Email Security Risks: What Threatens Your Business Inbox
The biggest email security risks for UK businesses in 2026 go far beyond spam. Phishing, business email compromise, ransomware delivery, account takeover and vendor email fraud each present distinct challenges that require specific technical and organisational controls.
Nathan Hill-Haimes
Technical Director
Email: the attack surface that never closes
Organisations spend considerable effort securing their networks and endpoints, but email remains persistently exposed — by design. Every business needs to receive email from anyone, which means the channel is always accessible to attackers. The UK government's Cyber Security Breaches Survey consistently finds that phishing is the most commonly identified attack type, affecting the majority of businesses that experience a security incident.
Understanding the specific risks — and how they differ from each other — is the foundation for building proportionate defences.
Risk 1: Phishing
Phishing emails deceive recipients into taking a harmful action: clicking a malicious link, opening a compromised attachment, or entering credentials into a fake website. The scale ranges from mass-sent campaigns impersonating HMRC, parcel companies and banks, to carefully crafted targeted attacks on specific individuals.
The NCSC reports that credential phishing — stealing email or Microsoft 365 login details — is the most prevalent form, because a compromised account opens the door to the rest of the business's data and communication. Once inside an email account, attackers can intercept sensitive information, redirect payments, and use the legitimate account to launch further attacks on customers and suppliers.
Risk 2: Business email compromise (BEC)
BEC attacks involve criminals impersonating executives, suppliers or other trusted contacts to manipulate employees into transferring money or sharing sensitive information. What makes BEC particularly dangerous is that it typically involves no malicious payload — no links to scan, no attachments to detonate. The attack succeeds through social engineering alone.
Common BEC scenarios include:
- A "CEO" emailing the finance team requesting an urgent bank transfer to a new account
- A known supplier emailing to say their bank details have changed, requesting all future payments go to a new account
- A legal firm emailing the conveyancing client to say the completion funds should be sent to an updated account
UK businesses lose hundreds of millions each year to BEC fraud. Verification procedures — confirming any payment instruction or account change through a separate, trusted channel — are the primary control.
Risk 3: Ransomware delivery via email
Email is the most common delivery mechanism for ransomware. The attack chain typically follows: phishing email with malicious attachment or link → credential theft or malware installation → lateral movement → ransomware deployment across the network.
Modern ransomware campaigns are often conducted by specialised groups who sell access to compromised networks to ransomware operators (ransomware-as-a-service). Initial access via a single phishing email can ultimately result in the entire organisation's data being encrypted. The average UK SME ransomware recovery cost, including downtime, exceeds £50,000 — before any ransom payment.
Risk 4: Account takeover
When phishing credentials are successfully stolen, attackers typically access the account quietly before making any obvious moves. They may set up email forwarding rules to copy all email to an external address, create filters to hide replies to fraudulent emails, or simply monitor communications to identify the right moment to strike.
Many account takeover victims do not realise their account was compromised until weeks or months later, when a fraud investigation traces the chain back. Multi-factor authentication is the primary preventive control — it means stolen credentials alone are not sufficient to access the account.
Risk 5: Domain spoofing and lookalike domains
Criminals register domains that closely resemble legitimate business domains — amvia.co versus amvia.co.uk, or amv1a.co.uk — and send email from these addresses impersonating the real organisation. Recipients not paying close attention to the sender address are deceived into believing the email is genuine.
DMARC enforcement protects your own domain from being spoofed directly, but it does not prevent lookalike domain attacks. Domain monitoring services — which alert you when new domains similar to yours are registered — provide early warning. Some email security gateways include lookalike domain detection as part of their anti-phishing capabilities.
Risk 6: Malicious email attachments
Despite years of warnings, malicious email attachments remain highly effective. Macro-enabled Office documents, compressed archives containing executable files, and PDFs with embedded malicious scripts are all commonly used. The risk is particularly acute when attachments arrive as part of a contextualised attack — a "purchase order" sent to the accounts team, or a "contract" sent to a legal contact, that appears entirely plausible.
Email security gateways with sandboxing capabilities detonate attachments in an isolated environment before delivery, providing the best available technical control against unknown attachment-based threats. Disabling macro execution by default in Office applications (the Microsoft 365 default policy) removes a significant attack vector.
Mitigating email security risks
No single control addresses all these risks. The effective approach is layered: authentication protocols (SPF, DKIM, DMARC) to prevent spoofing, a properly configured gateway to filter malicious content, MFA on all email accounts to prevent account takeover, user awareness training to catch attacks that technology misses, and clear financial verification procedures to address BEC. AMVIA designs and manages these controls for UK businesses as part of integrated cybersecurity programmes.
Understand Your Email Threat Exposure
AMVIA can map your current email security controls against the real-world threat landscape and identify which risks your business is most exposed to.
Frequently Asked Questions
Business email compromise and ransomware delivered via email are consistently the most financially damaging. BEC attacks directly result in fraudulent fund transfers. Ransomware encrypts business data and causes operational shutdowns with recovery costs that frequently exceed six figures for SMEs, including downtime, remediation and reputational impact. <strong>47% rise in attacks evading Microsoft's native defences</strong> and secure email gateways (SEGs) — KnowBe4 2025 Phishing Benchmark Report. <em>(Microsoft)</em>
DMARC instructs receiving mail servers to quarantine or reject emails that claim to come from your domain but fail SPF and DKIM authentication checks. This prevents criminals from sending convincing phishing emails that appear to come from your genuine domain. DMARC does not protect against lookalike domains, which require separate monitoring.
Yes, and this is increasingly common. Attackers use services like Microsoft 365, Google Workspace, Dropbox and SharePoint to send or host phishing content, because these services have strong reputations that email filters trust. This is why behavioural analysis and contextual machine learning detection matter in addition to reputation-based filtering. <strong>84.2% of phishing attacks passed DMARC authentication</strong> in 2024 — meaning the most common email authentication standard provides limited protection against sophisticated attacks (Egress Phishing Threat Trends Report). <em>(Microsoft)</em>
An email worm is malware that, once it infects a system, automatically sends copies of itself to contacts in the victim's address book. This self-propagating behaviour can spread an infection rapidly across an organisation's contacts and supply chain. Modern endpoint protection and email scanning detect known worm signatures, but novel variants may initially evade detection.
After compromising an email account, attackers often create silent forwarding rules that copy all incoming email to an external address, sometimes combined with rules that hide the forwarded messages from the account owner. This allows them to monitor communications for payment instructions, business intelligence or opportunities to intervene in financial transactions without the account owner's knowledge. <strong>83% of advanced phishing attacks</strong> bypass multi-factor authentication (Egress 2024). <em>(Microsoft)</em>
Personal email accounts typically lack the enterprise security controls applied to business accounts — no gateway scanning, no DLP policies, no centralised MFA management, no audit logging. Using personal email for business communications creates both security and compliance risks, particularly where business data and personal data are handled under UK GDPR obligations. <strong>44% of phishing emails</strong> were sent from compromised accounts, helping them bypass authentication protocols — 8% came from within the supply chain (Egress 2024). <em>(Microsoft)</em>
Related Reading
Email Security Gateway
How email security gateways filter the threat landscape before it reaches your staff inboxes.
Email Spoofing: How to Detect and Prevent It
A detailed guide to email spoofing attacks and the technical controls that stop them.
Business Backup & Avoiding Ransomware
How proper backup architecture helps UK businesses recover from ransomware without paying the ransom.