6 Simple Steps to Enhance Your Email Security

Tanya Wetson-Catt • 18 November 2024

Email is a fundamental communication tool for businesses and individuals alike. But it’s also a prime target for cybercriminals. Cyberattacks are increasing in sophistication. This means enhancing your email security has never been more critical.


Ninety-five percent of IT leaders say cyberattacks have become most sophisticated. Over half (51%) have already seen AI-powered attacks in their organisation.


By taking proactive measures, you can protect your sensitive information as well as prevent unauthorised access and maintain communication integrity. Here are six simple steps to enhance your email security.


1. Use Strong, Unique Passwords


Passwords are the first line of defence for your email accounts. A weak password is like an open invitation for cybercriminals. To enhance your email security, use strong, unique passwords. Ones that are difficult to guess.


Create Complex Passwords


A strong password should include a mix of:


  • Letters (both uppercase and lowercase)
  • Numbers
  • Special characters


Avoid using common words or phrases. Also, avoid easily guessable information like your name or birthdate. A complex password makes it harder for attackers to gain access to your email account.


Use a Password Manager


Remembering several complex passwords can be challenging. A password manager can help you generate and store unique passwords for all accounts. With a password manager, you only need to remember one master password. This simplifies the process while enhancing security.


Avoid Reusing Password


Using the same password across many accounts increases your risk. If one account gets compromised, all accounts using the same password are vulnerable. Make sure each of your email accounts has a unique password. This prevents a single breach from spreading.


2. Enable Two-Factor Authentication (2FA)


Two-factor authentication (2FA) adds an extra layer of security to your email accounts. Even if someone gets hold of your password, they won’t be able to access your account. They would need the second factor of authentication to do that.


Choose a 2FA Method


Common 2FA methods include SMS codes, authenticator apps, and hardware tokens. SMS codes send a verification code to your phone. Authenticator apps generate time-sensitive codes on your device. Hardware tokens provide physical devices that generate a code. Choose the method that best suits your needs.


Set Up 2FA for All Accounts


Enable 2FA for all your email accounts. Most email providers offer this feature and setting it up usually takes just a few minutes. This simple step significantly improves your email security.


3. Be Cautious with Email Attachments and Links


Email attachments and links are common vectors for malware and phishing attacks. Clicking on a malicious link or attachment can give attackers access to your system. Exercise caution to protect your email security.


Verify the Sender


Before opening an attachment or clicking on a link, verify the sender’s identity. If you receive an unexpected email from someone you know, contact them. But do it through a different channel to confirm they sent it. For emails from unknown senders, exercise extra caution. Consider not engaging with the content.


Scan Attachments


Use antivirus software to scan email attachments before opening them. This helps detect and block any malicious content before it can harm your system. Many email providers also offer built-in scanning features. But having your antivirus software adds an extra layer of protection.


Avoid Clicking on Suspicious Links


Be wary of links that seem out of place or too good to be true. Hover over the link to see the URL before clicking. If the URL looks suspicious or unfamiliar, don’t click on it. Instead, navigate to the site directly through your browser.


4. Keep Your Email Software Updated


Software updates often include security patches that address vulnerabilities in your email client. Keep your email software updated. This ensures you have the latest protections against known threats.


Enable Automatic Update


Most email clients and operating systems offer automatic updates. Enable this feature. It ensures your software stays up to date without requiring manual intervention. Automatic updates reduce the risk of missing critical security patches.


Regularly Check for Updates


Even with automatic updates enabled, it’s good to manually check for updates. This ensures you don’t miss any important security patches. It also helps keep your email client running smoothly and securely.


5. Use Encryption for Sensitive Emails


Encryption adds a layer of protection to your emails. It encodes the content, making it readable only by the intended recipient. This ensures that even intercepted email information remains secure.


Encrypt Emails Containing Sensitive Information


If you need to send sensitive information via email, use encryption. This protects the content. Many email providers offer built-in encryption options. For added security, consider using third-party encryption tools that offer end-to-end encryption.


Educate Recipients


If you’re sending encrypted emails, make sure the recipients know how to decrypt them. Provide clear instructions about how to access the encrypted content securely.


6. Watch Your Email Activity


Regularly monitoring your email activity can help you detect suspicious behaviour early. By keeping an eye on your account, you can take swift action if something seems off.


Set Up Activity Alerts


Many email providers offer activity alerts. They notify you of unusual login attempts or changes to your account settings. Enable these alerts to stay informed about your account’s security status.


Regularly Review Account Activity


Review your email account activity on a regular basis. This includes login history and devices connected to your account. If you notice any unfamiliar activity, change your password immediately and investigate further.


Respond Quickly to Suspicious Activity


If you detect any suspicious activity in your email account, respond quickly. Change your passwords, review your security settings, and consider enabling extra security measures.


