Does DMARC prevent all types of phishing attacks?
DMARC is primarily designed to protect against direct domain spoofing, where attackers use your exact domain name in the "From" address.
While highly effective for protecting your domain, DMARC does not directly address other attack vectors such as "cousin domain" attacks or "display name" abuse. For organizations requiring increased protection, 101domain’s Managed DMARC Compliance Services can provide the tools needed to ensure secure email deliverability.

What is a Cousin Domain Attack?
This type of attack is also call a lookalike domain or typosquatting. Cousin domain attacks involve using domain names that are similar to legitimate ones to deceive users. They aim to trick users into believing they're interacting with a genuine entity.
Some examples of Cousin Domain Attacks:
Misspellings: yourdomain.com vs. yourdomian.com (transposed i and a)
Added or removed characters: yourdomain.com or yourdomain-security.com
What is Display Name Abuse?
Display name abuse is a type of email phishing attack where cybercriminals forge the "display name" or “senders name' of an email to impersonate a trusted individual or organization. This tactic is highly effective in Business Email Compromise (BEC) and other social engineering scams aimed at stealing information or money.
Here are some examples of Display Name Abuse, where the email ‘From’ name will display as somebody else such as impersonating:
An Executive: Your Domain CEO (such as John Smith)
An Internal Department or Role: Accounts Payable or HR Department
The Company: YourDomain Billing
Visit our blog for more Frequently Asked Questions about DMARC and find out how 101domain can help you.