Skip to main content

Email Security Deep Dive: 13 Steps to Keep Your Emails Safe

Email Security Checklist

The Email Security Checklist

1. Enable SPF (Sender Policy Framework)

What it is: SPF is like a guest list for your email domain. It tells the world that only specific servers are allowed to send email for your domain.

How it works:

  • Publish an SPF record in DNS.
  • When someone receives an email claiming to be from your domain, their mail server checks if the sending IP is listed in the SPF record.
  • If the IP is not listed, the email is rejected or marked as spam.

Example SPF record:

v=spf1 ip4:203.0.113.0/24 include:_spf.google.com -all

Only servers in the specified IP range and Google’s mail servers can send emails for this domain. Others are rejected.

Points to Note:

  • Prevents attackers from spoofing your domain and sending phishing or spam emails.

2. Enable DKIM (DomainKeys Identified Mail)

What it is: DKIM is a digital signature for each email, ensuring that the message hasn’t been tampered with.

How it works:

  • Your mail server signs outgoing emails with a private key.
  • Recipient mail servers verify the signature using your public key published in DNS.
  • If the signature matches, the email is considered authentic and untampered.

Example DKIM record:

v=DKIM1; k=rsa; p=PUBLIC_KEY_HERE

Scenario: If someone modifies the content of an email in transit, the DKIM signature breaks and the recipient sees the message as suspicious.

Points to Note:

  • Ensures email integrity and authenticity.
  • Improves domain reputation and email trustworthiness with providers.

3. Enable DMARC (Domain-based Message Authentication, Reporting & Conformance)

What it is: DMARC is a policy layer that combines SPF and DKIM, specifying what to do if authentication fails.

How it works:

  • Define a rule: reject, quarantine, or allow emails that fail SPF/DKIM checks.
  • Receive reports on failed authentication attempts.

Example DMARC record:

v=DMARC1; p=reject; rua=mailto:security@yourdomain.com

Scenario: Without DMARC, Gmail might accept spoofed emails. With DMARC set to reject, unauthorized emails are dropped before reaching the inbox.

Points to Note:

  • Enforces consistent authentication policies across all receivers.
  • Provides visibility into unauthorized email attempts.

4. Set up a Spam Filter

What it is: A mechanism that blocks junk emails and malware before they reach users.

How it works:

  • Uses blacklists, heuristics, machine learning, and attachment scanning.
  • Filters suspicious emails into spam/junk folders.

Example Filters: Barracuda, Mimecast, Proofpoint, Google Workspace built-in filter.

Points to Note:

  • Reduces exposure to phishing and malware.
  • Improves inbox hygiene and productivity.

5. Disable Relaying

What it is: Relaying allows outsiders to use your email server to send messages to third parties.

Bad Scenario:

  • Your server is misconfigured as an open relay.
  • Spammers use it to send millions of emails.
  • Your domain/IP gets blacklisted, causing legitimate emails to bounce.

Points to Note:

  • Always disable relaying unless explicitly allowing trusted servers.
  • Prevents abuse and protects domain reputation.

6. Set a Throttling Policy

What it is: Rate-limits that prevent hacked or compromised accounts from sending mass spam emails.

Example Rules:

  • Max 500 emails/day per user.
  • Max 50 recipients/email.

Scenario:

  • Alice’s account is hacked. The attacker tries to send 50,000 phishing emails.
  • Throttling policy blocks after 500 emails, reducing potential damage.
  • Example: If you send an email to 20 people in To, 15 in Cc, and 15 in Bcc, that totals 50 recipients → allowed. Sending to 60 recipients → blocked.

Points to Note:

  • Prevents mass spamming if an account is compromised.
  • Protects domain reputation and prevents blacklisting.
  • Encourages using proper bulk mailing tools for legitimate campaigns (e.g., SendGrid, Mailchimp, Google Groups).

7. Restrict Local Email Domain

What it is: Prevents outsiders from sending fake emails that appear to come from your internal domain.

