Protecting your business from email security threats

Email Security

Daniel Richardson, CTO at Exclaimer discusses why email should not be overlooked when it comes to protecting your business.

Email is vital for business communication and reliance on it has skyrocketed amid the global pandemic. However, as we send more valuable information through this channel, the threat of data theft by cyber-criminals grows dramatically.

Because active inboxes are constantly sending and receiving data, criminals have the option of targeting outgoing emails or drawing information out of employees indiscriminately using phishing emails.

In this article, I will be exploring the common pitfalls of email security for employees and how companies can safeguard their businesses from external threats.

The ‘spam’ effect


Employees and businesses often neglect the effects of spam. Despite over 50 percent of emails being spam, the effects they can have are often overlooked.

The reality is that businesses can lose a lot of time and money fixing the problems that are caused by malware/spam attacks, designed to crash your servers or steal data.

If your email address is targeted by spammers, the best thing to do is not respond to any messages as this shows cybercriminals that the address is active. To be even safer and minimise cyber-threats that are looking to compromise your cyber-security, never open suspicious-looking emails.

Another trick to overcome a daily flurry of spam emails is to change your filter settings, allowing questionable emails to be redirected to a separate mailbox which can be quickly emptied. This will prevent you from getting trigger-happy with the delete button and accidentally getting rid of important documents.

Re-evaluating BYOD policies


The demand amongst employees for flexible/remote working options has increased greatly. So much so, that the BYOD market is looking to reach a global value of $367 billion by 2022 – a staggering growth of 18 percent.

The challenge with a BYOD policy is setting up employee’s devices correctly, which can be both costly and complex. According to Druva, an alarming 75 percent of employees access corporate files on personal devices, which are almost never protected. It’s also difficult to monitor email security across employees’ personal devices and control how they’re used outside the office without heavily infringing on their privacy.

Luckily, there are steps you can take to protect data and confidential emails if you or your team are working from home during the pandemic.

It could be worth making it compulsory for employees to have Mobile Device Management (MDM) software installed on their personal devices. This allows companies to have greater control over the range of tech used by employees. With MDM systems in place, workers can access company information in one secure location that is separate from their personal applications.

This not only means employees can use their devices for personal and business use without compromising the security of corporate data. It also maintains employee privacy as individuals can keep their documents and text messages private and confidential.

It’s also important to make sure that basic security software is installed on every employee’s device. Password protected files, firewalls, and anti-virus software should be standard across all personal devices if you’re accessing company files. This is important if an employee loses their device. With 70 million devices lost each year, the data on them must be secure in case they fall into the wrong hands.


Be aware of your email signatures

Email signatures are a valuable tool. They greatly assist with brand marketing, add a touch of professionalism to your organisation, and help establish a corporate identity in the business world.

It’s important to follow the basic rules of designing an effective email signature. This includes putting in only the necessary contact details along with a small, yet distinguishable colour palette. Avoid putting links to private social media accounts, personal phone numbers and addresses on there – this could attract some unwanted attention.

Overall, it’s a factor that shouldn’t be overlooked because it could be very costly. There have been some instances where a company’s email was deemed ‘legally binding’ because of the contents of an automated signature.

To avoid a costly mistake like this happening to your organisation, it helps to centralise email signatures into an easy-to-use hub. This can be done by investing in an email signature management solution.

Once set up, these systems ease the burden of ensuring that the details of the relevant senders are all up-to-date and any necessary disclaimers are put in place. For example, statements to let people know the views expressed in the email are not a reflection of the company, but the sender. It should also include relevant copyright and confidentiality statements.

Companywide training


When it comes to defending against phishing/spam email, the onus usually falls on the individual to manage their inbox. Because over 30 percent of phishing emails make it past default security services, it takes an extra level of vigilance to make sure any nasty malware doesn’t sneak into your system.

To do this, you need to provide regular training to help employees spot the signs of fraudulent emails and phishing attacks. The most effective way to do this is by organising some form of external training; whether that be a seminar-workshop or a company coming in to provide hands-on training.

These make learning and personal development less tedious while simultaneously increasing employee buy-in to these schemes. To maintain high-security standards, training should be short but regular, to help buy-in and refresh on missing skills.

Training should focus on the most relevant issues to your business and the ones easiest to implement. Those that send and receive lots of data daily should prioritise their training around identifying phishing emails and spotting fraudulent content.


Daniel Richardson

CTO at Exclaimer. I have extensive experience in building enabling technologies for both small and enterprise-level businesses, meeting strategic objectives and driving growth. I firmly believe in delivering business value via the use of innovative, forward-looking technologies.

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...

Nova: The Ultimate AI-Powered Martech Solution for Boosting Sales, Marketing...

Erin Lanahan • 19th November 2024

Discover how Nova, the AI-powered engine behind Launched, revolutionises Martech by automating sales and marketing tasks, enhancing personalisation, and delivering unmatched ROI. With advanced intent data integration, revenue attribution, and real-time insights, Nova empowers businesses to scale, streamline operations, and outperform competitors like 6Sense and 11x.ai. Experience the future of Martech with Nova’s transformative AI...