Swiss organisations face a fast-changing email threat environment and mixed DMARC adoption. This brief explains the state of adoption across banks and major companies, links authentication to national reporting rules, and includes official Swiss statistics about phishing and reporting.
Adoption is uneven: 20% of the top 100 Swiss banks have DMARC set to p=reject, 19% use p=quarantine, 29% remain in p=none monitoring mode, 15% have faulty or incomplete records, and 17% have no DMARC record. Overall, 61% of the top banks lack effective enforcement or have problematic configurations. That leaves many bank domains exposed to impersonation and phishing risks.
Among the top 100 Swiss organisations by revenue, 44% have DMARC at p=reject, 10% use p=quarantine, 17% are at p=none, 17% have record issues, and 12% lack a DMARC record. While corporate adoption is better than the banking segment, nearly half still do not enforce DMARC and remain vulnerable to email-based attacks.
Phishing reports are high. According to Swiss authorities, users and organisations reported 497,096 suspicious website reports through antiphishing.ch in the second half of 2024; authorities identified 9,355 unique phishing sites and took action. These numbers reflect a persistent and growing phishing problem that authentication can help mitigate.
Yes. From 1 April 2025, reporting of cyberattacks against critical infrastructure became mandatory under Swiss rules. Organisations operating in covered sectors must notify authorities of incidents, which increases the importance of quick detection and evidence collection—something better email visibility (via DMARC reporting) supports.
DMARC provides RUA/RUF reporting that reveals who is sending mail on a domain's behalf and which messages fail authentication—valuable evidence when reporting incidents. In environments with mandatory incident notifications, having DMARC visibility speeds detection and supports timely reporting. Strong DMARC policies also reduce the volume of successful phishing that can trigger reportable incidents.
We saw frequent SPF lookup-limit issues, malformed SPF records, and missing RUA addresses. These mistakes remove visibility into authentication outcomes or cause SPF to fail unexpectedly. Fixing syntax and SPF complexity, and adding a working RUA is a straightforward first step to gaining control of your email ecosystem.
Begin with a full inventory of sending domains and all authorised senders, publish a correct SPF including authorized IPs, enable DKIM signing, and publish DMARC with p=none to collect reports. Use the reports to fix failures, then progress to p=quarantine and p=reject on a measured schedule. Test third‑party vendors and maintain continuous monitoring.
Not yet—Switzerland hasn’t required DMARC by law for a specific sector, but new reporting obligations and FINMA guidance increase the pressure to adopt it. Major mailbox providers’ requirements (Google, Microsoft, Apple, Yahoo) effectively force senders to implement authentication to protect deliverability and customers.
In practice, well-deployed DMARC can reduce illegitimate email traffic dramatically. For example, one large customer reported dropping illegitimate email from over 75% to under 5% after DMARC deployment and ongoing monitoring. Proper DKIM/SFP alignment and DMARC enforcement make spoofing far harder.
Palisade provides tools for scanning SPF, DKIM and DMARC, visualising RUA data, and managing enforcement safely. Use Palisade’s email security score to prioritise fixes and track progress: https://www.palisade.email/tools/email-security-score. Palisade offers consulting and managed services to accelerate deployment and keep you compliant.
Act immediately—high phishing volume and mandatory reporting increase both risk and regulatory exposure. Inventory senders, deploy DMARC reporting, and remediate failures as a priority.
Reporting obligations apply to critical infrastructure operators and specified sectors; smaller organisations outside those categories may not be required but still benefit from DMARC for protection and incident visibility.
Work with vendors to add DKIM or ensure their IPs are covered in your SPF; if that’s not possible, route sensitive mail through authorised services or stop using that vendor for critical communications.
No—DMARC reduces domain spoofing but does not stop all phishing (attacks can use lookalike domains or compromised accounts). DMARC should be one layer in a defence-in-depth strategy that includes user awareness, web blocking and threat intelligence.
Palisade offers deployment support, monitoring and managed services for DMARC, SPF and DKIM. Visit https://palisade.email/ to learn more and request assistance.