Scenario Explained:

Without Restriction (Bad Case):

  • A hacker outside your company sends an email from ceo@company.com to finance@company.com.
  • Your mail server delivers it because it looks like internal mail.
  • The finance employee sees the fake CEO email and may wire money → this is called CEO Fraud / Business Email Compromise (BEC).

With Restriction (Good Case):

  • The mail system only accepts emails claiming to be from @company.com if they come from official internal mail servers (e.g., Microsoft 365 or Google Workspace).
  • The hacker’s email from an external server is blocked or flagged.
  • Finance never sees the fake CEO email → attack fails.

Points to Note:

  • Ensures only legitimate internal servers can send emails using your domain.
  • Prevents CEO fraud, internal phishing, and business email compromise (BEC).

8. Set Attachment Restrictions

What it is: Block dangerous file types to prevent malware from entering your network.

Rules:

  • Block extensions: .exe, .bat, .vbs, .jar, .scr
  • Allow only safe extensions: .pdf, .docx, .png

Scenario:

  • User receives invoice.pdf.exe disguised as a PDF.
  • Without restrictions → malware executes on the system.
  • With restrictions → email blocked at the gateway before reaching the user.

Points to Note:

  • Since most malware is delivered via attachments, restricting risky file types is essential.
  • Scan attachments to ensure even allowed file types are safe.

9. Ensure Log Visibility and History

What it is: Collect and monitor logs from mail servers to track activity and detect security incidents.

Example Logs:

  • Was the email delivered?
  • Did SPF/DKIM authentication fail?
  • Who attempted to brute-force login?

Tools: Splunk, ELK, SIEM integration.

Points to Note:

  • Logs are vital for investigating phishing attempts and delivery issues.
  • Helps meet compliance and auditing requirements.

10. Consider Email Encryption

What it is: Ensures that only intended recipients can read the email content.

Types:

  • S/MIME (uses certificates)
  • PGP (uses key pairs)

Scenario:

  • A lawyer sends confidential case files via email.
  • Encrypted email ensures that even if intercepted, the content is unreadable.

Points to Note:

  • Email encryption ensures confidentiality for sensitive information.
  • Critical for industries like finance and healthcare to comply with regulations like HIPAA.

11. Enable DNSSEC (Domain Name System Security Extensions)

What it is: DNSSEC secures DNS records to prevent attackers from redirecting traffic or tampering with email-related DNS entries (like SPF, DKIM, and DMARC).

How it works:

  • DNS responses are digitally signed using public-key cryptography.
  • Only authenticated responses from the domain’s authoritative DNS server are accepted.
  • This prevents DNS spoofing and cache poisoning attacks.

Scenario Example:

  • A user tries to visit www.example.com.
  • Without DNSSEC: An attacker poisons the DNS cache and redirects the user to www.fake-example.com, which looks identical. The attacker can capture login credentials.
  • With DNSSEC: The browser or email server verifies the DNS response signature. If the response is altered, it is rejected, preventing the user from being redirected to a malicious site.
  • Similarly, email servers checking SPF/DKIM/DMARC records rely on DNS. Without DNSSEC, attackers could alter TXT records to bypass email authentication, leading to phishing and spoofing attacks.

Points to Note:

  • Secures DNS records against tampering and spoofing.
  • Protects email authentication mechanisms (SPF, DKIM, DMARC).
  • Prevents attackers from redirecting users to malicious websites.

12. Educate Your Community

What it is: Security is not just technology; it starts with people. Educating users on safe email practices is critical to reduce phishing and malware risks.

Key Training Topics:

  • How to recognize phishing emails and social engineering attempts.
  • Which files are safe to send or receive via email and alternatives for large file sharing.
  • How to avoid clicking malicious links and detect suspicious email behavior.
  • What information is safe to share via email.

