• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar

Red Sift Blog

Red Sift Blog
  • redsift.com
  • Featured
  • Who are we?
  • Get in touch
You are here: Home / Email / 5 email security basics for every type of business

5 email security basics for every type of business

by Sabrina Evans
August 5, 2021September 1, 2022Filed under:
  • Email

Email security can be hard. While making sure your business infrastructure is protected from threats like phishing attacks, business email compromise and ransomware hits is a must, knowing how to lay the foundations for your email security framework isn’t as easy as it might sound.

Just one quick Google search for the ‘best email protection’ will highlight the amalgam of offers out there, all aimed at securing your posture in an ever-growing threat landscape. There are masses of products on the market, a sea of solutions to choose from, and reams of ‘best-practice’ advice. 

But stripping it all back, what essential building blocks should make up the foundation of your business’ email security posture? In this blog, we’ll cover the 5 email security measures every business should have in place.

1. Secure Cloud-Based Email Hosting 

In its simplest form, cloud-based email gives businesses the tools they need to send, receive, and store messages via the internet. Whereas in the past, email client software was installed on computers to send and receive email, cloud-based hosting enables this to be done via a browser. 

This means that businesses and users can access their email from anywhere, aren’t weighed down by servers, can easily recover lost data in an emergency, and scale up or down in line with their business. 

From a security standpoint, cloud email hosting is the way forward. Not just because of the ease of use it offers, but because most cloud-based solutions offer maintenance and essential security like DMARC, 2FA, and good spam filtering as part of the package. 

Two of the most popular cloud-based email vendors are Microsoft M365 and Google Workspace.

2. DMARC policy in p=reject

If your business uses email in any capacity to communicate with customers, employees, or suppliers (let’s face it, this is most businesses), then it’s absolutely essential that your DMARC policy is configured at p=reject.

DMARC stands for Domain-based Message Authentication, Reporting, and Conformance, and it’s a globally standardized protocol which was founded in 2012. When configured correctly in p=reject, it protects your domain against exact impersonation using existing security protocols SPF and DKIM. This means that no bad actors can send fraudulent or phishing emails while pretending to be you by impersonating your domain.

By implementing DMARC, you’re protecting your customers, employees, supply chain and brand reputation from the often devastating effects of phishing scams, spear phishing, business email compromise, ransomware attacks, and more. You’re also contributing to the improved security of the wider email ecosystem. 

But there are other more business-based benefits of implementing DMARC too, such as improved deliverability and better inbox placement. This is because by implementing DMARC, you’re telling recipient servers that your emails are coming from a valid source. Then there’s Brand Indicators for Message Identification, or BIMI for short. Perhaps one of the most beneficial rewards for marketers, BIMI lets businesses attach their registered logo to any DMARC-authenticated emails they send. Not only does this boost brand impressions, but we found that showing a logo on an email positively impacts how the recipient interacts with it too.

As mentioned above, if you’re using a cloud vendor like Microsoft M365 or Google Workspace then good news, you’ll already have DMARC in place. But if not, then correct DMARC configuration is a must-do, both for the security and marketing benefits it provides. But we won’t lie, whiteknuckling the DMARC journey alone isn’t advised. It can be very difficult, and if done incorrectly, it can actually lead to more issues to do with deliverability. But that’s where our award-winning product OnDMARC comes into play, making DMARC configuration quick, easy and painless for everyone. 

Find out more

3. 2 Factor Authentication 

2 Factor Authentication (2FA) is essentially the practice of setting up an added layer of security to your email logins. It works by allowing an application to link your user to an authentication mechanism (i.e. an authenticator app). Each time it’s used, a unique verification code is generated and recognized by the application to confirm that your login is valid. 

2FA is an essential component in the quest to keep email accounts throughout your organization secure. This is because it protects from account takeover, especially if and when passwords are reused and leaked.

4. Password Management 

There’s a password for everything nowadays. And while it’s never a good idea to reuse or share passwords across devices, having a different one for every application and simultaneously conjuring any one of these up in your mind in your moment of need can be really challenging. 

So, a password manager does exactly what it says on the tin, securely storing the different passwords for your various accounts across the internet in one easy-to-access place. (That is of course, unless you forget your master password for that too).

We’ll admit, it’s not the most intuitive or high-tech solution to this seemingly universal problem. But until there’s a better approach, a Password Manager can be a useful way to ensure your passwords are secure and accessible. However, it’s worth remembering that while having a password manager is recommended, it’s never a substitute for 2FA. 

Google Chrome offers a free password manager, but there are also more advanced options like LastPass too. 

5. Spam Detection and File Scanning

While putting the right outbound email protection in place is vital, most businesses will also want to rest assured knowing there’s a sufficient layer of security identifying, mitigating and solving inbound email threats too.

That’s where Spam Detection and File Scanning solutions come in, examining inbound emails and attachments for all manner of threats. Most cloud-based vendors and more traditional SEGs offer these as part of their service. But if you’re not using one of these, it’s still an important extra layer to add to your foundational email security setup.  

Take the first step towards more secure email today

We hope this blog is useful in offering a straightforward run-down of the measures most essential for your business’ email security. To make a start on one of the most important steps today, sign up for your free OnDMARC trial below!

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Related

Tagged:
  • basics
  • Email
  • email security

Post navigation

Previous Post Tipping the balance: why businesses need to prioritize value preservation in line with value generation
Next Post Tackle phishing: The rise of the machine

Primary Sidebar

Subscribe to our blog and be the first to get updates!

Categories

  • AI
  • BEC
  • BIMI
  • Brand Protection
  • Coronavirus
  • Cybersecurity
  • Deliverability
  • DMARC
  • DORA
  • Email
  • Finance
  • Labs
  • News
  • OnINBOX
  • Partner Program
  • Red Sift Tools
  • Work at Red Sift
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • October 2016

Copyright © 2023 · Milan Pro on Genesis Framework · WordPress · Log in