Back to Blog

6 Steps to Securing Your Emails with Office 365

6 Steps to Securing Your Emails with Office 365

Email is the primary communication tool for businesses, making it the single biggest target for hackers and fraudsters. With phishing attacks increasing by 61% year-on-year and AI making scam emails virtually indistinguishable from genuine messages, securing your email infrastructure has never been more critical.

The good news? Office 365 provides the same security framework used by Microsoft themselves — protecting over 345 million paid users worldwide. But these tools are only effective if they are properly configured. Here are six essential steps to lock down your business email, explained in detail with practical implementation guidance.

91%
of cyber attacks begin with a phishing email
£3.4M
average cost of a data breach for UK businesses
61%
increase in phishing attacks year-on-year

The Email Threat Landscape in 2025

Before diving into the solutions, it is important to understand what you are defending against. Email threats have evolved dramatically:

Threat TypeDescriptionPrevalenceDamage Potential
PhishingFake emails impersonating trusted brands or colleaguesVery HighHigh
Spear PhishingTargeted attacks using personal informationHighVery High
Business Email CompromiseCEO/CFO impersonation requesting paymentsGrowingExtreme (£100K+ losses)
Ransomware via EmailMalicious attachments encrypting your filesHighCatastrophic
Credential HarvestingFake login pages capturing passwordsVery HighHigh
Invoice FraudModified payment details on legitimate-looking invoicesGrowingVery High
AI-Generated PhishingPerfectly written, context-aware scam emailsRapidly GrowingVery High
AI Threat Alert

In 2025, AI-generated phishing emails have eliminated the spelling mistakes and poor grammar that were once reliable warning signs. Modern phishing emails are grammatically perfect, contextually relevant, and increasingly use information scraped from LinkedIn and company websites to appear legitimate.

The 6-Step Email Security Framework

StepActionProtection LevelDifficultyTime to Implement
1Complex PasswordsBasicEasyImmediate
2Unique PasswordsBasicEasy1 hour
3Regular Password ChangesModerateEasy5 minutes (policy)
4Multi-Factor AuthenticationHighEasy30 minutes
5SPF Record SetupHighTechnical15 minutes
6DKIM & DMARC RecordsVery HighTechnical30-60 minutes

Step 1: Use Complex Passwords

Weak passwords are the first vulnerability in any email system. Despite decades of warnings, password-related breaches remain the most common entry point for attackers.

Password Strength Comparison

"password123"Cracked instantly
Instant
"J0hn$m1th!"Cracked in hours
Hours
"Tr0ub4dor&3"Cracked in days
Days
"correct-horse-battery-staple"550 years to crack
550 years

Password Policy Best Practices

  • Minimum 14 characters — length is more important than complexity
  • Use passphrases — four or more random words are stronger and easier to remember than short complex passwords
  • Avoid personal information — no names, dates of birth, pet names, or football teams
  • Check against breach databases — use haveibeenpwned.com to verify passwords have not been compromised
  • Use a password manager — LastPass, 1Password, or Bitwarden generate and store complex passwords

Step 2: Never Share or Reuse Passwords

Never use the same password across multiple platforms. If one platform is compromised, every account using that password is at risk. This is known as credential stuffing, and it is one of the most common attack vectors.

65%
of people reuse the same password across multiple accounts
15B+
stolen credentials available on the dark web
£2.40
average price of a stolen email login on the dark web
Company-Wide Solution

Deploy a business password manager (like 1Password Business or Bitwarden) across your organisation. It generates unique passwords for every service, securely shares credentials between team members, and provides admin visibility into password health across the company. Typical cost: £3-5 per user per month.

Step 3: Password Change Policy

Microsoft's latest guidance has evolved. Rather than forcing regular password changes (which leads to predictable patterns like "Summer2025!"), the focus is now on:

ApproachOld GuidanceCurrent Best Practice
Change FrequencyEvery 90 daysOnly when compromised (with MFA enabled)
Complexity8 chars, upper/lower/number/symbol14+ chars, passphrase preferred
Reuse PreventionRemember last 5 passwordsRemember last 24 passwords
Lockout Policy3 failed attempts10 failed attempts + Smart Lockout

Step 4: Enable Multi-Factor Authentication (MFA)

MFA requires a second verification step beyond your password — typically a code from the Microsoft Authenticator app or a push notification. This single step blocks 99.9% of automated attacks, making it the single most impactful security measure you can implement.

Account security without MFALow
25%
Account security with SMS MFAHigh
85%
Account security with Authenticator AppVery High
99.9%

MFA Methods Ranked

MethodSecurity LevelConvenienceRecommendation
Microsoft Authenticator AppVery HighHighRecommended
Hardware Security Key (FIDO2)HighestMediumBest for admins
SMS CodeMediumHighAcceptable fallback
Phone CallMediumLowNot recommended
Critical Step

If you implement only one security measure from this article, make it MFA. Microsoft reports that MFA prevents 99.9% of account compromise attacks. There is no single step with a bigger impact. And it is free with every Office 365 plan.

Step 5: Set Up a Sender Policy Framework (SPF)

An SPF record is a DNS entry that tells receiving email servers which mail servers are authorised to send emails on behalf of your domain. This prevents spammers from spoofing your email address to send fraudulent messages that appear to come from your business.

