6 Simple Steps to Enhance Your Email Security

Tanya Wetson-Catt • 18 November 2024

Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more critical.


Ninety-five percent of IT leaders say cyberattacks have become most sophisticated. Over half (51%) have already seen AI-powered attacks in their organisation.


By taking proactive measures, you can protect your sensitive information as well as prevent unauthorised access and maintain communication integrity. Here are six simple steps to enhance your email security.


1. Use Strong, Unique Passwords


Passwords are the first line of defence for your email accounts. A weak password is like an open invitation for cybercriminals. To enhance your email security, use strong, unique passwords. Ones that are difficult to guess.


Create Complex Passwords


A strong password should include a mix of:


  • Letters (both uppercase and lowercase)
  • Numbers
  • Special characters


Avoid using common words or phrases. Also, avoid easily guessable information like your name or birthdate. A complex password makes it harder for attackers to gain access to your email account.


Use a Password Manager


Remembering several complex passwords can be challenging. A password manager can help you generate and store unique passwords for all accounts. With a password manager, you only need to remember one master password. This simplifies the process while enhancing security.


Avoid Reusing Password


Using the same password across many accounts increases your risk. If one account gets compromised, all accounts using the same password are vulnerable. Make sure each of your email accounts has a unique password. This prevents a single breach from spreading.


2. Enable Two-Factor Authentication (2FA)


Two-factor authentication (2FA) adds an extra layer of security to your email accounts. Even if someone gets hold of your password, they won’t be able to access your account. They would need the second factor of authentication to do that.


Choose a 2FA Method


Common 2FA methods include SMS codes, authenticator apps, and hardware tokens. SMS codes send a verification code to your phone. Authenticator apps generate time-sensitive codes on your device. Hardware tokens provide physical devices that generate a code. Choose the method that best suits your needs.


Set Up 2FA for All Accounts


Enable 2FA for all your email accounts. Most email providers offer this feature and setting it up usually takes just a few minutes. This simple step significantly improves your email security.


3. Be Cautious with Email Attachments and Links


Email attachments and links are common vectors for malware and phishing attacks. Clicking on a malicious link or attachment can give attackers access to your system. Exercise caution to protect your email security.


Verify the Sender


Before opening an attachment or clicking on a link, verify the sender’s identity. If you receive an unexpected email from someone you know, contact them. But do it through a different channel to confirm they sent it. For emails from unknown senders, exercise extra caution. Consider not engaging with the content.


Scan Attachments


Use antivirus software to scan email attachments before opening them. This helps detect and block any malicious content before it can harm your system. Many email providers also offer built-in scanning features. But having your antivirus software adds an extra layer of protection.


Avoid Clicking on Suspicious Links


Be wary of links that seem out of place or too good to be true. Hover over the link to see the URL before clicking. If the URL looks suspicious or unfamiliar, don’t click on it. Instead, navigate to the site directly through your browser.


4. Keep Your Email Software Updated


Software updates often include security patches that address vulnerabilities in your email client. Keep your email software updated. This ensures you have the latest protections against known threats.


Enable Automatic Update


Most email clients and operating systems offer automatic updates. Enable this feature. It ensures your software stays up to date without requiring manual intervention. Automatic updates reduce the risk of missing critical security patches.


Regularly Check for Updates


Even with automatic updates enabled, it’s good to manually check for updates. This ensures you don’t miss any important security patches. It also helps keep your email client running smoothly and securely.


5. Use Encryption for Sensitive Emails


Encryption adds a layer of protection to your emails. It encodes the content, making it readable only by the intended recipient. This ensures that even intercepted email information remains secure.


Encrypt Emails Containing Sensitive Information


If you need to send sensitive information via email, use encryption. This protects the content. Many email providers offer built-in encryption options. For added security, consider using third-party encryption tools that offer end-to-end encryption.


Educate Recipients


If you’re sending encrypted emails, make sure the recipients know how to decrypt them. Provide clear instructions about how to access the encrypted content securely.


6. Watch Your Email Activity


Regularly monitoring your email activity can help you detect suspicious behaviour early. By keeping an eye on your account, you can take swift action if something seems off.


