You’ve Got Mail

Communication is digital. Almost all interactions businesses have with customers, colleagues and partners comes via digital channels. Email might sound old hat, but only because it is now so finely engrained into every aspect of our communications ecosystem that it barely warrants mentioning.

We don’t talk about emails because emails are the conversation. As of 2024, more than 33% of marketers still employ emails, with 87% planning to maintain or increase their investment in the channel in 2025.

Email is also the preferred communication channel for billions of employees, and HubSpot predicts that email usage among colleagues will continue to grow by at least 2.4% annually for the next few years. That’s not to mention the 4.2 billion people worldwide who use email every day – more than half the world’s population – to share ideas, engage with brands, sign contracts, and organise their lives.   

Email as a channel is so prolific, and so vital to our lives and businesses, that the consequences of using it flippantly or without due consideration can be severe.

Incidents like the widely reported breaches of the Police Service of Northern Ireland (PSNI) and the UK Electoral Commission on the same day last year, along with the rise in email-related security incidents, highlight the urgent need for robust email security measures and responsible use of the channel. In some cases, companies have even had to terminate employees over unintended email security breaches, either due to lack of training, poor implementation of email software, or because the channel itself was exposed and vulnerable to cyberattacks.   

The Risks Of Poor Email Communication 

Email, like any other technology, is a tool. How we choose to use that tool has consequences. The PSNI breach referenced above involved the accidental exposure of sensitive personal data of all serving police officers and civilian staff, including names and roles, due to an email error. The breach occurred when an email containing sensitive information was mistakenly sent to the public. The error involved attaching a spreadsheet with the personal details of over 10,000 officers and staff, which was inadvertently included in a response to a routine Freedom of Information request. This mistake could potentially result in a £750,000 fine for the organisation.  

In recent years, a significant number of employees have faced termination due to email security breaches, highlighting the growing concerns over cyber threats in the workplace. The primary causes of these breaches include phishing attacks and human error, which continue to be major vulnerabilities for organisations. 

Best Practices For Ensuring Email Security 

While many email incidents, including those referenced, are largely down to human error, technology still has a vital role to play in setting up guardrails and frameworks to help us use the channel more effectively and responsibly.

One of the most helpful strategies is to implement encryption as a standard for all email communications containing sensitive data, ensuring that information is protected from unauthorised access.

Utilising secure email platforms that offer advanced encryption can significantly reduce the likelihood of data breaches. Additionally, organisations should enforce multifactor authentication (MFA) to add an extra layer of security, making it more difficult for cybercriminals to gain access to emails. 

Employee education is equally crucial in maintaining robust email security. Organisations have seen great success in introducing in-the-moment support; with alerts to the presence of sensitive data in emails and their attachments, or notifications to potential mistakes, such as incorrect recipients. Whereas training in its traditional form (i.e. compulsory training delivered annually) often sees employees forget best practice within a few weeks, integrating training into workflows can help build a security-first culture.

In addition, implementing strict policies for handling sensitive information and conducting periodic security audits can also help identify and address vulnerabilities. By fostering a culture of security awareness and ensuring that all employees are well-versed in best practices, organisations can significantly reduce the risk of email-related security incidents.  

The Role Of Digital Signatures 

Digital signatures offer a secure and reliable method for authenticating the identity of signers and ensuring the integrity of documents. Unlike traditional handwritten signatures, digital signatures utilise cryptographic techniques to bind a signer's identity to a document, making it virtually impossible to alter the signed content without detection. This provides a robust layer of security, ensuring that documents are both authentic and unaltered. The benefits of digital signatures extend beyond security; they also streamline workflows, reduce paper usage, and expedite document processing, which is particularly beneficial in a fast-paced business environment. 

The EU’s General Data Protection Regulation (GDPR) mandates that businesses protect personal data and ensure the privacy and security of EU citizens' information. Digital signatures meet these requirements by providing verifiable proof of consent and ensuring that signed documents remain tamper-proof. They also facilitate audit trails, making it easier for organisations to demonstrate compliance with regulatory standards. By integrating digital signatures into their processes, companies can not only enhance security but also ensure adherence to legal obligations. 

Securing email communication is essential to protecting sensitive information and maintaining organisational integrity. While no single solution can address all vulnerabilities, a combination of robust encryption, employee training, and advanced technologies like digital signatures can significantly mitigate risks for every user.

As cyber threats continue to evolve, and email becomes further enmeshed in our professional and personal lives, embracing these comprehensive security practices will become increasingly critical to safeguarding our data.  

Image: 84Video

Anita Mavridis is VP of Product at Zivver

You Might Also Read: 

New Guidance For Business Email Compromise:

DIRECTORY OF SUPPLIERS - Email Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Identities Are The Highest Priority Risk Area
London Hospitals Held To Ransom »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.