- Articles
- Security Measures
- Email Security
Table of Contents
Email security
Email is a central communication tool for most businesses, both for internal and external correspondence. As a result, business-critical and sensitive personal information is frequently exchanged via email. This makes it essential to ensure 'the confidentiality, integrity, and availability' of the information being sent and received.
Security measures
There are several security measures that can enhance email security, which are outlined below.
Encryption of the connection
Protecting emails from unauthorised access is crucial. To achieve this, the connection between the email client and email servers, as well as the servers that emails pass through on the internet, should be encrypted.
By using TLS (Transport Layer Security), the transport layer is encrypted, creating a secure tunnel that prevents third parties from intercepting or modifying the email’s contents while it is transmitted across the internet.
It is also recommended to use STARTTLS, a protocol that automatically upgrades an unencrypted connection to an encrypted one whenever possible.
Both TLS and STARTTLS are standard encryption technologies that most email systems support.
Authenticity
To ensure that the recipient’s server can verify that an email truly originates from the claimed sender, authentication techniques such as SPF, DKIM, and DMARC are used.
SPF (Sender Policy Framework) specifies which servers are authorised to send emails on behalf of a company’s domain (e.g., 123@domain.com).
DKIM (DomainKeys Identified Mail) adds a digital signature to emails, allowing recipients to verify that the message’s content has not been altered during transit.
DMARC (Domain-based Message Authentication, Reporting & Conformance) defines policies for how receiving servers should handle emails that fail SPF and DKIM checks.
Together, these technologies help reduce the risk of phishing and email spoofing.
Spam and antivirus
To ensure that emails do not contain or spread viruses, organisations can use software that automatically scans incoming and outgoing emails. This software detects known threats in emails, such as virus-infected attachments, and subsequently blocks or quarantines these emails to prevent them from spreading on the sender’s or recipient’s servers.
Access
It is essential to prevent unauthorised individuals from accessing an email account, as this could lead to data theft or account misuse. To mitigate this risk, strong passwords should be used, and it is recommended to implement additional security measures such as multi-factor authentication.
Logging and backup
Secure email usage also involves maintaining email backups to prevent the loss of important business information in case of a ransomware attack or similar incidents.
Additionally, logging all email traffic can help detect unusual activity, making it easier to track and respond to security breaches.
Employee training
Even with the best technical solutions in place, employees may still encounter phishing emails or other email-based threats. Therefore, they should receive training in secure email usage, such as awareness training.
Employees should learn to recognise phishing attempts, understand the importance of strong passwords, and know how to handle suspicious emails.
Clear rules and guidelines
It is also important to establish clear rules for how employees should handle emails securely. The organisation should have a written email policy that outlines which types of information can be sent via email, how attachments should be handled, and how to avoid clicking on suspicious links.
Additionally, there should be a clear plan detailing what to do if an employee receives a suspicious email or clicks on a malicious link. Employees must know who to contact and how the situation should be managed.
Threat scenarios
The table below illustrates some common threats and the security measures that can help reduce the risks.
|
Threat Scenario |
Mitigation Measure |
|
Compromise of emails during transmission |
Encryption of emails. |
|
Spoofing of sender address |
Implementation of SPF, DKIM, and DMARC, along with employee training. |
|
Receiving emails with malware or viruses |
Email filtering and antivirus scanning. |
|
Data breach |
Use email filters to scan emails both upon receipt and before sending. |
|
Compromise of email accounts |
Enable multi-factor authentication on email accounts. |
Risk reduction
If a company has not implemented these security measures, the likelihood of a security breach increases significantly. Most organisations already use email systems that, by default, apply encryption, domain authentication, spam and antivirus filtering, and access control, which helps reduce risk.
However, fewer organisations actively train employees on the correct use of email and the associated threats. Backup and logging are additional measures that not only lower the risk of a security breach but also help mitigate the negative consequences should an incident occur.
Resource requirements
A risk assessment should serve as the foundation for selecting solutions to mitigate the most critical threats.
The resources required for implementing and maintaining security measures depend on the organisation's existing solutions and needs. Standard solutions in cloud-based email systems can often be implemented at a relatively low cost, whereas advanced on-premises systems typically require greater investment in hardware and ongoing maintenance.
