Startup Security

We Scanned Startups for Email Spoofing Risk. Zero Had Full Protection.

We checked DMARC and SPF across 31 Indian SaaS startups. None had full enforcement. Here's what we found and how to fix it in 5 minutes.

AK&RG
Ashok Kamat & Rathnakara GN
Cyber Secify
5 min read

We’re building a brand protection tool for startups. As part of our research, we scanned 31 Indian SaaS startups (most based in Bengaluru) for email authentication and brand impersonation risks. These were companies in our outreach pipeline, all funded, mostly Seed to Series B, all actively shipping products.

The results were worse than expected.

The Numbers

Out of 31 startups we scanned:

  • 35% have no DMARC record at all. Their domains have zero email spoofing protection. Anyone can send emails as @theircompany.com and those emails will land in inboxes looking legitimate.
  • 41% have DMARC but set to p=none. They’re monitoring but not blocking. Spoofed emails still get delivered.
  • 22% have no SPF record. No list of authorized email senders. Any server in the world can claim to send email for their domain.
  • 76% have either no DMARC or DMARC in monitor-only mode. Combined, that means three out of four startups have no real protection against someone sending email as their domain.
  • 0% had full protection (DMARC at p=reject with strict SPF). Zero. Not a single startup we scanned was actually enforcing email authentication.

Every single domain we checked had active MX records, meaning they all actively send and receive email. The attack surface is real.

Methodology note: We used our internal scanning tool to check DNS records for SPF, DKIM, and DMARC across the sample. The scan verifies the presence of records and the enforcement level of any DMARC policy. This is a snapshot of one sample of funded SaaS startups, not a national survey.

What This Means in Practice

If your domain has no DMARC and no SPF, here is what someone can do right now:

Send invoices to your clients as you. An attacker sends an email from accounts@yourcompany.com with a fake invoice and a different bank account number. Your client pays. You never sent the email. The email looks legitimate because your domain has no rules saying it shouldn’t.

Phish your own employees. An email from ceo@yourcompany.com asking the finance team to process an urgent wire transfer. Internal emails from your own domain are trusted implicitly. Without DMARC, there’s nothing to stop this.

Damage investor trust during due diligence. A Series A investor’s security team runs the same check we did. They see no DMARC, no SPF, and flag it in their assessment. Your fundraise slows down over something that takes 5 minutes to fix.

Undermine enterprise sales. An enterprise buyer’s procurement team checks your domain before signing. No email authentication shows up as a basic security gap. If you can’t protect your own email, why would they trust you with their data?

Why Most Startups Don’t Have This

It’s not negligence. It’s a gap in awareness.

Most CTOs and founders know about application security. They know about SQL injection, access control, API security. These are the things that come up in pentests and code reviews.

Email authentication (DMARC, SPF, DKIM) sits in the DNS configuration layer. Nobody teaches it in engineering courses. It doesn’t show up in OWASP Top 10. Your DevOps engineer might not know it exists unless they’ve specifically dealt with email deliverability issues.

The result: startups that build secure applications but leave their domain wide open for email spoofing.

How to Check Your Own Domain

Run these two commands in your terminal:

Check DMARC:

dig TXT _dmarc.yourdomain.com +short

If you see nothing, you have no DMARC. If you see v=DMARC1; p=none, you’re monitoring but not blocking.

Check SPF:

dig TXT yourdomain.com +short | grep spf

If you see nothing with “spf” in it, you have no SPF.

How to Fix It (5 Minutes)

Step 1: Add SPF record

Go to your DNS provider (Cloudflare, Route53, GoDaddy, wherever your domain DNS is managed). Add a TXT record:

  • Name: @ (or your domain)
  • Value: v=spf1 include:_spf.google.com ~all

If you use Google Workspace, this is the right value. If you use other email providers, add their SPF include. For example:

  • Zoho: include:zoho.in
  • Microsoft 365: include:spf.protection.outlook.com
  • Resend: include:resend.com

Multiple providers: v=spf1 include:_spf.google.com include:resend.com ~all

Step 2: Add DMARC record

Add another TXT record:

  • Name: _dmarc
  • Value: v=DMARC1; p=none; rua=mailto:your@email.com

This starts in monitor mode. You’ll receive reports showing who is sending email as your domain.

Step 3: Upgrade over 4-6 weeks

  • After 2 weeks of monitoring: change p=none to p=quarantine
  • After 2 more weeks: change p=quarantine to p=reject

At p=reject, spoofed emails are blocked by compliant mail servers. Your domain is protected.

What We Learned Building the Tool

We built this scanning capability as part of a brand protection product we’re developing for startups. The email authentication check is one module. The full tool also scans for:

  • Domains registered under your brand name across 1,700+ TLD extensions
  • Lookalike domains with email infrastructure that could impersonate you
  • SSL certificates using your brand name
  • Active websites mentioning your brand

While building this, we wanted to understand how startups in Bengaluru actually handle brand protection. The answer, based on this scan: most don’t. Not because they don’t care, but because nobody flagged it.

If you’re a founder or CTO at a Bengaluru startup and want to check your own domain, reach out. We’re happy to share your specific findings as part of our research.

How We Scanned

This scan used publicly available DNS records only. No intrusive testing was performed. We queried DMARC and SPF TXT records, the same checks any mail server runs when it receives an email from your domain. No authentication was attempted, no systems were accessed, and no vulnerability testing was conducted.

Check your email security | How we approach security assessments | Cyber Threat Intelligence services | Talk to us

Frequently Asked Questions

What is DMARC and why does my startup need it?

DMARC (Domain-based Message Authentication, Reporting, and Conformance) tells receiving mail servers what to do when someone sends an email pretending to be from your domain. Without DMARC, anyone can send emails as @yourcompany.com and they will be delivered to your clients' inboxes looking legitimate.

What is SPF and how is it different from DMARC?

SPF (Sender Policy Framework) lists which servers are authorized to send email for your domain. DMARC builds on SPF by telling receivers what to do when an email fails the SPF check (deliver it anyway, quarantine it, or reject it). You need both.

How long does it take to set up DMARC and SPF?

About 5 minutes. You add two TXT records to your DNS. SPF lists your authorized email providers (Google Workspace, Resend, etc.). DMARC starts at p=none (monitor) and upgrades to p=reject over 4-6 weeks.

Will adding DMARC break my existing email?

Not if you start with p=none (monitor only). This lets you see who is sending email as your domain without blocking anything. After 2-4 weeks of monitoring, you upgrade to p=quarantine, then p=reject. The staged rollout ensures nothing breaks.

Share this article
DMARCSPFemail securityemail spoofingstartup securitybrand protectionBengaluru startupsemail authentication