We can help answer this Million Dollar Question for you. Our services ecosystem comprises of Hall-of-fame ethical hackers who are Indian Citizens and can help you understand points of entry in your existing setup.
Humans are the weakest link but also the last resort to security when all else fails. Hence, it is important to gamilfy reporting of malicious intent on emails and other systems by them to the IT Teams.
Determine how your domain authentication is happening through a quick PoC for 15 days and we will tell you what traffic has been flowing through your email infrastructure and through which geographies and to where.