Points to Note:

  • A culture of security awareness reduces human error and prevents data breaches.
  • Periodic refresher training ensures practices stay up-to-date.
  • Supports technological measures like spam filters and email restrictions.

13. Regularly Test Configurations

What it is: Regular testing ensures that email security settings remain effective over time and configuration changes do not create vulnerabilities.

Tools for Testing: MXToolbox, G Suite/Office 365 security scorecards, and email spoofing simulations.

How to Test:

  • Run periodic SPF/DKIM/DMARC checks to confirm proper email authentication.
  • Send test emails to verify spam filters and attachment restrictions are working.
  • Monitor logs for unusual activity or policy violations.
  • Compare current settings with company security policies to prevent configuration drift.

Points to Note:

  • Continuous testing ensures potential vulnerabilities are discovered and fixed promptly.
  • Helps maintain compliance with internal and external security policies.
  • Supports consistent protection against phishing, spoofing, and malware delivery.

Preventing CEO Impersonation in Emails

Q: How can we prevent someone from impersonating our CEO via email?

A: The best approach is to implement SPF, DKIM, and DMARC. SPF defines which mail servers are allowed to send emails for our domain. DKIM adds a digital signature to verify the integrity of the message. DMARC enforces policies based on SPF and DKIM results, for example, rejecting emails that fail both checks.

Q: Can you give a concrete example of how this works?

A: Suppose a hacker tries to send an email from ceo@company.com to finance@company.com using a free Gmail account. Our SPF record only allows our Google Workspace servers. SPF fails, DKIM fails because the email doesn’t have a valid signature from our domain, and DMARC rejects the message. This prevents the fraudulent email from ever reaching finance.

Q: Why is this better than just telling employees to be careful?

A: Technical controls like SPF, DKIM, and DMARC stop attacks before employees even see them. Human caution is important, but relying solely on users is risky, because phishing emails can look very convincing—like an urgent wire transfer request from the CEO.

Q: What if the hacker uses a Gmail account that is part of Google Workspace?

A: It must be part of our authorized Workspace domain. SPF only allows our corporate Workspace servers. A free Gmail account or Workspace account from another domain will fail SPF and DMARC, and DKIM signatures from other domains won’t validate against our public key.

Q: Could an internal employee accidentally impersonate the CEO?

A: We can restrict local email domain sending rules. Emails claiming to be from @company.com must come from official internal mail servers. Even internal machines or scripts outside the mail server cannot send as the CEO, preventing internal spoofing or accidental misuse.

Q: How can we monitor if someone is trying to spoof our domain?

A: DMARC reporting provides aggregate (rua) and forensic (ruf) reports about emails failing SPF/DKIM. We can see attempts, source IPs, and take corrective actions, such as updating DNS or investigating potential attacks.

Q: How would you explain this to a non-technical executive?

A: I would say: “We have a digital gatekeeper for emails. It checks if an email truly comes from us and hasn’t been tampered with. If a fake email tries to impersonate the CEO, the system blocks it before anyone sees it, preventing fraud.”

In preparing this blog, I referred to a helpful GitHub repository: Email Security Checklist Repository .

Additionally, AI platforms helped me understand the concepts in depth, allowing me to explain each step in a simple and practical way.

Comments

Popular posts from this blog

How to Pass CompTIA Security+ SY0-701 in 2 Months (839 Score Breakdown + Resources)

How I Scored 839/900 on CompTIA Security+ SY0-701 — 2-Month Prep Strategy That Actually Worked Score: 839/900  |  Exam: CompTIA Security+ SY0-701  |  Prep Time: 2 Months  |  Total Questions: 76 (including 3 PBQs) I'm not going to sugarcoat it — CompTIA Security+ is not easy, but it is very passable with the right strategy. I cleared it with an 839 out of 900, and in this post I'll share exactly how I did it, domain by domain, so you can replicate the approach without wasting time. My 2-Month Study Plan Month 1 — Domain-by-domain study: Read, take notes, and build comparison tables and mnemonics for tricky concepts. Month 2 — Heavy practice testing: Full focus on practice tests and PBQ simulations. Time management drills every session. The biggest mistake people make is spending 90% of their time reading and only 10% practicing. I flipped that in month 2 — and it made all the difference. Domain 1 — General Security Concepts What to focu...