Set Up Activity Alerts


Many email providers offer activity alerts. They notify you of unusual login attempts or changes to your account settings. Enable these alerts to stay informed about your account’s security status.


Regularly Review Account Activity


Review your email account activity on a regular basis. This includes login history and devices connected to your account. If you notice any unfamiliar activity, change your password immediately and investigate further.


Respond Quickly to Suspicious Activity


If you detect any suspicious activity in your email account, respond quickly. Change your passwords, review your security settings, and consider enabling extra security measures.


Get Expert Email Security Solutions


Email security is essential for protecting your personal and professional information. We have solutions that can effectively reduce the potential for email compromise as well as reduce phishing risk.


Contact us today to schedule a chat about email security.

Let's Talk Tech

More from our blog

by Tanya Wetson-Catt 27 April 2026
Most small businesses aren’t breached because they have no security at all. They’re breached because a single stolen password becomes a master key to everything else. That’s the flaw in the old “castle-and-moat” model. Once someone gets past the perimeter, they can often move through the environment with far fewer restrictions than they should. And today, with cloud apps, remote work, shared links, and BYOD, the “perimeter” isn’t even a clearly defined boundary anymore. Zero-trust architecture for small businesses represents the shift that breaks that chain reaction. It’s an approach that treats every access request as potentially risky and requires verification every time. What Is Zero-Trust Architecture? Zero Trust is a model that moves defenses away from “static, network-based perimeters.” Instead, it focuses on “users, assets, and resources.” It also “ assumes there is no implicit trust granted to assets or user accounts ” based only on network location or ownership. Microsoft sets the idea down into a simple principle: the model teaches us to “never trust, always verify.” In practice, that means verifying each request as though it came from an uncontrolled network, even if it’s coming from the office. IBM reports that the global average cost of a data breach is over $4 million, which is why reducing blast radius isn’t a nice-to-have. So, what does “Zero Trust” actually do differently day to day? Microsoft frames it around three core principles: verify explicitly, use least privilege access, and assume breach. In small-business terms, that usually translates to: Identity-first controls: Strong MFA, blocking risky legacy authentication, and applying stricter policies to admin accounts. Device-aware access: Evaluating who is signing in and whether their device is managed, patched, and meets your security standards. Segmentation to limit impact: Breaking your environment into smaller zones so access to one area doesn’t automatically grant access to everything else. Cloudflare describes microsegmentation as dividing perimeters into “small zones” to prevent lateral movement between systems. Before You Start If you try to “implement Zero Trust” everywhere at once, two things usually happen: 1. Everyone gets frustrated. 2. Nothing meaningful gets completed. Instead, start with a defined protect surface, a small group of critical systems, data, and workflows that matter most and can realistically be secured first. What Counts as a “Protect Surface”? A protect surface typically includes one of the following: A business-critical application A high-value dataset A core operational service A high-risk workflow The 5 Surfaces Most Small Businesses Start With If you’re unsure where to begin, this shortlist applies to most environments: 1. Identity and email 2. Finance and payment systems 3. Client data storage 4. Remote access pathways 5. Admin accounts and management tools BizTech makes the point that there’s no “Zero Trust in a box.” It’s achieved through the right mix of people, process, and technology. The Roadmap This is where zero-trust architecture for small businesses stops being a concept and becomes a plan. Each phase builds on the one before it, so you get meaningful risk reduction without creating a security obstacle course. 