Business Email Security: Protecting Your Inbox from Attack
Email is the most common entry point for cyberattacks on UK businesses. Effective email security combines technical controls — SPF, DKIM, DMARC, secure gateways — with staff awareness to block phishing, spoofing and malware before they cause harm.
Matt Cannon
Managing Director
Why email remains the primary attack surface
Despite decades of warnings, email continues to be the number one delivery mechanism for cyberattacks on UK businesses. The reason is straightforward: it is the one communication channel that every employee uses, and every message requires a human judgement call about whether to trust it. The 2024 UK Cyber Security Breaches Survey found that phishing attempts remain the most commonly identified form of attack, affecting 84% of businesses that reported a breach.
The threat landscape has shifted considerably. Opportunistic spam and bulk phishing campaigns still exist, but they are increasingly accompanied by targeted business email compromise (BEC) attacks — where criminals impersonate senior staff or trusted suppliers to authorise fraudulent payments. These attacks require no malware; they succeed through social engineering alone.
The core technical controls
SPF — Sender Policy Framework
An SPF record in your domain's DNS tells receiving mail servers which IP addresses are authorised to send email on behalf of your domain. Without it, anyone can send email that appears to come from your address. SPF alone is not sufficient protection, but it is a foundational requirement that every business domain should have configured correctly.
DKIM — DomainKeys Identified Mail
DKIM adds a cryptographic signature to every outbound message. The receiving server can verify this signature against a public key published in your DNS. If an email is modified in transit — or if a criminal attempts to send forged email — the DKIM signature will fail verification. DKIM works in conjunction with SPF rather than replacing it.
DMARC — Domain-based Message Authentication, Reporting and Conformance
DMARC builds on SPF and DKIM by specifying what a receiving server should do when an email fails authentication — quarantine it, reject it, or do nothing — and provides reporting back to the domain owner. A DMARC policy set to reject provides the strongest protection against domain spoofing. Many UK businesses have SPF and DKIM configured but leave DMARC in none monitoring mode indefinitely, which provides no active protection.
Email security gateways
Authentication protocols stop spoofing, but they do not filter malicious content arriving through legitimate sending infrastructure. An email security gateway sits between the internet and your mail server, scanning every inbound and outbound message for:
- Known malware signatures and zero-day threats using sandboxing
- Phishing URLs checked against threat intelligence feeds
- Suspicious attachment behaviour (macro-enabled documents, obfuscated scripts)
- Data loss prevention rules on outbound email
Solutions such as Microsoft Defender for Office 365, Proofpoint, Mimecast and Abnormal Security operate in this space. Microsoft 365 Business Premium includes Defender for Office 365 Plan 1, which provides baseline gateway capabilities. Organisations with higher risk profiles often layer a third-party gateway on top for additional filtering depth.
Business email compromise and impersonation attacks
BEC attacks are particularly difficult to block with technical controls because the email itself may be entirely legitimate — sent from a real, uncompromised account that has been set up to mimic a trusted contact. Warning signs include:
- A request to change bank account details for a supplier payment
- An urgent instruction from the CEO to transfer funds, sent outside normal channels
- A reply to an ongoing email thread where the reply-to address differs from the sender
- Requests that bypass normal approval workflows because of claimed urgency
Staff training is the primary control here. Any payment instruction or request to change financial details received by email should be verified through a separate channel — a phone call to a known number, not a number provided in the suspicious email.
Email encryption
Encrypting email in transit (TLS) is now standard between major mail providers. End-to-end encryption — where only the sender and recipient can read the message — is appropriate for sensitive communications such as legal advice, financial data, or personal information. Microsoft 365 Message Encryption and S/MIME are both available within the Microsoft 365 ecosystem. For ad hoc secure file sharing, a secure file transfer portal is often more practical than encrypted email.
Backup and email archiving
Email data is frequently subject to legal hold, regulatory retention requirements, and business continuity needs. Microsoft 365 includes Exchange Online archiving, but organisations should consider whether a dedicated third-party email backup solution is also required — Microsoft's native retention policies are not a substitute for an independent backup that can recover individual items deleted through administrative error or malicious action.
AMVIA helps UK businesses configure email security from the ground up — including DMARC enforcement, gateway deployment, and staff awareness training — as part of a managed security programme.
Building an email security policy
Technical controls work best when supported by a written email security policy that covers: acceptable use of business email, handling of attachments and links from unknown senders, reporting procedures for suspected phishing, and the process for verifying unusual payment requests. Policy alone achieves nothing without regular reinforcement through training and, ideally, simulated phishing exercises.
Is Your Email Domain Fully Protected?
Many UK businesses have partial email authentication in place but gaps that leave them vulnerable to spoofing. AMVIA can check your SPF, DKIM and DMARC configuration and close the gaps quickly.
Frequently Asked Questions
Phishing refers to bulk, untargeted email attacks that attempt to deceive large numbers of recipients. Spear phishing is targeted — the attacker researches a specific individual or organisation and crafts a convincing email referencing real colleagues, ongoing projects, or genuine business relationships. Spear phishing attacks are significantly harder to detect. <strong>47% rise in attacks evading Microsoft's native defences</strong> and secure email gateways (SEGs) — KnowBe4 2025 Phishing Benchmark Report. <em>(Microsoft)</em>
Yes. SPF and DKIM authenticate your email, but DMARC is what tells receiving servers what to do when authentication fails and provides you with visibility into who is sending email using your domain. Without a DMARC policy set to quarantine or reject, your domain remains vulnerable to spoofing even with SPF and DKIM in place.
Microsoft 365 includes Exchange Online Protection (EOP) across all plans, which provides basic spam and malware filtering. Business Premium and higher plans include Defender for Office 365 with anti-phishing policies, safe links and safe attachments. Larger organisations often supplement this with third-party gateway solutions for additional coverage.
Common indicators include unexpected password reset requests, unusual login activity notifications, emails from colleagues requesting urgent action on financial matters, and messages with links that do not match the displayed URL text. If you suspect a phishing email was opened, change passwords immediately and contact your IT team. <strong>84.2% of phishing attacks passed DMARC authentication</strong> in 2024 — meaning the most common email authentication standard provides limited protection against sophisticated attacks (Egress Phishing Threat Trends Report). <em>(Microsoft)</em>
Business email compromise is a type of attack where criminals impersonate executives, suppliers or colleagues — either using spoofed addresses, compromised accounts, or lookalike domains — to deceive employees into making fraudulent payments or disclosing sensitive information. BEC losses to UK businesses run into hundreds of millions of pounds annually. <strong>83% of advanced phishing attacks</strong> bypass multi-factor authentication (Egress 2024). <em>(Microsoft)</em>
Security awareness training should be ongoing rather than a one-off annual event. Simulated phishing exercises conducted quarterly, combined with brief educational interventions when staff interact with simulated phishing emails, are significantly more effective than annual presentations. The goal is to build habitual vigilance, not just knowledge.
Related Reading
What Is DMARC?
A detailed explanation of the DMARC email authentication protocol and how to implement it for your business domain.
Email Phishing: Keeping Your Business Safe
A practical guide to recognising phishing attacks and building the staff awareness needed to stop them.
Email Security Gateway
How email security gateways work and which solution is right for your business size and risk profile.