Imagine your patient receiving an email that appears to come from your clinic — from your exact email address — asking them to confirm their insurance details before an upcoming appointment. The email is grammatically perfect, references the appointment correctly, and is formatted exactly like a legitimate clinical communication. It was generated in seconds by an AI system, sent without your knowledge or access, and it targeted twenty of your patients simultaneously.

You never sent that email. Your email account was never touched. But your domain had no DMARC protection, so there was nothing stopping a criminal from sending it. And in 2026, AI tools have made this type of attack more convincing, more scalable, and more dangerous than at any previous point.

How Email Spoofing Works — and Why AI Makes It Far Worse in 2026

Email was designed in the 1970s without authentication in mind. The original protocol has no built-in mechanism to verify that an email actually comes from the domain it claims to be from. Anyone with the right tools can send an email displaying any “From” address they choose.

This flaw has been partially addressed through three DNS-based authentication standards: SPF, DKIM, and DMARC. But these standards only work if the domain owner has configured them — and the majority of small healthcare practice domains we assess have not.

In 2026, the combination of email spoofing and AI-generated content has produced a qualitatively new threat. Criminal organisations now use large language models to generate contextually specific, professionally written spoofed emails targeting healthcare patients at scale. These emails can reference the patient’s actual clinic, their specific practice management software, current PIPEDA regulatory developments, or even the patient’s own appointment history if public booking data is available. The traditional patient advice of looking for typos and suspicious grammar offers no protection whatsoever against this generation of attack.

SPF (Sender Policy Framework) is a DNS record specifying which mail servers are authorised to send email on behalf of your domain. When an email claiming to be from your clinic arrives at a recipient’s mail server, that server checks your SPF record to see whether the sending server is on the approved list.

DKIM (DomainKeys Identified Mail) uses cryptographic signatures to verify that an email was genuinely sent by an authorised mail server and has not been modified in transit.

DMARC (Domain-based Message Authentication, Reporting, and Conformance) ties SPF and DKIM together into an enforceable policy and provides reporting. Without DMARC, even with SPF and DKIM configured, spoofed emails can still reach recipients because there is no enforcement instruction telling receiving mail servers what to do with messages that fail authentication. DMARC provides that instruction — quarantine them, reject them — and generates reports showing you exactly who is sending email using your domain.

Why Healthcare Clinic Domains Are High-Value Spoofing Targets in 2026

Patients have established, trusted relationships with their healthcare providers built over months and years of personal care. They open communications from their dentist, vet, or doctor promptly and without the skepticism they might apply to a message from an unfamiliar sender. This trust is precisely what criminals exploit.

An AI-crafted email from your clinic domain requesting updated payment information, insurance details, or a link to “confirm your upcoming appointment” will be opened, read, and often acted on. The criminal does not need access to your systems. They need your domain name, a free email sending service, no DMARC record on your domain, and an AI that generates a convincing email in seconds.

In 2026, this attack vector has also become far more scalable. What once required skilled social engineers crafting individual messages can now be automated — thousands of AI-generated spoofed emails sent to healthcare patients across multiple clinics simultaneously, each personalised to its recipient.

The Risk to Your Patients and Your PIPEDA Obligations

When a criminal successfully sends spoofed emails to your patients, the harm falls in multiple places simultaneously.

Your patients may suffer financial fraud, credential theft, or identity theft as a direct result of trusting an email that appeared to come from you. Even if every patient is eventually refunded or protected, the breach of the clinical trust relationship causes lasting reputational damage.

Your practice faces PIPEDA liability. Even though you did not send the email, the absence of DMARC on your domain is a documentable Safeguards gap under Principle 7. The OPC’s more assertive 2025 enforcement posture and the incoming 2026 legislation make this gap increasingly expensive to leave unaddressed.

How to Check Whether Your Domain Is Protected Right Now

Testing your DNS configuration takes under two minutes and costs nothing. Go to mxtoolbox.com and run SPF, DKIM, and DMARC lookups for your clinic’s domain. Each test returns either a valid record — showing your current configuration — or “no record found,” indicating the protection is not in place.

