You’ve Got Mail

Communication is digital. Almost all interactions businesses have with customers, colleagues and partners comes via digital channels. Email might sound old hat, but only because it is now so finely engrained into every aspect of our communications ecosystem that it barely warrants mentioning.

We don’t talk about emails because emails are the conversation. As of 2024, more than 33% of marketers still employ emails, with 87% planning to maintain or increase their investment in the channel in 2025.

Email is also the preferred communication channel for billions of employees, and HubSpot predicts that email usage among colleagues will continue to grow by at least 2.4% annually for the next few years. That’s not to mention the 4.2 billion people worldwide who use email every day – more than half the world’s population – to share ideas, engage with brands, sign contracts, and organise their lives.   

Email as a channel is so prolific, and so vital to our lives and businesses, that the consequences of using it flippantly or without due consideration can be severe.

Incidents like the widely reported breaches of the Police Service of Northern Ireland (PSNI) and the UK Electoral Commission on the same day last year, along with the rise in email-related security incidents, highlight the urgent need for robust email security measures and responsible use of the channel. In some cases, companies have even had to terminate employees over unintended email security breaches, either due to lack of training, poor implementation of email software, or because the channel itself was exposed and vulnerable to cyberattacks.   

The Risks Of Poor Email Communication 

Email, like any other technology, is a tool. How we choose to use that tool has consequences. The PSNI breach referenced above involved the accidental exposure of sensitive personal data of all serving police officers and civilian staff, including names and roles, due to an email error. The breach occurred when an email containing sensitive information was mistakenly sent to the public. The error involved attaching a spreadsheet with the personal details of over 10,000 officers and staff, which was inadvertently included in a response to a routine Freedom of Information request. This mistake could potentially result in a £750,000 fine for the organisation.  

In recent years, a significant number of employees have faced termination due to email security breaches, highlighting the growing concerns over cyber threats in the workplace. The primary causes of these breaches include phishing attacks and human error, which continue to be major vulnerabilities for organisations. 

Best Practices For Ensuring Email Security 

While many email incidents, including those referenced, are largely down to human error, technology still has a vital role to play in setting up guardrails and frameworks to help us use the channel more effectively and responsibly.

One of the most helpful strategies is to implement encryption as a standard for all email communications containing sensitive data, ensuring that information is protected from unauthorised access.

Utilising secure email platforms that offer advanced encryption can significantly reduce the likelihood of data breaches. Additionally, organisations should enforce multifactor authentication (MFA) to add an extra layer of security, making it more difficult for cybercriminals to gain access to emails. 

Employee education is equally crucial in maintaining robust email security. Organisations have seen great success in introducing in-the-moment support; with alerts to the presence of sensitive data in emails and their attachments, or notifications to potential mistakes, such as incorrect recipients. Whereas training in its traditional form (i.e. compulsory training delivered annually) often sees employees forget best practice within a few weeks, integrating training into workflows can help build a security-first culture.

In addition, implementing strict policies for handling sensitive information and conducting periodic security audits can also help identify and address vulnerabilities. By fostering a culture of security awareness and ensuring that all employees are well-versed in best practices, organisations can significantly reduce the risk of email-related security incidents.  

The Role Of Digital Signatures 

Digital signatures offer a secure and reliable method for authenticating the identity of signers and ensuring the integrity of documents. Unlike traditional handwritten signatures, digital signatures utilise cryptographic techniques to bind a signer's identity to a document, making it virtually impossible to alter the signed content without detection. This provides a robust layer of security, ensuring that documents are both authentic and unaltered. The benefits of digital signatures extend beyond security; they also streamline workflows, reduce paper usage, and expedite document processing, which is particularly beneficial in a fast-paced business environment. 

The EU’s General Data Protection Regulation (GDPR) mandates that businesses protect personal data and ensure the privacy and security of EU citizens' information. Digital signatures meet these requirements by providing verifiable proof of consent and ensuring that signed documents remain tamper-proof. They also facilitate audit trails, making it easier for organisations to demonstrate compliance with regulatory standards. By integrating digital signatures into their processes, companies can not only enhance security but also ensure adherence to legal obligations. 

Securing email communication is essential to protecting sensitive information and maintaining organisational integrity. While no single solution can address all vulnerabilities, a combination of robust encryption, employee training, and advanced technologies like digital signatures can significantly mitigate risks for every user.

As cyber threats continue to evolve, and email becomes further enmeshed in our professional and personal lives, embracing these comprehensive security practices will become increasingly critical to safeguarding our data.  

Image: 84Video

Anita Mavridis is VP of Product at Zivver

You Might Also Read: 

New Guidance For Business Email Compromise:

DIRECTORY OF SUPPLIERS - Email Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Identities Are The Highest Priority Risk Area
London Hospitals Held To Ransom »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Panasonic Automotive Systems

Panasonic Automotive Systems

Panasonic Automotive Systems brings together security technologies and human resources cultivated across an extensive range of businesses into the automotive field.