Deep Dive into Cybersecurity: Security+ Level Knowledge Without the Certificate

📚 My Cybersecurity Learning Journey Key Topics from a 17-Hour Security+ Course ðŸ”đ CIA Triad Explained Confidentiality: Ensuring that sensitive data is only accessed by authorized users. This is often achieved using encryption and access controls. Integrity: Ensuring data is accurate and untampered. Techniques like hashing, checksums, and digital signatures help validate that data hasn't been altered. Availability: Making sure systems and data are accessible when needed. Achieved through backups, redundancy, load balancing, and fault-tolerant design. ðŸ”đ Types of Threats Malware: Includes viruses, ransomware, worms, and trojans that compromise devices or networks. Social Engineering: Manipulating users into giving up confidential info. Example: Phishing emails. Insider Threats: Employees or contractors misusing access, accidentally or intentionally. Advanced Persistent Threats (APTs): Long-term targeted attacks, often by well-funded threat actors. Zero...

Do you know, by blindly following trends and using hashtags you can be the victim of cyber crime? : #couplechallenge

Awareness is necessity "Nohashtag challenges" Nowadays, #couplechallenge, #smilechallenge, #chirichchallenge trending on social media platforms. But do you know the history of hashtags? Lets see, how hashtag was invented. Chris Messina a product designer who has been working in Silicon Valley created the idea of hashtag. He and his small group of colleagues were thinking that twitter needs some kind of frame work. He got the idea of hashtag from internet chat room that had pound symbol in front of them. His main idea to create hashtag was for the internet and wanted that anybody writing text on internet be able to participate in global conversation. In 2007, he asked one of his friends to use #sandiego for his tweets and this way the use of hashtag started. In 2009, Twitter added the option of hashtag to its search bar. And this way hashtag became a trend. This trend then being followed by other apps like tumbler, Facebook, instag...

āŠŠ્āŠ°ાāŠ‡āŠ āŠļ્āŠ•ેāŠŪ: āŠœો āŠĪāŠŪાāŠ°ે āŠ‡āŠĻાāŠŪ āŠŪેāŠģāŠĩāŠĩા āŠŪાāŠŸે āŠšૂāŠ•āŠĩāŠĢી āŠ•āŠ°āŠĩી āŠŠāŠĄāŠĪી āŠđોāŠŊ āŠĪો āŠĪે āŠ‡āŠĻાāŠŪ āŠĻāŠĨી

