Back to Blog

The Guide to Email Security for Small Businesses

The Guide to Email Security for Small Businesses

Email remains the primary communication tool for UK businesses of every size — and, consequently, the primary attack vector for cyber criminals. According to the UK Government's Cyber Security Breaches Survey, the vast majority of identified attacks against UK businesses arrive via email, whether as phishing messages, malware-laden attachments, business email compromise attempts, or fraudulent invoice requests.

For small businesses, the threat is particularly acute. Smaller organisations typically have fewer security controls, less staff awareness, and smaller budgets for cyber security — making them attractive targets for attackers who know that a single successful phishing email can yield valuable data, financial transfers, or a foothold for ransomware deployment.

This guide provides a comprehensive overview of email security for UK small businesses, covering the threats you face, the defences available, and a practical roadmap for implementing robust email protection without requiring a specialist security team or an enormous budget.

83%
of UK cyber attacks start with a phishing email
£25,700
Average cost of a successful email attack on a UK SME
3.4bn
Phishing emails sent globally every day
39%
of UK businesses reported a cyber attack in the past 12 months

The Threat Landscape: Understanding Email-Based Attacks

To defend against email threats effectively, you first need to understand the types of attacks you face. Modern email attacks are sophisticated, varied, and increasingly difficult for untrained users to identify.

Phishing

Phishing emails impersonate a trusted entity — a bank, a supplier, a government agency, or a colleague — to trick the recipient into revealing sensitive information, clicking a malicious link, or opening a dangerous attachment. Phishing can be broad and untargeted (sent to thousands of recipients simultaneously) or highly targeted (spear phishing), where the attacker researches their victim and crafts a convincing, personalised message.

Business Email Compromise (BEC)

BEC attacks are among the most financially damaging email threats. The attacker either compromises a legitimate email account or spoofs one to send convincing requests — typically asking for a financial transfer, a change to payment details, or the disclosure of sensitive data. CEO fraud, where an attacker impersonates a senior executive and instructs the finance team to make an urgent payment, is a classic example. UK businesses lost over £50 million to BEC attacks in 2025 alone.

Malware and Ransomware

Malicious attachments — often disguised as invoices, delivery notifications, or shared documents — can install malware on the recipient's device. Ransomware, which encrypts your files and demands payment for the decryption key, is frequently delivered via email. A single employee opening a malicious attachment can compromise your entire network within minutes.

Phishing (credential theft)
85%
Business Email Compromise
62%
Malware attachments
48%
Ransomware delivery
35%
Invoice fraud
30%

Essential Email Security Controls

Protecting your business email requires a layered approach. No single control is sufficient on its own, but together they create a defence-in-depth that significantly reduces your risk.

1. Email Authentication (SPF, DKIM, DMARC)

These three protocols prevent attackers from sending emails that appear to come from your domain. SPF specifies which mail servers are authorised to send email from your domain. DKIM adds a cryptographic signature to verify the email has not been tampered with. DMARC ties SPF and DKIM together and tells receiving servers what to do with emails that fail authentication. Every UK business should have all three configured, with DMARC at a p=reject policy for maximum protection.

2. Multi-Factor Authentication (MFA)

MFA is the single most effective control against email account compromise. Even if an attacker obtains a user's password through phishing, they cannot access the account without the second authentication factor. MFA should be mandatory for every email account in your organisation, without exception. The Microsoft Authenticator app or a FIDO2 security key are the recommended methods — SMS-based MFA, while better than nothing, is vulnerable to SIM-swapping attacks.

3. Advanced Threat Protection

If you use Microsoft 365, enable Microsoft Defender for Office 365 (formerly Advanced Threat Protection). This provides Safe Attachments (which detonates attachments in a sandbox to detect malware before delivery), Safe Links (which scans URLs in real-time when clicked, protecting against links that are clean at delivery but weaponised later), and anti-phishing policies that use machine learning to detect impersonation attempts. For Google Workspace users, the Advanced Protection Programme provides similar capabilities.

The NCSC's Email Security Guidance

The National Cyber Security Centre (NCSC) provides comprehensive email security guidance for UK organisations. Key recommendations include: implementing SPF, DKIM, and DMARC with a reject policy; using TLS encryption for email in transit; enabling MFA on all email accounts; training staff to recognise phishing; implementing anti-malware scanning for attachments; and using email filtering to block known malicious senders. The NCSC also provides the free Mail Check service for public sector organisations and recommends that private sector businesses use commercial equivalents to monitor their email authentication configuration.

4. Email Filtering and Anti-Spam

A robust email filtering solution should sit between the internet and your mailboxes, scanning every incoming email for spam, phishing, malware, and other threats before it reaches your users. Most business email platforms include built-in filtering, but dedicated third-party solutions like Mimecast, Proofpoint, or Barracuda provide more advanced detection capabilities, particularly for sophisticated phishing and zero-day threats.

5. Data Loss Prevention (DLP)

DLP policies prevent sensitive data from being sent via email — either accidentally or deliberately. You can configure rules that detect and block emails containing credit card numbers, National Insurance numbers, financial data, or other sensitive information. Both Microsoft 365 and Google Workspace include DLP capabilities that can be configured to warn users, require approval, or block outbound emails that match specified data patterns.