1. Start with Identity Network location should not be treated as a trusted signal . Access should be based on who or what is requesting it, and whether they should have access at that moment. That’s why identity is step one. Do this first: Enforce multifactor authentication (MFA) everywhere Remove weak sign-in paths Separate admin accounts from day-to-day user accounts 2. Bring Devices into the Trust Decision Zero Trust isn’t just asking, “Is the password correct?” It’s asking, “Is this device safe to trust right now?” Microsoft’s SMB guidance explicitly calls out securing both managed devices and BYOD, because small businesses often have a mix. Keep it simple: Set a clear baseline: patched operating systems, disk encryption, and endpoint protection Require compliant devices for access to sensitive applications and data Establish a clear BYOD policy: limited access, not unrestricted access 3. Fix Access Microsoft’s principle here is “use least privilege access.” This means users should have only what they need, when they need it, and nothing more. Practical moves: Eliminate broad “everyone has access” groups and shared login accounts Shift to role-based access, where job roles determine defined access bundles Require additional verification for admin elevation, and make sure it’s logged 4. Lock Down Apps and Data The old perimeter model doesn’t map cleanly to cloud services and remote access, which is why organizations shift towards a model that verifies access at the resource level. Focus on your protect surface first: Tighten sharing defaults Require stronger sign-in checks for high-risk apps Clarify ownership: every critical system and dataset needs an accountable owner 5. Assume Breach Microsegmentation divides your environment into smaller, controlled zones so that a breach in one area doesn’t automatically expose everything else. That’s the whole point of “assume breach”: contain, don’t panic. What to do: Segment critical systems away from general user access Limit admin pathways to management tools Reduce lateral movement routes 6. Add Visibility and Response Zero Trust decisions can be informed by inputs like logs and threat intelligence . Because verification isn’t a one-time event, it’s ongoing Minimum viable visibility: Centralize sign-in, endpoint, and critical app alerts Define what counts as suspicious for your protect surface Create a simple response Your Zero-Trust Roadmap Zero Trust architecture for small businesses doesn’t begin with a shopping list. It begins with a clear, focused plan. If you’re ready to move from “good idea” to real implementation, start with a single protect surface and commit to the next 30 days of measurable improvements. Small steps, consistent execution, and fewer unpleasant surprises.  If you’d like help defining your protect surface and building a practical Zero Trust roadmap, contact us today for a consultation. We’ll help you prioritize the right controls, align them to your environment, and turn Zero Trust into steady progress, not complexity.
by Tanya Wetson-Catt 20 April 2026
If you want to uncover unsanctioned cloud apps, don’t begin with a policy. Start with your browser history. The cloud environment most businesses actually use rarely matches the one shown on the IT diagram. It’s built through countless small shortcuts: a “just this once” file share, a free tool that solves one problem faster, a plug-in installed to meet a deadline, or an AI feature quietly enabled inside an app you already pay for. In the moment, none of it feels like a problem. It feels efficient. Helpful. Until it isn’t. Then you realise business data is scattered across tools you didn’t formally approve, accounts you can’t easily offboard, and sharing settings that don’t reflect the actual risk. Why Unsanctioned Cloud Apps Are a 2026 Problem Unsanctioned cloud apps have always existed. What’s changed this year is the scale, the speed, and the fact that “cloud apps” now include AI features hiding in plain sight. Start with scale. Microsoft’s shadow IT guidance points out that most IT teams assume employees use “30 or 40” cloud apps, but “in reality, the average is over 1,000 separate apps.” It also notes that “80% of employees use non-sanctioned apps” that haven’t been reviewed against company policy. That’s the uncomfortable reality of unsanctioned cloud apps: the gap between what you believe is happening and what’s actually happening is often far wider than expected. Now add the 2026 twist: AI isn’t just a standalone tool employees consciously choose to use. The Cloud Security Alliance notes that AI is increasingly embedded as a feature within everyday business applications, rather than existing only as a standalone tool. In other words, you can have shadow AI risk without anyone signing up for a new AI product. It’s just… there. That creates a different kind of exposure. The same Cloud Security Alliance article cites research showing “54% of employees” admit they would use AI tools even without company authorisation. It also references an IBM finding that “20% of organisations” experienced breaches linked to unauthorised AI use, adding an average of “$670,000” to breach costs. So, this isn’t just a governance problem. It’s a measurable risk problem. And here’s the final reason 2026 feels different: the old “block it and move on” strategy no longer works. The Cloud Security Alliance has pointed out that simply blocking cloud apps isn’t an option anymore because cloud services are woven into everyday work. If you don’t provide a secure alternative, employees will find another workaround. Don’t Start with Blocking The fastest way to drive cloud app usage further underground is to treat it as a discipline problem and respond with bans. Yes, some applications do need to be blocked. But if blocking is your first move, it typically creates two unintended side effects: 1. People get better at hiding what they’re doing. 