Awareness is necessity āŠķું āŠĪāŠŪāŠĻે āŠ•્āŠŊાāŠ°ેāŠŊ āŠ•ોāŠˆ āŠ•ોāŠē્āŠļ āŠ†āŠĩ્āŠŊા āŠ›ે āŠ•ે āŠœેāŠŪાં āŠĪāŠŪે āŠ•ોāŠˆ āŠŠāŠĢ āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠķોāŠŠિંāŠ— āŠĩેāŠŽāŠļાāŠ‡āŠŸāŠŪાંāŠĨી āŠ‡āŠĻાāŠŪ āŠ…āŠĨāŠĩા āŠēોāŠŸāŠ°ી āŠœીāŠĪી āŠēીāŠ§ી āŠđોāŠŊ āŠĪેāŠĩું āŠ•āŠđે āŠ›ે? āŠķāŠ•્āŠŊāŠĪા āŠ›ે āŠ•ે āŠ† āŠ•ોāŠē્āŠļ āŠŦ્āŠ°ોāŠĄ āŠ›ે. āŠļાāŠŊāŠŽāŠ° āŠļ્āŠĩāŠŊંāŠļેāŠĩāŠ• āŠĪāŠ°ીāŠ•ે, āŠŪેં āŠ† āŠŠ્āŠ°āŠ•ાāŠ°āŠĻી āŠ›ેāŠĪāŠ°āŠŠિંāŠĄીāŠ“āŠĻા āŠ•ેāŠŸāŠēાāŠ• āŠ•ેāŠļ āŠĻું āŠ…āŠ§્āŠŊāŠŊāŠĻ āŠ•āŠ°્āŠŊું āŠ›ે. āŠšાāŠēો āŠļāŠŪāŠœીāŠ āŠ•ે āŠ† āŠŠ્āŠ°āŠ•ાāŠ°āŠĻી āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•ેāŠĩી āŠ°ીāŠĪે āŠĨાāŠŊ āŠ›ે? !! āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•āŠ°āŠĻાāŠ° āŠĪāŠŪāŠĻે āŠ•ોāŠˆāŠŠāŠĢ āŠĩિāŠķ્āŠĩāŠļāŠĻીāŠŊ āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠķોāŠŠિંāŠ— āŠļાāŠ‡āŠŸāŠŪાંāŠĨી āŠ•āŠ°્āŠŪāŠšાāŠ°ી āŠđોāŠĩાāŠĻુ āŠ•āŠđે āŠ›ે.