Security ControlProtects AgainstCost (Microsoft 365)Implementation Difficulty
SPF, DKIM, DMARCDomain spoofing, impersonationFree (DNS configuration)Medium
Multi-Factor AuthenticationAccount compromise, credential theftIncluded in all plansEasy
Defender for Office 365Phishing, malware, malicious URLs£1.50–4.20/user/monthMedium
Data Loss PreventionAccidental data exposureBusiness Premium+ plansMedium
Email encryptionInterception of sensitive emailsBusiness Premium+ plansEasy
Conditional AccessUnauthorised device/location accessBusiness Premium+ plansMedium–Hard
Security Awareness TrainingUser error, social engineering£2–5/user/monthEasy

Security Awareness Training

Technology alone cannot protect your business from email threats. Your employees are both your greatest vulnerability and your most valuable defence. A well-trained workforce that can recognise and report phishing attempts is more effective than any single technical control.

Security awareness training should be ongoing, not a one-off annual exercise. The most effective programmes combine regular short training modules (five to ten minutes per month), simulated phishing campaigns that test employees with realistic fake phishing emails, immediate feedback when someone clicks a simulated phishing link, and regular reporting on organisational performance so leadership can see where additional training is needed.

Staff who can identify phishing (untrained) 40%
Staff who can identify phishing (after 3 months training) 72%
Staff who can identify phishing (after 12 months training) 91%

Incident Response: What to Do When an Attack Succeeds

Despite your best efforts, there is always a possibility that an email attack will succeed. Having a pre-defined incident response plan ensures that you can act quickly to minimise the damage.

If a user clicks a phishing link and enters their credentials, immediately reset the compromised account's password, revoke all active sessions, check for email forwarding rules that the attacker may have created (this is a common persistence technique), review the account's recent sent items and deleted items for signs of misuse, and enable or strengthen MFA if it was not already in place.

If a user opens a malicious attachment, isolate the affected device from the network immediately, do not shut down the device (this may destroy forensic evidence), contact your IT support provider or incident response team, and scan all connected systems for indicators of compromise.

Signs of a Secure Email Environment

  • SPF, DKIM, and DMARC at p=reject across all domains
  • MFA enforced on 100% of email accounts
  • Advanced threat protection scanning all inbound email
  • Regular security awareness training and phishing simulations
  • DLP policies preventing sensitive data leakage
  • Incident response plan documented and tested
  • Email logs monitored for suspicious activity

Signs of a Vulnerable Email Environment

  • No SPF, DKIM, or DMARC records configured
  • MFA not enabled or optional for users
  • Relying solely on built-in spam filtering
  • No security awareness training programme
  • No policies around handling suspicious emails
  • No incident response plan for email compromise
  • Shared passwords or generic email accounts in use

Compliance and Regulatory Requirements

UK businesses have specific regulatory obligations around email security. Under UK GDPR, you must implement appropriate technical and organisational measures to protect personal data — and since email is a primary channel for personal data, this directly requires robust email security. The ICO has taken enforcement action against organisations that suffered data breaches due to inadequate email security, including failures to implement MFA and insufficient phishing protections.

For businesses pursuing Cyber Essentials certification — which is mandatory for government contracts involving sensitive data and increasingly expected by private sector clients — email security controls including anti-malware, access controls, and patch management are assessed as part of the scheme. Cyber Essentials Plus, the higher-level certification, includes a technical audit that specifically tests email security by sending simulated malicious emails to the organisation's users.

UK GDPR Article 32: Security of Processing

Article 32 of UK GDPR requires that organisations implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk. For email, this means: encryption of personal data in transit (TLS), access controls including MFA, regular testing and evaluation of security measures, the ability to restore availability and access to personal data promptly in the event of an incident, and a process for regularly reviewing the effectiveness of these measures. Failure to comply can result in fines of up to £17.5 million or 4% of global turnover — a potentially catastrophic sum for any small business.

Building Your Email Security Roadmap

Implementing comprehensive email security does not need to happen overnight. A phased approach allows you to make immediate improvements to your most critical vulnerabilities while building towards a fully secure email environment over time.

Month One (Quick Wins): Enable MFA on all email accounts. Configure SPF if not already in place. Review and remove any unnecessary email forwarding rules. Ensure anti-malware scanning is enabled on your email platform.

Month Two (Authentication): Configure DKIM for all email-sending services. Publish a DMARC record with p=none and begin monitoring reports. Review your email platform's security settings and enable all available protections.

Month Three (Advanced Protection): Enable advanced threat protection (Defender for Office 365 or equivalent). Begin security awareness training for all staff. Move DMARC to p=quarantine.

Month Four and Beyond (Continuous Improvement): Move DMARC to p=reject. Implement DLP policies for sensitive data. Conduct regular simulated phishing campaigns. Review and update policies quarterly. Consider pursuing Cyber Essentials certification to validate your security posture externally.

Protect Your Business Email

Cloudswitched provides comprehensive email security for UK small businesses, from initial configuration of SPF, DKIM, and DMARC through to advanced threat protection, security awareness training, and ongoing monitoring. Do not wait for an attack to expose your vulnerabilities.

GET IN TOUCH
Tags:SecurityEmail Security
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.