How SPF Works

  • Without SPF: Anyone can send an email that appears to come from @yourdomain.co.uk
  • With SPF: Only your authorised email servers (Microsoft 365) can send from your domain
  • Result: Spoofed emails are flagged as spam or rejected entirely

SPF Implementation

For Office 365, your SPF record should include:

SPF Record

v=spf1 include:spf.protection.outlook.com -all
This record tells email servers: "Only Microsoft 365 servers are authorised to send email from our domain. Reject everything else." Add this as a TXT record in your domain's DNS settings.

Step 6: Configure DKIM & DMARC

DKIM (DomainKeys Identified Mail) adds a digital signature to your outgoing emails, verifying that the content was not altered in transit. DMARC (Domain-based Message Authentication, Reporting & Conformance) ties SPF and DKIM together and provides compliance reporting.

The Email Authentication Stack

SPF OnlyGood (75%)
SPF + DKIMVery Good (88%)
SPF + DKIM + DMARCMaximum Protection (97%)

DMARC Policy Levels

PolicySettingWhat Happens to Failing EmailsRecommended Phase
Monitorp=noneDelivered normally, reports sent to youStart here (2-4 weeks)
Quarantinep=quarantineSent to spam/junk folderAfter reviewing reports
Rejectp=rejectBlocked entirely, never deliveredFinal goal (maximum protection)
Implementation Warning

Always start with DMARC p=none (monitor mode) and review the reports for 2-4 weeks before tightening the policy. Jumping straight to p=reject can block legitimate emails from marketing platforms, CRM systems, or other services that send email on your behalf.

Beyond the 6 Steps: Advanced Email Security

For businesses handling sensitive data or operating in regulated industries, consider these additional measures:

Advanced Threat Protection (ATP)

Included in Business Premium, ATP provides:

  • Safe Links: Scans URLs in emails at time of click (not just at delivery)
  • Safe Attachments: Opens attachments in a sandbox to detect malware
  • Anti-Phishing AI: Machine learning detects impersonation attempts
  • Real-Time Reports: See exactly what threats are being blocked

Email Encryption

Office 365 Message Encryption allows you to send encrypted emails to anyone — even recipients who do not use Office 365. This is essential for sending sensitive information like contracts, financial data, or personal details.

Conditional Access Policies

Control where and how email can be accessed. For example:

  • Block access from countries where your business does not operate
  • Require MFA when accessing from new or unrecognised devices
  • Block access from personal (unmanaged) devices
  • Require compliant devices with up-to-date antivirus

Email Security Audit Checklist

Use this checklist to assess your current email security posture:

MFA enabled for all usersCritical
SPF record configuredCritical
DKIM enabledHigh
DMARC policy activeHigh
Password policy enforcedHigh
ATP Safe Links & AttachmentsRecommended
Staff security awareness trainingRecommended

Frequently Asked Questions

How do I know if my email has been compromised?

Warning signs include: emails in your Sent folder you did not write, password reset requests you did not initiate, colleagues or clients receiving strange emails from your address, and unexpected MFA prompts. If you suspect a compromise, change your password immediately, enable MFA, and contact your IT provider.

Is Office 365 email secure by default?

Office 365 includes basic spam filtering and malware scanning by default, but MFA, SPF, DKIM, DMARC, and Advanced Threat Protection all require manual configuration. Out of the box, your account is better protected than a basic email service, but far from fully secured.

Should we use email encryption for all messages?

Encryption for every email is unnecessary and adds friction. Use it for messages containing sensitive data: financial information, personal data (GDPR), contracts, or anything you would not want read if intercepted. Office 365 can be configured to automatically encrypt emails containing specific keywords or data patterns.

How often should we run phishing simulations?

Monthly simulations are ideal. Microsoft Defender includes a built-in attack simulation tool that sends realistic (but harmless) phishing emails to your staff and tracks who clicks. This identifies employees who need additional training and keeps security awareness top of mind.

Secure Your Email Today

"After Cloudswitched configured our email security, we went from receiving dozens of phishing emails per week to virtually none reaching our inboxes. The MFA rollout was painless and our team adapted within a day." — Accounting firm, Mayfair

There is no way to totally eliminate email risk, but these six steps will dramatically reduce your exposure. Cloudswitched is a Microsoft Gold Partner specialising in email security and Office 365 deployment. Whether you need a full security audit, MFA rollout, or SPF/DKIM/DMARC configuration, our team handles the technical complexity so you do not have to.

If you think your account has been compromised, or you want a professional email security audit, contact us immediately.

Tags:Cloud Email
CloudSwitched
CloudSwitched

London-based managed IT services provider offering support, cloud solutions and cybersecurity for SMEs.

From Our Blog

18
  • VoIP & Phone Systems

Understanding VoIP Bandwidth Requirements for Your Business

18 Mar, 2026

Read more
3
  • IT Office Moves

How to Plan IT for an Office Fit-Out

3 Mar, 2026

Read more
13
  • SEO

How to Write Meta Titles and Descriptions That Get Clicks

13 Apr, 2026

Read more

Enquiry Received!

Thank you for getting in touch. A member of our team will review your enquiry and get back to you within 24 hours.