2. They switch to a different tool that’s just as risky or, sometimes, worse. Either way, you haven’t reduced the problem. You’ve just made it harder to see. A better starting point is to understand what’s happening and why. The recommendation is to evaluate cloud app risk against an “ objective yardstick ”. You should monitor what users are actually doing in those apps so you can focus on the behaviour that creates exposure, not just the name of the tool. Once you have that visibility, you can respond in a way that actually lasts. Some apps will be approved. Others may be restricted. Some will need to be replaced. And the truly high-risk ones? Those are the apps you block thoughtfully, with a clear plan, a communication message, and a secure alternative that allows people to keep doing their jobs. The Practical Workflow to Uncover Unsanctioned Cloud Apps This isn’t a one-time clean-up. It’s a workflow you can run quarterly (or continuously) to stay ahead of new tools and new habits. Discover What’s Actually in Use Start by generating a real inventory from the signals you already collect: endpoint telemetry, identity logs, network and DNS data, and browser activity. Microsoft’s shadow IT tutorial emphasises a dedicated discovery phase, because you can’t manage what you haven’t first identified. Analyse Usage Patterns Don’t stop at identifying which apps are in use. Review things like: Who is accessing cloud apps What admin activity is happening Whether data is being shared publicly or with personal accounts Access that should no longer exist, such as former employees who still have active connections Score and Prioritise Risk Not every unsanctioned app is equally dangerous. Use a simple risk lens: The sensitivity of the data involved How information is being shared The strength of identity controls The level of administrative visibility Whether AI features could be ingesting or exposing data Tag Apps Make decisions visible and repeatable by tagging apps. Microsoft explicitly calls tagging apps as sanctioned or unsanctioned an important step, because it lets you filter, track progress, and drive consistent action over time. Take Action Once an app is tagged, you can enforce the decision. Microsoft’s governance guidance outlines two practical responses: issuing user warnings, a lighter control that encourages better behaviour, or blocking access to applications that present unacceptable risk. Just keep in mind that changes aren’t always immediate. Plan for communication and a smooth transition, rather than triggering unexpected disruptions. Your New Default: Discover, Decide, Enforce Unsanctioned cloud apps aren’t disappearing in 2026. If anything, they’ll continue to multiply, especially as new AI features appear inside the tools your team already relies on. The goal isn’t to block everything. It’s to create a repeatable operating model: discover what’s in use, determine what’s acceptable, and enforce those decisions with clear guidance and secure alternatives. When you apply that consistently, cloud app sprawl stops being a surprise. It becomes another controlled, managed part of your environment.  If you’d like help building a practical cloud app governance process that fits your organisation, contact us today. We’ll help you gain visibility, reduce exposure, and put guardrails in place, without slowing productivity.
by Tanya Wetson-Catt 17 April 2026
It usually starts small. Someone uses an AI tool to refine a difficult email. Someone enables an AI add-on inside a SaaS app because it promises to save an hour a week. Someone pastes a paragraph into a chatbot to “make it sound better.” Then it becomes routine. And once it’s routine, it stops being a simple tool decision and becomes a data governance issue: what’s being shared, where it’s going, and whether you could prove what happened if something goes wrong. That’s the core of shadow AI security. The goal isn’t to block AI entirely. It’s to prevent sensitive data from being exposed in the process. Shadow AI Security in 2026 Shadow AI is the unsanctioned use of AI tools without IT approval or oversight, often driven by speed and convenience. The challenge is that the “helpful shortcut” can become a blind spot when IT can’t see what’s being used, by whom, or with what data. Shadow AI security matters in 2026 because AI isn’t just a standalone tool employees choose to use. It’s increasingly embedded directly into the applications you already rely on. At the same time, it’s expanding through plug-ins, extensions, and third-party copilots that can tap into business data with very little friction. And there’s a human reality in it: 38% of employees admit they’ve shared sensitive work information with AI tools without permission. It’s