āŠĪેāŠ“ āŠĪāŠŪāŠĻે āŠļાāŠ‡āŠŸ āŠŠāŠ°āŠĨી āŠĪāŠŪાāŠ°ી āŠ›ેāŠē્āŠēી āŠ–āŠ°ીāŠĶી āŠĩિāŠķેāŠĻી āŠĩિāŠ—āŠĪો, āŠ‰āŠĪ્āŠŠાāŠĶāŠĻ āŠ…āŠĻે āŠ“āŠ°્āŠĄāŠ° āŠĻી āŠĩિāŠ—āŠĪો āŠļાāŠĨે āŠĪāŠŪāŠĻે āŠŪāŠĻાāŠĩāŠĩાāŠĻો āŠŠ્āŠ°āŠŊાāŠļ āŠ•āŠ°ે āŠ›ે. āŠœ્āŠŊાāŠ°ે āŠ•ોāŠˆ āŠĩ્āŠŊāŠ•્āŠĪિ āŠŪાāŠĻે āŠ›ે āŠ•ે āŠ›ેāŠĪāŠ°āŠŠિંāŠĄી āŠ•āŠ°āŠĻાāŠ° āŠ“āŠĻāŠēાāŠ‡āŠĻ āŠļાāŠ‡āŠŸāŠĻો āŠ•āŠ°્āŠŪāŠšાāŠ°ી āŠ›ે, āŠĪ્āŠŊાāŠ°ે āŠĪેāŠ“ āŠĪāŠŪāŠĻે āŠĩિāŠĩિāŠ§ āŠ‡āŠĻાāŠŪો āŠœેāŠĩા āŠ•ે āŠēેāŠŠāŠŸોāŠŠ, āŠŸીāŠĩી, āŠŪોāŠŽાāŠ‡āŠē āŠŦોāŠĻ āŠĩિāŠķે āŠ†āŠ•āŠ°્āŠ·āŠ• āŠŊોāŠœāŠĻાāŠ“ āŠ†āŠŠે āŠ›ે āŠ…āŠĻે āŠĪāŠŪાāŠ°ી āŠŠાāŠļેāŠĨી āŠāŠ• āŠ‡āŠĻાāŠŪ āŠŠāŠļંāŠĶ āŠ•āŠ°āŠĩાāŠĻો āŠĩિāŠ•āŠē્āŠŠ āŠ†āŠŠે āŠ›ે.āŠœ્āŠŊાāŠ°ે āŠĪāŠŪે āŠĨોāŠĄી āŠ°ુāŠšિ āŠŽāŠĪાāŠĩો āŠ…āŠĻે āŠ‡āŠĻાāŠŪ āŠŠāŠļંāŠĶ āŠ•āŠ°ો āŠĪ્āŠŊાāŠ°ે āŠ‰āŠē્āŠēેāŠ–િāŠĪ āŠ‡āŠĻાāŠŪāŠŪાંāŠĨી, āŠĪેāŠ“ āŠĪāŠŪāŠĻે SMS āŠĪāŠ°ીāŠ•ે āŠāŠ• āŠēિંāŠ• āŠŪોāŠ•āŠēે āŠ›ે.āŠŪોāŠ•āŠēેāŠēી āŠēિંāŠ• āŠ āŠ›ેāŠĪāŠ°āŠŠિંāŠĄીāŠĻી āŠēિંāŠ• āŠ›ે āŠœે āŠĪāŠŪાāŠ°ી āŠĩિāŠ—āŠĪો āŠœેāŠĩી āŠ•ે āŠŽેંāŠ• āŠĩિāŠ—āŠĪો āŠĪેāŠŪāŠœ āŠĩ્āŠŊāŠ•્āŠĪિāŠ—āŠĪ āŠŪાāŠđિāŠĪી āŠŪાāŠŸે āŠŠૂāŠ›ે āŠ›ે.āŠĻોંāŠ§āŠĢી āŠ•āŠ°āŠĪી āŠĩāŠ–āŠĪે, āŠĪે āŠĪāŠŪāŠĻે āŠĪāŠŪાāŠ°ા āŠļ્āŠĨા...