Get Expert Email Security Solutions


Email security is essential for protecting your personal and professional information. We have solutions that can effectively reduce the potential for email compromise as well as reduce phishing risk.


Contact us today to schedule a chat about email security.

Let's Talk Tech

More from our blog

by Tanya Wetson-Catt 15 May 2026
MFA is a strong front-door lock. But it’s not the only thing that decides whether someone can get in. After you sign in, your browser keeps you logged in using a session token (often stored as a cookie). It’s the digital version of a wristband at an event: once you’ve been checked, the wristband proves you belong there. If an attacker steals that wristband, they may not need to beat your MFA prompt at all. That’s the core of session cookie hijacking. The attacker isn’t “cracking” MFA. They’re skipping it by replaying your already authenticated session. This isn’t a reason to stop using MFA. It’s a reason to stop treating MFA as the finish line. When sessions can be stolen, the practical defence shifts to layered controls: phishing-resistant sign-ins, device hygiene, tighter session policies, and detection that catches suspicious access early. Why MFA Isn’t a “Game Over” Control MFA is still one of the best upgrades most businesses can make, but it doesn’t end an attack on its own. The reason is that attackers don’t always try to beat the login step. They try to go around it. Cloudflare notes that “attackers are finding new ways to circumvent MFA” and that modern incidents are rarely one isolated technique. They’re “part of a chain of attacks.” In other words, MFA can block a lot of credential theft, but it doesn’t automatically protect what happens after a user successfully signs in. That’s where session cookie hijacking comes in. Microsoft has described adversary-in-the-middle phishing campaigns where attackers use a reverse-proxy site to “steal and intercept” a user’s password and the session cookie that proves they have an authenticated session. This is “not a vulnerability in MFA.” The attacker isn’t breaking the MFA. They’re reusing the session. What a Session Cookie Is and Why Attackers Want It When you sign into a web app, the site needs a way to remember that you’ve already proved who you are. That’s what a session is: a temporary “logged-in” state that saves you from entering your password and MFA code on every click. Kaspersky explains that session hijacking is “sometimes called cookie hijacking” because cookies are commonly used to store the session identifier that keeps you authenticated. Attackers want that session identifier because it’s the shortcut. Proofpoint describes session tokens as digital “keys” that let a user stay authenticated. It warns that stealing valid tokens lets attackers impersonate legitimate users and potentially bypass authentication measures “like MFA.” That’s why session cookie hijacking is so highly leveraged. If an attacker can steal the cookie or token that represents your active session, they’re not trying to defeat the login process. They’re attempting to reuse what you already completed, and access the same apps and data as if they were sitting at your keyboard. How Session Cookie Hijacking Actually Happens A lot of teams picture “account takeover” as someone guessing a password or tricking a user into approving an MFA prompt. Session cookie hijacking is different. The attacker’s goal is to steal the proof that you’re already logged in, then reuse it, often without triggering another sign-in challenge. 1.) AiTM phishing Adversary-in-the-middle (AiTM) phishing is the “proxy login” trap. You think you’re signing into a normal service, but you’re actually signing into a lookalike page that sits between you and the real site. The attacker relays the login in real time, so everything appears to work, including MFA. Attackers use AiTM phishing sites to “steal and intercept” a user’s password and the session cookie that proves the authenticated session. This is “not a vulnerability in MFA.” The attacker isn’t breaking the MFA. They’re capturing the session after MFA is completed and reusing it. One such campaign “ attempted to target more than 10,000 organisations ” since September 2021, which shows how scalable this approach has become. 2.) Browser-in-the-Middle session stealing Browser-in-the-middle (BitM) is similar in spirit, but it’s even more “hands-on” from the attacker’s side. Instead of stealing a password and running away, the attacker effectively places themselves in control of the browsing session. Google’s threat intelligence says, “Stealing this session token is the equivalent of stealing the authenticated session.” Once the token is stolen, “an adversary would no longer need to perform the MFA challenge.” In other words, the attacker isn’t trying to authenticate instead of you. They’re trying to ride along after you’ve authenticated. 3.) Cookie theft from the endpoint Not every session hijack starts with a fancy proxy. Sometimes the attacker simply steals session data from the device itself. Stealing valid session tokens allows attackers to impersonate legitimate users. Tokens act like digital “keys.” If an endpoint is compromised, those “keys” can be extracted and reused. Invicti explains that an attacker steals HTTP cookies and can gain access. The goal is often to obtain sensitive information stored in cookies. MFA Is a Baseline, Not a Finish Line MFA is still essential. It blocks a huge amount of credential theft and makes basic account takeover harder. But session cookie hijacking is a reminder that attackers don’t always try to defeat the login step. Sometimes they reuse what happens after it. The practical response is layered and realistic. Make phishing harder to pull off, and treat device health as part of identity. Tighten session behaviour for high-risk apps. Watch for suspicious access patterns that suggest a session is being replayed. When those controls work together, MFA stops being a comforting checkbox and becomes what it should be: a strong baseline that’s backed by protections around the session itself.  Contact us today for help protecting your login sessions from hijacking.
