Email Security Fundamentals: The Business Guide
Every business using email needs to understand four fundamentals: authentication protocols to prevent spoofing, content filtering to block malicious messages, encryption for sensitive data, and user training to catch what technology misses.
Nathan Hill-Haimes
Technical Director
The four pillars of email security
Email security is one of those areas where businesses often have something in place but are uncertain whether it is adequate. A Microsoft 365 subscription includes basic protection. A spam filter handles some of the obvious threats. But the gap between "something" and a properly configured email security posture can be substantial — and that gap is where most successful attacks occur.
Understanding the four fundamentals gives you a clear framework for assessing where you are and what you still need.
Pillar 1: Authentication — proving your email is genuinely from you
Email authentication addresses a fundamental weakness in how email was originally designed: anyone could claim to send email from any address. The three protocols that fix this work together:
SPF (Sender Policy Framework)
You publish a DNS record listing the mail servers authorised to send email on behalf of your domain. When another server receives an email claiming to be from you, it checks whether it came from an authorised source. If not, SPF fails. Many businesses have an SPF record but have not updated it to include all their legitimate sending services — transactional email platforms, CRM systems, and helpdesk tools often need to be added explicitly.
DKIM (DomainKeys Identified Mail)
DKIM adds a digital signature to every outbound message, created using a private key held by your mail server and verified by recipients using a public key published in your DNS. This confirms both the authenticity of the sending domain and that the message has not been modified in transit. DKIM should be enabled for every domain from which your organisation sends email.
DMARC (Domain-based Message Authentication, Reporting and Conformance)
DMARC is the policy layer that acts on SPF and DKIM results and tells receiving servers what to do when an email fails authentication — monitor only (p=none), send to junk (p=quarantine), or reject the message entirely (p=reject). A DMARC policy of p=reject provides the strongest protection against your domain being used in phishing campaigns. DMARC also sends aggregate reports back to you, giving visibility into all email being sent using your domain — including the legitimate sending sources you may have forgotten about.
The ideal progression is: deploy DMARC in p=none monitoring mode, use the reports to identify all legitimate sending sources, ensure they all pass SPF and DKIM, then advance to p=quarantine and eventually p=reject.
Pillar 2: Filtering — blocking malicious content
Authentication stops email being sent fraudulently from your domain, but it does not filter the content of inbound email. An email security gateway analyses every inbound message against multiple threat intelligence feeds and detection methods:
- Signature-based detection: Matches known malware samples in attachments and known malicious URLs against databases of confirmed threats
- Heuristic analysis: Identifies suspicious characteristics in new, unknown threats based on patterns that resemble known attacks
- Sandboxing: Opens attachments in an isolated environment to observe behaviour before allowing delivery
- Machine learning: Detects anomalous patterns in message content, headers and metadata that indicate phishing, even without matching known signatures
Microsoft 365 includes Exchange Online Protection (all plans) and Defender for Office 365 (Business Premium and above). Third-party gateways from Mimecast, Proofpoint and similar vendors add additional filtering depth for higher-risk environments.
Pillar 3: Encryption — protecting message content
Filtering protects your inbox; encryption protects the content of messages you send and receive. The three levels of email encryption are:
- Transport Layer Security (TLS): Encrypts email in transit between mail servers. Widely supported and automatic between major providers, but does not protect messages in storage or if a server is compromised
- Message-level encryption (e.g. Microsoft 365 Message Encryption): Encrypts message content so only the intended recipient can read it. Suitable for sending sensitive information to external recipients without requiring them to have their own certificates
- S/MIME or PGP: End-to-end encryption using digital certificates or key pairs. Provides the strongest protection but requires both sender and recipient to have the infrastructure in place, making it practical mainly for defined partner relationships
Pillar 4: User training — the human layer
Technical controls reduce the volume and impact of threats, but they cannot make zero mistakes. The human layer — staff who recognise suspicious emails and know what to do — is what catches the attacks that slip through filtering. Effective training is not a one-off event but a continuous programme that includes:
- Regular security awareness sessions covering current phishing tactics
- Simulated phishing exercises with immediate, contextual feedback
- Clear reporting procedures so staff can escalate suspicious emails quickly
- A culture where reporting a suspected phishing email is normal and encouraged, not embarrassing
The NCSC's Cyber Essentials scheme — widely supported by AMVIA for UK business clients — covers foundational technical controls including secure configuration, access control and malware protection, providing a recognised certification that complements the four-pillar approach.
Do Your Email Authentication Records Pass?
Many businesses have incomplete or misconfigured SPF, DKIM and DMARC records. AMVIA can check your DNS configuration and correct any issues that leave your domain vulnerable to spoofing.
Frequently Asked Questions
If you have no email security controls at all, MFA on email accounts and a correctly configured SPF record are the highest-priority starting points. MFA prevents account takeover if credentials are phished. SPF prevents your domain from being spoofed in outbound phishing campaigns targeting others. Both are quick to implement.
Free online tools such as MXToolbox allow you to look up your domain's SPF record and check it for common errors including syntax mistakes, exceeding the DNS lookup limit of 10, and missing legitimate sending sources. Your email provider can confirm which IP addresses or includes need to be present.
A DMARC policy of p=quarantine instructs receiving mail servers to send emails that fail authentication to the recipient's spam or junk folder rather than the inbox. A policy of p=reject instructs servers to refuse delivery of failing emails entirely. Reject provides stronger protection but requires confidence that all legitimate email sources are correctly authenticated first.
Signature-based filtering cannot detect zero-day threats by definition, since they have no known signature. Modern gateways address this with behavioural sandboxing (detonating attachments to observe behaviour) and machine learning models that identify suspicious patterns without requiring a known signature match. These approaches improve detection but are not infallible.
UK GDPR does not mandate specific encryption standards but requires organisations to implement appropriate technical measures to protect personal data. Sending personal data by unencrypted email to recipients outside your organisation — particularly sensitive categories of data — may be considered inadequate under the accountability principle. Encrypted email or a secure file sharing portal is appropriate for this purpose.
Retention requirements vary by sector and type of communication. HMRC generally expects business records to be kept for at least 6 years. Financial services firms under FCA rules may have obligations of 5-7 years for specific communication types. Legal firms may hold professional liability considerations requiring longer retention. Your IT and legal advisors should define a retention policy that meets your specific obligations.
Related Reading
Email Protection: Layers of Defence Explained
A deeper look at how the layers of email protection work together to defend against modern threats.
What Is DMARC?
DMARC explained in plain language: how the protocol works and how to implement it for your business domain.
Business Email Security
A complete guide to protecting your business email from phishing, spoofing, BEC and malware.