A Netxafe Scan assessment checks all three records as part of the standard DNS review and reports their presence, configuration quality, enforcement level, and any specific issues found. In the majority of small healthcare practice domains we assess, DMARC is either absent entirely or configured in monitoring-only mode with no active enforcement.

How to Fix It — Step by Step

Adding SPF, DKIM, and DMARC records requires access to your domain’s DNS settings through your domain registrar or web hosting control panel. Your IT provider can implement all three in under an hour.

SPF: Create a TXT record listing your authorised sending servers. For Google Workspace: v=spf1 include:_spf.google.com ~all. For Microsoft 365: v=spf1 include:spf.protection.outlook.com ~all. Your email provider’s documentation will give you the exact record for your configuration.

DKIM: Generated through your email provider’s admin console. Google Workspace and Microsoft 365 both have built-in DKIM configuration tools that generate the required DNS record for you. Add the generated public key as a TXT record in your DNS.

DMARC: Start with a monitoring-only policy while you confirm your legitimate email is passing authentication: v=DMARC1; p=none; rua=mailto:info@yourclinic.ca. After two to four weeks of monitoring with clean results, advance to p=quarantine, and then to p=reject — the setting that actively blocks spoofed emails from reaching your patients.

The total cost of implementing all three is zero. The time required with IT assistance is under one hour. The protection is permanent.

Reading Your DMARC Reports

Once DMARC is configured in monitoring mode, your designated email address will receive aggregate reports from major mail providers. These reports show which servers are sending email claiming to be from your domain and whether those emails are passing SPF and DKIM authentication.

Legitimate sources — your Google Workspace or Microsoft 365 account — will show consistent pass results. Unauthorised sources will show fail results, revealing the volume and frequency of spoofing attempts against your domain. In 2026, most healthcare practice domains that have been actively spoofed will see this data for the first time when they configure DMARC monitoring — and the volume is often alarming.

Tools like DMARCian and DMARC Analyser provide free tiers that translate raw XML reports into readable dashboards, making monitoring practical for non-technical practice owners.

The Bottom Line in 2026

Email spoofing protection is simultaneously free, fast to implement, and permanently effective against one of the most dangerous and rapidly growing attack vectors targeting healthcare practices. In 2026, with AI tools enabling criminals to generate convincing spoofed emails at industrial scale, every healthcare clinic domain without DMARC enforcement is an open door to patient harm.

The incoming federal privacy framework will raise expectations for Safeguards. Implementing SPF, DKIM, and DMARC now satisfies a clear PIPEDA Principle 7 obligation, protects your patients, and closes a gap that will only become more consequential as AI-enabled spoofing attacks continue to escalate.


The Vendor Impersonation Variant to Watch for in 2026

Beyond patient-targeted phishing, email spoofing creates one additional risk for healthcare practices that has grown more common in 2025 and 2026: vendor impersonation, sometimes called business email compromise.

Attackers who understand the relationship between your practice and your practice management software vendor, your dental supply company, your insurance billing partner, or your IT provider can spoof those vendors to send you emails. These emails might request updated payment details for an outstanding invoice, a password reset for an account “that has been compromised,” or payment to a new bank account for an upcoming equipment order.

This variant targets practice owners and office managers rather than patients, and it is often more financially damaging per incident because it targets wire transfers and business payments rather than individual patient credentials. In 2025 and 2026, AI tools have made these emails increasingly sophisticated — correctly identifying the relationship between the practice and the spoofed vendor, using the correct logo and formatting, and referencing real invoice amounts sourced from public records or prior correspondence obtained through other means.

DMARC protects your domain from being spoofed by criminals targeting your patients. It does not protect you from receiving emails that spoof other domains. The complementary defence is a verification procedure: any request to change payment details, any request for credentials, and any unexpected invoice should be verified by phone to the vendor’s known number before any action is taken. This habit costs nothing and addresses both AI-phishing and business email compromise.

Netxafe Scan checks SPF, DKIM, and DMARC configuration as part of every DNS assessment. Request your free scan teaser at netxafe.ca.

 

Is your clinic protected?

Get your free scan teaser — we check your domain, SSL certificate, and email breach exposure. Delivered within 24 hours, no obligation.

Get Free Scan