by Tanya Wetson-Catt 11 May 2026
In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock it away, and don’t leave passwords where someone can see them. In 2026, the same idea still matters but the “desk” has changed. For many teams, the home office is now the default workspace, and that means physical access can quickly become digital access. An unlocked screen, a shared device, or a laptop left in the wrong place can expose the same systems your business runs on every day. Clean Desk 2.0 isn’t about aesthetics. It’s about securing the physical-to-digital bridge. If a houseguest, a delivery person, or a thief can sit down at your workstation, they don’t need to be a master hacker to cause real damage. They just need a few unattended minutes and an open session. Why an Unlocked Screen is a Data Breach Most small business owners treat multi-factor authentication (MFA) as the ultimate front-door lock. And it’s a great lock. The problem is that once you’re already inside, the “front door” isn’t the control that matters. When you sign into a web app, your browser creates a session token (often stored as a cookie) so you stay logged in without being challenged on every click. Kaspersky notes that session hijacking is “sometimes called cookie hijacking” because cookies commonly store the session identifier. Proofpoint says session tokens act like digital “keys.” If they’re stolen, attackers can impersonate legitimate users and bypass authentication measures “like MFA”. That’s why physical access changes the game. If someone can sit down at your workstation while you’re making a coffee, they don’t need to “crack” anything. They can reuse your already authenticated session and access the same cloud apps, CRM data, and financial tools you were just using, no MFA prompt required. This is exactly why Clean Desk 2.0 needs an auto-lock culture. Set short screen-lock timers. Lock manually every time you step away. Treat an unlocked session the same way you’d treat a set of master keys left in the door. Hardware "Legacy Debt" on Your Desk Most people keep old tech for the same reason: it still works. But “still works” isn’t the same as “still safe”. The same legacy debt that shows up in server rooms also shows up in home offices and often in the exact places that matter most, like routers, VPN gateways, and the “backup” laptop that hasn’t been updated in months. The core problem is end-of-support. When a device reaches end-of-support (EOS), security fixes stop arriving. The UK’s guidance on obsolete products notes, “Ideally, once out of date, technology should not be used,” and “the only fully effective way to mitigate this risk is to stop using the obsolete product.” In other words, you can’t patch your way out of something that no longer gets patches. This matters even more for edge devices. These are anything internet-facing that sits between your home network and the rest of the world. A Clean Desk 2.0 habit is to audit your home-office “edge” the same way you’d audit a server room: Identify what’s internet-facing Confirm it’s supported and patchable Retire anything that isn’t. Your Digital Employee Needs a Locked Door As AI features get embedded into everyday tools, workstations aren’t just “where you work” anymore. They’re where automated actions happen. An AI agent might update your CRM, draft client comms, schedule appointments, or move a workflow forward with minimal input once it’s been kicked off. That creates a new physical risk because unattended sessions + automation don’t mix. If an agent is running a process while you’re away from your desk, an unlocked screen turns into an open control panel. Someone doesn’t need to be technical to cause damage. They just need to click, approve, change a destination account, or interfere with an in-flight task. The fix isn’t banning automation. It’s treating AI-driven workflows like you’d treat any powerful business system: clear boundaries and clear approvals. Decide upfront: What decisions can the AI agent make without a human present? What actions require an explicit approval step? What are its spending limits and escalation rules if money is involved? Which systems and data are the agents allowed to access, and which are off-limits? Physical Efficiency and Cloud Waste A Clean Desk 2.0 mindset isn’t only about security. It’s about operational discipline: knowing what you’re using, why you’re using it, and what should be switched off when it’s not needed. Cloud waste is the digital version of leaving the lights on in an empty building. It shows up as underused servers, test environments that never power down, and storage that keeps growing because nobody owns the cleanup. None of it looks dramatic day to day. It just quietly inflates your monthly bill. The simple habit that fixes it is the same one that keeps a physical workspace under control: visibility and ownership. Assign each environment and major resource to an owner, review what’s actually being used, and schedule non-production workloads to shut down outside business hours. These “tidying” routines don’t just cut spending. They reduce clutter, limit exposure, and make your environment easier to manage when something goes wrong. Building a 2.0 Foundation Securing your home office from physical data leaks isn’t about paranoia. It’s about professionalism. In 2026, the home workspace isn’t a side setup. It’s part of your business perimeter. Clean Desk 2.0 is really a set of modern defaults, like locked screens and supported devices. When those basics are consistent, small home-office lapses stop turning into bigger business problems.  Want help turning this into a simple, enforceable baseline for your team? Contact us for a technology consultation.