A smaller organisation using a cloud-based email system can achieve a high level of security by ensuring that default settings are correctly configured. In contrast, larger organisations often have more complex requirements and greater internal resources to implement additional security measures.
Many security measures, such as spam filtering, antivirus scanning, and encryption, can operate automatically and require minimal ongoing resources once properly configured.
Challenges
Implementing and maintaining email security can present several challenges. The table below summarises common challenges and possible solutions.
|
Challenge |
Solution |
|
Complex configuration and administration |
Seek assistance from consultants and standardise configurations where possible. |
|
Resistance to security measures |
Train employees on the benefits of security measures and communicate policies clearly. |
|
Constant evolution of threats |
Conduct regular updates, monitor threat intelligence, and adjust security settings accordingly. |
|
False positives (blocking legitimate emails) |
Fine-tune filters, use whitelists, and respond promptly to error reports. |
Software
Well-known email providers such as Microsoft Outlook and Gmail support standard features like encryption of sent emails. They also offer settings for configuring SPF, DKIM, and DMARC, which help protect against phishing and spoofed emails. Additionally, these solutions include spam and antivirus filters, as well as strong access controls such as multi-factor authentication.
Additional security services can be purchased through Microsoft Defender for Office 365 or Google Workspace Security.
Of course, many other providers exist, often offering similar security measures.
Related measures
Email security is achieved through a combination of various security measures. The following may be relevant to explore further:
-
Encryption
-
Access control
-
Logging
-
Backup
Frequently Asked Questions About Email Security
What is email security?
Email security encompasses the tools, techniques, and policies used to protect email accounts, content, and communications from unauthorised access, loss, or compromise. It includes spam filtering, encryption, authentication protocols, and threat detection.
Why is email security important?
Email is the primary attack vector for cyberattacks, with over 90% of attacks starting through email. Proper email security prevents phishing, malware distribution, business email compromise, data leaks, and other threats that can cause significant financial and reputational damage.
What are the main email security threats?
The main threats include phishing attacks, spear phishing, business email compromise (BEC), malware and ransomware distribution, spam, email spoofing, man-in-the-middle attacks, and data exfiltration through email channels.
What is DMARC and why is it important?
DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that helps prevent email spoofing. It builds on SPF and DKIM to verify that emails truly come from the claimed sender domain, protecting against phishing and impersonation.
How does email encryption work?
Email encryption converts email content into an unreadable format that can only be decoded by the intended recipient. Common methods include TLS for transmission encryption, S/MIME for end-to-end encryption, and PGP for message-level encryption.
What is SPF, DKIM, and DMARC?
SPF (Sender Policy Framework) verifies which servers can send email for a domain. DKIM (DomainKeys Identified Mail) adds a digital signature to verify email integrity. DMARC ties them together and tells receiving servers what to do with emails that fail authentication.
How can organisations improve email security?
Organisations can improve email security by implementing SPF, DKIM, and DMARC, deploying advanced threat protection, enabling multi-factor authentication, conducting awareness training, encrypting sensitive emails, and establishing clear email usage policies.
What is business email compromise (BEC)?
BEC is a sophisticated scam targeting businesses that conduct wire transfers or handle sensitive information. Attackers impersonate executives or trusted partners to trick employees into transferring money or sharing confidential data.
Does GDPR require email security measures?
Yes, GDPR Article 32 requires organisations to implement appropriate technical and organisational measures to ensure data security. Since email often contains personal data, implementing robust email security measures is essential for GDPR compliance.
What is email archiving and why does it matter?
Email archiving is the systematic preservation of email communications for compliance, legal, and business purposes. It matters because many regulations require organisations to retain emails for specific periods and be able to retrieve them for audits or legal proceedings.
Learn More About Email Security Best Practices
Explore our guides on email security protocols, threat prevention strategies, and how to build a comprehensive email protection framework.
.legal compliance platform Secure Your Email Communications with .legal
-
Document email security policies and protocols
-
Track implementation of SPF, DKIM, and DMARC
-
Monitor compliance with email security standards
-
Manage vendor email security assessments
-
Generate audit reports for email security measures
Info
.legal A/S
hello@dotlegal.com
+45 7027 0127
VAT-no: DK40888888
Support
support@dotlegal.com
+45 7027 0127
Need help?
Let me help you get started
+45 7027 0127 and I'll get you started
.legal is not a law firm and is therefore not under the supervision of the Bar Council.