Explore Cisco
How to Buy

Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

What Is Email Security?

Email security uses technology to inspect incoming emails for malicious threats and encrypt--or secure--outbound email traffic to protect mailboxes, data, users, and organizations from cybersecurity attacks and schemes. Cloud email security is increasingly important as more and more companies migrate to a cloud or hybrid email platform. Cisco Email Security's layered defenses can provide comprehensive protection that incorporates email security best practices .

How can email messages be compromised?

While many cybersecurity professionals are aware of common email security threats like phishing, ransomware, business email compromise, and other inbound threats, it's important to also consider data protection and securing outbound traffic. That is, putting measures in place to prevent users from sending sensitive data via email to external parties. There are four main components of an email message that can be compromised or manipulated:

  • The body of the email
  • The attachments of the email
  • URLs contained within the email
  • The sender's email address

What are email security best practices?

Email security best practices include the use of a robust email security posture that contains layers of security measures, including effective security intelligence across your entire architecture, retrospective remediation, and encryption to prevent data leakage among other features.

How can I help ensure Office 365 cloud email is secure?

Microsoft Office 365 has become the standard productivity platform in organizations large and small around the world. It is a cost-effective solution and provides a basic level of cloud email protection through Microsoft Exchange Online Protection. But with increased global usage, Office 365 has also become an attractive attack surface for cybercriminals, leading many customers to seek additional cloud email protection.

If your business has adopted Office 365 for your email solution, make sure you are fully protected with multiple layers of defense. Cisco Email Security provides industry-leading protection against malware, ransomware, business email compromise (BEC), URL-based phishing attacks, and spam. It also has full protection for outbound messaging.

Types of email security best practices

In our Cybersecurity Report: Click with Caution, we provide the following recommendations:

Run regular phishing exercises

Your employees are your greatest defense against phishing, especially the most tailored phishing attempts. Employees who can learn to recognize a phishing attempt outright can stop the number one source of endpoint compromise.

Use multifactor authentication

In the event that a corporate email account's credentials are successfully stolen, multifactor authentication can prevent an attacker from gaining access to the account and wreaking havoc.

Consider DMARC

DMARC domain protections can now be activated to protect a company's brand by preventing attackers from using a legitimate corporate domain in phishing campaigns.

Ensure you can quarantine and remediate

Message quarantine functionality is useful to hold a message while a file attachment is analyzed prior to either releasing the message to the recipient, removing the malicious attachment, or removing the message completely. Email remediation helps if a file is detected as malicious after delivery to the recipient. It allows you to go back and quarantine the message with a malicious attachment from within a mailbox.

Harness threat intelligence

External email threat feeds in Structured Threat Information Expression (STIX) are now commonly used by email security products, which is helpful should an organization want to use a vertical-focused threat feed beyond the native threat intelligence in the product.

Consider an integrated cybersecurity solution

Integration of email security with broader security portfolios is also becoming common to determine if advanced malware or messages in an environment may have been delivered to particular users or inboxes.