf":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage"},"image":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage"},"thumbnailUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg","datePublished":"2023-09-21T14:00:00+00:00","dateModified":"2023-09-21T14:28:01+00:00","author":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/acd1251cff2e5cce85f5eb1fb90ead98"},"description":"What is DKIM authentication? Learn about how DKIM signatures can help secure your messages and protect you from spoofing scams.","breadcrumb":{"@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#primaryimage","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg","contentUrl":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/09\/What-is-DKIM.jpg","width":2000,"height":1548},{"@type":"BreadcrumbList","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/what-is-dkim#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hbb.reliablepenguin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business best practices","item":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices"},{"@type":"ListItem","position":3,"name":"What is DKIM and how does it work?"}]},{"@type":"WebSite","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#website","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/","name":"HoneyBook","description":"Resources to empower independent business owners","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/acd1251cff2e5cce85f5eb1fb90ead98","name":"Joshua Rodriguez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bcb79b41208ee6495873ce26db9d2a737a6ab44c7fbc4069d5d25c34af13841d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bcb79b41208ee6495873ce26db9d2a737a6ab44c7fbc4069d5d25c34af13841d?s=96&d=mm&r=g","caption":"Joshua Rodriguez"},"description":"Joshua is a personal finance and investing writer with more than 10 years of experience. His work has been featured on several mainstream websites and his expertise is followed by tens of thousands of readers every month.","url":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/author\/joshua-rodriguez"}]}},"_links":{"self":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/90770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/users\/840"}],"replies":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/comments?post=90770"}],"version-history":[{"count":0,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/90770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media\/90771"}],"wp:attachment":[{"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media?parent=90770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/categories?post=90770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hbb.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/tags?post=90770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}