people trying to work faster, but making risky decisions as they go. That’s why Microsoft sees the issue as a data leak problem, not a productivity problem. In its guidance on preventing data leaks to shadow AI, the core risk is simple: employees can use AI tools without proper oversight, and sensitive data can end up outside the controls you rely on for governance and compliance. And here’s what many teams overlook: the risk isn’t just which tool someone used. It’s what that tool continues to do with the data over time. This is known as “ purpose creep ”, when data begins to be used in ways that no longer align with its original purpose, disclosures, or agreements. But shadow AI isn’t limited to one obvious chatbot . It shows up in workflows across marketing, HR, support, and engineering, often through browser-based tools and integrations that are easy to adopt and hard to track. The Two Ways Shadow AI Security Fails 1.) You don’t know what tools are in use or what data is being shared Shadow AI isn’t always a shiny new app someone signs up for. It can be an AI add-on enabled inside an existing platform, a browser extension, or a feature that only shows up for certain users. That makes it easy for AI usage to spread without a clear “moment” where IT would normally review or approve it. It’s best to treat this as a visibility problem first: if you can’t reliably discover where AI is being used, you can’t apply consistent controls to prevent data leakage. 2.) You have visibility, but no meaningful way to manage or limit it Even when you can name the tools, shadow AI security still fails if you can’t enforce consistent behaviour. That typically happens when AI activity lives outside your managed identity systems, bypasses normal logging, or isn’t governed by a clear policy defining what’s acceptable. You’re left with “known unknowns”: people assume it’s happening, but no one can document it, standardise it, or rein it in. This can quickly turn into a governance issue . This happens when the organisation loses confidence in where data flows and how it’s being used across workflows and third parties. How to Conduct a Shadow AI Audit A shadow AI audit should feel like routine maintenance, not a crackdown. The goal is to gain clarity quickly, reduce the most significant risks first, and keep the team moving without disruption. Step 1: Discover Usage Without Disruption Start by reviewing the signals you already have before sending a company-wide email. Practical places to look: Identity logs: who is signing in, to which tools, and whether the account is managed or personal Browser and endpoint telemetry on managed devices SaaS admin settings and enabled AI features A brief, non-judgmental self-report prompt, such as: “What AI tools or features are helping you save time right now?” Shadow AI is often adopted for productivity first , not because people are trying to bypass security. You’ll get better answers when you approach discovery as “help us support this safely.” Step 2: Map the Workflows Don’t obsess over tool names. Map where AI touches real work. Build a simple view: Workflow AI touchpoint Input type Output use Owner Step 3: Classify What data is Being Put into AI This is where shadow AI security becomes practical. Use simple buckets that your team can apply without legal translation: Public Internal Confidential Regulated (if relevant) Step 4: Triage Risk Quickly You’re not aiming to create a perfect inventory. You’re focused on identifying the highest risks right now. A simple scoring model can help you move quickly: Sensitivity of the data involved Whether access occurs through a personal account or a managed/SSO account Clarity around retention and training settings Ability to share or export the data Availability of audit logging If you keep this step lightweight, you’ll avoid the trap of analysing everything and fixing nothing. Step 5: Decide on Outcomes Make decisions that are easy to follow and easy to enforce: Approved: Permitted for defined use cases, with managed identity and logging wherever possible Restricted: Allowed only for low-risk inputs, with no sensitive data Replaced: Transition the workflow to an approved alternative Blocked: Poses unacceptable risk or lacks workable controls. Stop Guessing and Start Governing Shadow AI security isn’t about shutting down innovation. It’s about making sure sensitive data doesn’t flow into tools you can’t monitor, govern, or defend. A structured shadow AI audit gives you a repeatable process: identify what’s in use, understand where it intersects with real workflows, define clear data boundaries, prioritise the biggest risks, and make decisions that hold. Do it once, and you reduce risk right away. Make it a quarterly discipline and shadow AI stops being a surprise.  If you’d like help building a practical shadow AI audit for your organisation, contact us today. We’ll help you gain visibility, reduce exposure, and put guardrails in place without slowing your team down.