Email remains the primary attack vector for cybercriminals, with phishing responsible for over 90% of successful breaches. This guide covers technical controls, email authentication, and human-focused defenses to protect your organization.

The email threat landscape

Attack types

AttackDescriptionImpact
PhishingMass credential harvestingAccount compromise
Spear phishingTargeted attacks on individualsData theft, malware
Business Email CompromiseImpersonation for fraudFinancial loss
Malware deliveryMalicious attachments/linksRansomware, backdoors
Account takeoverCompromised legitimate accountsTrust exploitation
TrendImpact
AI-generated phishing54% click rates vs 12% traditional
QR code phishing (quishing)Bypasses URL scanning
Callback phishingVoice + email combined attacks
Thread hijackingReplies in legitimate conversations
MFA fatigue attacksPush notification bombing

Email authentication fundamentals

SPF (Sender Policy Framework)

ComponentPurpose
DNS TXT recordLists authorized sending IPs
ValidationReceiving server checks sender IP
ResultPass, fail, softfail, neutral

Example SPF record:

v=spf1 include:_spf.google.com include:sendgrid.net -all

DKIM (DomainKeys Identified Mail)

ComponentPurpose
Private keySigns outgoing messages
Public keyPublished in DNS for verification
SignatureHeader added to each email

DMARC (Domain-based Message Authentication)

ComponentPurpose
PolicyNone, quarantine, or reject
AlignmentSPF and DKIM must align with From domain
ReportingAggregate and forensic reports

DMARC implementation stages:

StagePolicyPurpose
1p=noneMonitor only
2p=quarantineSend failures to spam
3p=rejectBlock failures entirely

Secure Email Gateway (SEG)

Core capabilities

FeatureFunction
Spam filteringBlock unsolicited email
Malware scanningDetect malicious attachments
URL rewritingInspect links at click time
SandboxingDetonate suspicious files
Impersonation detectionIdentify spoofed senders

Advanced features

FeatureFunction
BEC detectionAnalyze communication patterns
Lookalike domain detectionFlag typosquatting
Attachment sandboxingExecute files safely
URL sandboxingAnalyze link destinations
Post-delivery protectionRemediate after delivery

Leading solutions

VendorKey strength
ProofpointThreat intelligence
MimecastBEC protection
Microsoft DefenderM365 integration
Abnormal SecurityAI-based detection
Cisco Email SecurityEnterprise integration

Phishing-resistant MFA

Why traditional MFA fails

MFA typeVulnerability
SMS codesSIM swapping, SS7 attacks
Push notificationsFatigue attacks
TOTP appsReal-time phishing proxies
Email codesAccount takeover

Phishing-resistant options

MethodHow it resists phishing
FIDO2/WebAuthnOrigin binding, no shared secrets
Hardware keysPhysical possession required
PasskeysDevice-bound, biometric
Certificate-basedPKI validation

Implementation priority

User typeRecommended MFA
AdministratorsHardware keys (mandatory)
ExecutivesHardware keys
Finance/HRHardware keys or passkeys
General usersPasskeys, then push
ContractorsConditional access + MFA

Business Email Compromise (BEC) defense

BEC attack patterns

PatternScenario
CEO fraudFake executive requests wire transfer
Vendor impersonationAttacker poses as supplier
Account compromiseReal account used for fraud
Attorney impersonationFake legal urgency
Payroll diversionChange direct deposit info

Technical controls

ControlFunction
External sender tagsMark emails from outside
Lookalike domain alertsFlag similar domains
New sender warningsHighlight first-time contacts
Wire transfer verificationOut-of-band confirmation
Display name analysisDetect executive impersonation

Process controls

ControlImplementation
Dual authorizationTwo approvers for transfers
Callback verificationCall known numbers to confirm
Payment change proceduresMulti-step vendor updates
Executive communication policyNo wire requests via email only

User awareness training

Training program elements

ElementFrequency
New hire trainingOnboarding
Annual refresherYearly
Phishing simulationsMonthly
Just-in-time trainingAt failure point
Role-based trainingAs needed

Effective simulation practices

PracticeRationale
Realistic templatesMatch actual threats
Graduated difficultyBuild skills progressively
Immediate feedbackTeachable moments
No public shamingEncourage reporting
Track improvementMeasure over time

Key metrics

MetricTarget
Click rate<5%
Report rate>70%
Time to report<5 minutes
Repeat offenders<2%

Incident response for email

Phishing response workflow

StepAction
1User reports suspicious email
2SOC triages and analyzes
3Extract indicators (URLs, hashes)
4Search for similar messages
5Quarantine/delete from all mailboxes
6Block indicators
7Notify affected users
8Document and close

Compromise response

StepAction
1Confirm account compromise
2Reset credentials immediately
3Revoke active sessions
4Review mail rules and forwarding
5Check sent items for BEC
6Analyze access logs
7Notify potential victims
8Enhanced monitoring

Email security architecture

Defense in depth layers

LayerControls
PerimeterSEG, DMARC enforcement
MailboxNative protection, add-ons
EndpointEDR, browser isolation
UserTraining, reporting button
ProcessVerification procedures

Microsoft 365 security stack

ComponentFunction
Exchange Online ProtectionBasic filtering
Defender for Office 365 P1Safe attachments/links
Defender for Office 365 P2Threat investigation
Conditional AccessContext-based access
Insider Risk ManagementInternal threat detection

Google Workspace security

ComponentFunction
Gmail protectionBuilt-in filtering
Security sandboxAttachment analysis
Advanced phishing protectionSpoofing detection
Security investigation toolThreat analysis
Context-aware accessConditional policies

Metrics and reporting

Operational metrics

MetricPurpose
Emails blockedVolume of threats stopped
Phishing reportedUser engagement
Mean time to remediateResponse efficiency
False positive rateTuning accuracy

Risk metrics

MetricPurpose
Click rate trendTraining effectiveness
BEC attemptsTargeted attack frequency
Account compromisesBreach indicator
DMARC complianceAuthentication coverage

Implementation roadmap

Phase 1: Foundation (Month 1-2)

TaskPriority
Implement DMARC monitoringCritical
Deploy SEG or enhance nativeCritical
Enable external sender tagsHigh
Create reporting processHigh

Phase 2: Enhancement (Month 3-4)

TaskPriority
Move DMARC to quarantineHigh
Deploy phishing simulationsHigh
Implement BEC controlsHigh
Enable URL rewritingMedium

Phase 3: Maturity (Month 5-6)

TaskPriority
Move DMARC to rejectHigh
Deploy phishing-resistant MFAHigh
Automate response playbooksMedium
Implement advanced analyticsMedium

Common mistakes to avoid

MistakeImpact
DMARC at p=none foreverNo protection benefit
Punishing simulation failuresDiscourages reporting
Relying solely on technologyHumans remain vulnerable
Ignoring internal emailCompromised accounts abuse trust
No executive buy-inInsufficient resources

Key takeaways

  1. Layer defenses - No single control stops all threats
  2. Implement DMARC - Progress to p=reject policy
  3. Deploy phishing-resistant MFA - Especially for privileged users
  4. Train continuously - Monthly simulations with feedback
  5. Enable easy reporting - One-click report button
  6. Verify out-of-band - Never trust email alone for sensitive requests
  7. Measure and improve - Track metrics, reduce click rates

Email security requires both technical controls and human awareness working together. The goal is not zero clicks—it’s building a culture where users recognize and report threats while technical controls catch what humans miss.