by Tanya Wetson-Catt 4 May 2026
When you first sign up for a software-as-a-service (SaaS) platform, everything is designed to feel effortless. The problem is that the first real test of a SaaS relationship isn’t the onboarding. It’s the exit. For many small businesses, the front door is wide open, but the emergency exit is bolted shut: exports are incomplete, key data sits in proprietary formats, and leaving requires expensive vendor help. That’s more than inconvenient. It’s a business risk. As teams move toward a workforce blended with humans and Agentic AI in 2026, your advantage will come from data you can move, reuse, and trust. If your data can’t leave a vendor cleanly, you don’t fully control your processes. Then your options, timelines, and costs are controlled for you. Why This Gets Worse in 2026 The “backup exit strategy” question is getting sharper in 2026 because SaaS sprawl and third-party dependence are now normal. Your business data isn’t sitting in one system. It’s spread across platforms, integrations, plug-ins, and automation. When one vendor changes pricing, terms, features, or risk profile, you don’t just “switch tools.” You either move your data cleanly or you stay stuck. The breach environment also raises the stakes. Verizon’s 2025 DBIR Executive Summary says it analysed 22,052 security incidents and 12,195 confirmed breaches, calling it “the highest number of breaches ever analysed in a single report,” across 139 countries. That volume matters because exits and migrations often happen under pressure. A backup exit strategy is what prevents “we need to move” from becoming “we can’t move.” Attackers are also increasingly focused on credentials and data pathways. These are the same pathways you rely on during exports and migrations. Microsoft’s Digital Defense Report 2025 notes that credential and access key theft attempts are up 23%, and attempts to extract sensitive data from storage accounts and databases increased 58%. Microsoft also reports that data collection showed up in 80% of reactive engagements, which is a reminder that “getting the data” is now a common objective. If you can’t export your data safely and predictably, you end up trapped. You can’t rotate away from a risky platform quickly. And you can’t migrate without creating new exposure. Finally, being stuck is expensive even before you factor in vendor fees. IBM’s Cost of a Data Breach Report 2025 puts the global average cost of a breach at USD 4.4M. That’s not a “lock-in” statistic, but it is a useful reality check: data incidents cost real money. A clean exit strategy reduces the chance that a vendor becomes an added cost multiplier during an already expensive situation. In 2026, the question isn’t whether you’ll ever need to move data. It’s whether you’ll be able to do it without vendor hand-holding, surprise costs, or emergency timelines. The Financial Cost of the "Proprietary Trap" A weak exit plan doesn’t just slow innovation. It quietly increases operating costs because you end up paying for a setup you can’t easily change. When you’re locked into a vendor, spending becomes sticky. You can’t right-size quickly, consolidate tools, or move workloads to a better-fit platform without turning it into a major project. That’s how waste hangs around. The real cost isn’t the monthly invoice. It’s the lack of options. When your data can’t move easily, every renewal, pricing change, or product shift becomes a forced decision instead of a strategic one. A true backup exit strategy flips that dynamic. It gives you the ability to migrate on your timeline, reduce duplicate tooling, and make cost decisions based on value rather than inertia. In practical terms, it turns “we can’t leave” into “we can compare, choose, and move when it makes sense.”. Securing the Move Once you decide to move your data, the migration itself becomes a high-risk moment. Not because migrations are inherently unsafe. But because they concentrate exactly what attackers want: High-privilege access Lots of open sessions, A lot of data moving at once During a data move, your team is often signed into multiple admin-level tools at the same time. That’s where session cookie hijacking becomes relevant. An attacker doesn’t need to “crack” your password if they can steal the session token that proves you’re already authenticated. Microsoft has described adversary-in-the-middle phishing campaigns that intercept session cookies so attackers can reuse an authenticated session and bypass the MFA prompt. Cloudflare also notes that attackers are finding ways to circumvent MFA as part of broader attack chains, which is why the safest approach is layered rather than relying on one control. To protect your backup exit migration: Use phishing-resistant sign-ins where possible for migration and admin accounts. Tighten session controls so privileged sessions expire sooner and re-authentication is required for risky actions. Treat device health as part of access: run the migration from a managed, patched, protected device. Monitor for suspicious access during the move. Ownership is a Discipline The businesses that thrive over the next few years won’t just adopt new tools. They’ll stay flexible as tools change. In a world of SaaS sprawl and AI-driven workflows, that flexibility comes from clean data, clear processes, and the ability to move when you need to.  If you’d like help building an exit-ready baseline across your vendor stack, contact us for a technology consultation.