āŠķું āŠĪāŠŪે āŠœાāŠĢો āŠ›ો āŠ•ે āŠđેāŠķāŠŸેāŠ—્āŠļ #couplechallenge āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠ•āŠ°ીāŠĻે, āŠĪāŠŪે āŠļાāŠŊāŠŽāŠ° āŠ•્āŠ°ાāŠ‡āŠŪāŠĻો āŠ­ોāŠ— āŠŽāŠĻી āŠķāŠ•ો āŠ›ો?

Awareness is necessity "Nohashtag challenges" āŠ†āŠœāŠ•ાāŠē, āŠļોāŠķિāŠŊāŠē āŠŪીāŠĄિāŠŊા āŠŠ્āŠēેāŠŸāŠŦોāŠ°્āŠŪ āŠŠāŠ° #couplechallenge, #smilechalenlenge, #chirichchallenge āŠŸ્āŠ°ેંāŠĄિંāŠ— āŠ›ે. āŠŠāŠ°ંāŠĪુ āŠķું āŠĪāŠŪે āŠđેāŠķāŠŸેāŠ—્āŠļāŠĻો āŠ‡āŠĪિāŠđાāŠļ āŠœાāŠĢો āŠ›ો? āŠšાāŠēો āŠŠāŠđેāŠēા āŠœોāŠˆāŠ āŠ•ે #hashtag āŠĻી āŠķોāŠ§ āŠ•ેāŠĩી āŠ°ીāŠĪે āŠĨāŠˆ. āŠļિāŠēિāŠ•ોāŠĻ āŠĩેāŠēીāŠŪાં āŠ•ાāŠŪ āŠ•āŠ°āŠĪા āŠŠ્āŠ°ોāŠĄāŠ•āŠŸ āŠĄિāŠાāŠ‡āŠĻāŠ° āŠ•્āŠ°િāŠļ āŠŪેāŠļિāŠĻા āŠ āŠđેāŠķāŠŸેāŠ—āŠĻો āŠ†āŠˆāŠĄિāŠŊા āŠŽāŠĻાāŠĩ્āŠŊો āŠđāŠĪો.āŠĪે āŠ…āŠĻે āŠĪેāŠĻા āŠ•āŠ°્āŠŪāŠšાāŠ°ીāŠ“ āŠŪિāŠĪ્āŠ°ો āŠĩિāŠšાāŠ°ી āŠ°āŠđ્āŠŊા āŠđāŠĪા āŠ•ે āŠŸ્āŠĩિāŠŸāŠ°āŠĻે āŠ•ેāŠŸāŠēાāŠ• āŠŪાāŠģāŠ–ાāŠĻી āŠœāŠ°ૂāŠ° āŠ›ે.āŠĪેāŠĻે āŠļાāŠŪે āŠŠાāŠ‰āŠĻ્āŠĄ āŠļિāŠŪ્āŠŽોāŠē āŠđāŠĪું āŠĪેāŠŪાંāŠĨી āŠđેāŠķāŠŸેāŠ— āŠ•āŠĻ્āŠļેāŠŠ્āŠŸ āŠŪāŠģ્āŠŊો.āŠđેāŠķāŠŸેāŠ— āŠŽāŠĻાāŠĩāŠĩાāŠĻો āŠĪેāŠŪāŠĻો āŠŪુāŠ–્āŠŊ āŠĩિāŠšાāŠ° āŠ‡āŠĻ્āŠŸāŠ°āŠĻેāŠŸāŠĻો āŠđāŠĪો, āŠ…āŠĻે āŠˆāŠš્āŠ›āŠĪા āŠđāŠĪા āŠ•ે āŠĩૈāŠķ્āŠĩિāŠ• āŠĩાāŠ°્āŠĪાāŠēાāŠŠāŠŪાં āŠ­ાāŠ— āŠēેāŠĩા āŠ‡āŠĻ્āŠŸāŠ°āŠĻેāŠŸ āŠŠāŠ° āŠ•ોāŠˆāŠŠāŠĢ āŠēāŠ–ાāŠĢ āŠēāŠ–ે. 2007 āŠŪાં, āŠĪેāŠĢે āŠĪેāŠĻા āŠāŠ• āŠŪિāŠĪ્āŠ°āŠĻે āŠĪેāŠĻા tweet āŠŪાāŠŸે #sandiego āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠ•āŠ°āŠĩા āŠ•āŠđ્āŠŊું āŠ…āŠĻે āŠ† āŠ°ીāŠĪે, āŠđેāŠķāŠŸેāŠ—āŠĻો āŠ‰āŠŠāŠŊોāŠ— āŠķāŠ°ૂ āŠĨāŠŊો. 2009 āŠŪાં, āŠŸ્āŠĩિāŠŸāŠ°ે āŠĪેāŠĻા āŠļāŠ°્āŠš āŠŽાāŠ°āŠŪાં āŠđેāŠķāŠŸેāŠ—āŠĻો āŠĩિāŠ•āŠē્āŠŠ āŠ‰āŠŪેāŠ°્āŠŊો. āŠ…āŠĻે āŠ† āŠ°ીāŠĪે, āŠđેāŠķāŠŸેāŠ— āŠāŠ• āŠĩāŠēāŠĢ āŠŽāŠĻી āŠđāŠĪી. āŠ† āŠĩāŠēāŠĢ āŠŠāŠ›ી āŠ…āŠĻ્āŠŊ āŠāŠŠ્āŠēિāŠ•ેāŠķāŠĻ્āŠļ āŠœેāŠĩી āŠ•ે āŠŸāŠŪ્āŠŽāŠēāŠ°, āŠŦેāŠļāŠŽુāŠ•, āŠ‡āŠĻ્āŠļ્āŠŸાāŠ—્āŠ°ાāŠŪ āŠ…āŠĻે āŠ…āŠĻ્āŠŊ social media āŠŠ્āŠēેāŠŸāŠŦોāŠ°્āŠŪ āŠļુāŠ§ી āŠĩિāŠļ્āŠĪāŠ°િāŠĪ āŠĨāŠŊો āŠđāŠĪો. āŠķāŠ°ૂāŠ†āŠĪāŠŪાં, āŠđેāŠķāŠŸેāŠ—...