Email Security Risks for Businesses: AMVIA Threat Guide
Email-based threats cost UK businesses billions annually. This guide examines the most prevalent risks — phishing, BEC, ransomware, account takeover and data leakage — with statistics, real patterns, and the prevention strategies that actually work.
Matt Cannon
Managing Director
The scale of the email threat problem
The UK's Cyber Security Breaches Survey 2024 found that phishing was the most prevalent type of cyber attack, experienced by 84% of businesses reporting a breach. Action Fraud data shows that email-related fraud — including business email compromise — results in losses running to hundreds of millions of pounds annually across UK businesses. Despite significant investment in technical controls, the fundamental challenge of email security persists: the channel is designed for open communication, which makes it inherently difficult to lock down without disrupting legitimate use.
Understanding the threat landscape in detail — what attackers are trying to achieve, how they operate, and where controls are most effective — is the practical starting point for improving your defences.
Phishing: volume and targeting
Phishing remains the most common email threat by volume. Mass-sent campaigns impersonating trusted brands — HMRC, Royal Mail, NHS, Microsoft, banks — are sent in their millions daily and catch a small but significant proportion of recipients. The economics are compelling for attackers: send ten million emails, deceive 0.01%, and you have a thousand successful compromises.
Volume phishing relies on plausibility at scale. Targeted spear phishing — where attackers research a specific individual or organisation and craft a tailored message — requires more effort but delivers much higher success rates. LinkedIn and Companies House make it straightforward to identify targets, map reporting lines, and find the names of colleagues and suppliers to reference convincingly.
Credential phishing statistics
The NCSC identifies credential theft as the primary objective of most phishing campaigns. Microsoft reports that account takeover attacks using phished credentials represent a significant proportion of all cloud service compromises. Once credentials are stolen, attackers typically access the account within hours, set up forwarding rules to monitor communications, and wait for the right opportunity to intervene in financial transactions.
Business email compromise: the high-value attack
BEC fraud targets businesses rather than individuals, aiming for single high-value transactions rather than many small ones. The typical attack targets the accounts payable or finance function, using an impersonated email from a CEO, a supplier, or a legal adviser to authorise a fraudulent payment.
FBI IC3 data — which tracks internationally — consistently ranks BEC as the highest-loss category of cybercrime. UK data from Action Fraud reflects the same pattern at a national level. Critically, many BEC attacks contain no malware and no malicious links, meaning email security gateways may do nothing to prevent them. The countermeasure is procedural: any instruction to transfer funds or change payment details must be verified through a separate, confirmed communication channel.
Ransomware via email: the operational risk
Ransomware is most commonly delivered via phishing email, either as a malicious attachment or a link to a compromised download. Once executed, modern ransomware families identify and encrypt data across connected drives, network shares and cloud storage before displaying a ransom demand.
For UK SMEs, the operational impact of a ransomware infection is frequently more damaging than the ransom amount itself. Businesses that cannot access their systems for days or weeks face lost revenue, broken client contracts, recovery costs, and — where personal data is involved — potential ICO fines. The NCSC advises against paying ransoms and recommends that businesses maintain tested backup and recovery capabilities as their primary defence.
Account takeover: silent and persistent
When a phishing attack successfully captures credentials and MFA has not been enabled, attackers gain full access to the victim's email account. Rather than immediately taking obvious action, sophisticated attackers operate quietly — forwarding emails to external addresses, searching for payment instructions, supplier banking details and sensitive client information, and waiting for the right opportunity.
Signs of account takeover include unexpected password reset notifications, colleagues reporting unusual emails from your address, email forwarding rules you did not create, and sent items you do not recognise. Regular review of account login history and active sessions — both available in Microsoft 365 — helps detect compromise early.
Email-borne data leakage
Not all email security risks involve inbound attacks. Outbound email is a significant data leakage vector — personal data, commercially sensitive information and regulated financial data all regularly leave organisations via email, sometimes accidentally and sometimes deliberately. A misdirected email — sending client data to the wrong address — is the most common type of data breach reported to the ICO.
Data loss prevention (DLP) policies in email security gateways can identify and block or flag outbound messages containing defined sensitive data patterns. Combined with clear staff training on email data handling, this significantly reduces the risk of accidental disclosure.
Vendor and supply chain email fraud
A growing category of email fraud targets the supplier-customer relationship. Attackers compromise a supplier's email account, monitor invoicing conversations, and at the right moment send a convincing email from the legitimate supplier account requesting that future payments be redirected to a new bank account. Because the email comes from a genuine account the business has communicated with before, it passes technical filters and often the human judgement check too.
AMVIA recommends that any bank account change request from a supplier be verified by phone — using a number from your own records, not one provided in the email — before processing, regardless of how authentic the email appears.
Which Email Risks Is Your Business Most Exposed To?
Every business has a different email risk profile based on its sector, size, and current controls. AMVIA can identify your specific exposures and prioritise the controls that make the most difference.
Frequently Asked Questions
Estimates vary by source and year, but a frequently cited figure from security researchers is that 90% or more of successful cyberattacks involve a phishing email as the initial access vector. The UK government's Cyber Security Breaches Survey supports this, with phishing consistently identified as the most common attack type reported by businesses. <strong>47% rise in attacks evading Microsoft's native defences</strong> and secure email gateways (SEGs) — KnowBe4 2025 Phishing Benchmark Report. <em>(Microsoft)</em>
Attackers use publicly available information: LinkedIn profiles identify roles, reporting lines and colleagues; Companies House filings identify directors and registered addresses; corporate websites name contacts and describe services; and social media provides personal context. Combining these sources allows convincing, targeted emails to be crafted with relatively little effort. <strong>84.2% of phishing attacks passed DMARC authentication</strong> in 2024 — meaning the most common email authentication standard provides limited protection against sophisticated attacks (Egress Phishing Threat Trends Report). <em>(Microsoft)</em>
Any instruction received by email to transfer funds, change supplier bank details, or authorise a payment outside normal approval channels should require verbal verification before action. Use a phone number from your own records — not a number provided in the email. This simple procedural control prevents the majority of BEC fraud regardless of how convincing the email appears.
Common evasion techniques include using newly registered domains with no negative reputation, routing email through legitimate cloud services such as Microsoft or Google, using malicious links that only become active after email delivery (bypassing time-of-delivery scanning), and crafting emails with no malicious payloads that rely on social engineering alone. <strong>83% of advanced phishing attacks</strong> bypass multi-factor authentication (Egress 2024). <em>(Microsoft)</em>
Yes. Financial services, legal, healthcare, and construction firms are disproportionately targeted because of the high-value transactions they handle. Law firms are particularly targeted for payment fraud at the point of property completions. Any business with regular high-value financial transactions or access to sensitive personal data is a higher-value target. <strong>44% of phishing emails</strong> were sent from compromised accounts, helping them bypass authentication protocols — 8% came from within the supply chain (Egress 2024). <em>(Microsoft)</em>
In the UK, email fraud should be reported to Action Fraud (actionfraud.police.uk) and the NCSC (report.ncsc.gov.uk). If personal data has been compromised, reporting to the ICO within 72 hours is required under UK GDPR. Businesses in regulated sectors should also follow their sector-specific incident notification requirements.
Related Reading
Email Security Risks
A concise overview of the key email threats and how each one can be mitigated.
Email Spoofing: How to Detect and Prevent It
How email spoofing works and the technical controls that prevent criminals exploiting your domain.
Business Backup & Avoiding Ransomware
How to build ransomware resilience so that an email-delivered attack does not become a business-ending event.