If youre like most businesses, its your main communication channel with customers. Here are some email server security best practices you can use right away to help create a secure email server for your organization
Imagine youre preparing for a hurricane thats coming your way (we Floridians are well acquainted with this procedure). You install straps to help make your roof more secure. You pull all your lawn equipment, furniture, and other outside items into your garage or shed. You board your windows and doors and buy lots of food and water in case youre stranded without power. But if you choose to leave your homes exterior doors open as the storm moves in, you can kiss your house and everything in it goodbye. Similarly, this is kind of what its like when companies dont bother implementing a secure email server.
Radicati estimates the total number of business and consumer emails sent and received per day will surpass 376 billion by the end of 2025. If you send emails but dont have a secure email server, then it means that any data transmitted through them is at risk of compromise. (Data is the lifeblood of your business you cant risk your sensitive info falling into the wrong hands.)
But what does it mean to have a secure email server? Lets cover 10 email server security best practices and remind you why implementing these measures is necessary to protect your business and customers.
Lets hash it out.
Much like the word secure implies, having a secure email server means that youre protecting your email domain and data from unauthorized usage. This means:
But how can you achieve these outcomes? Lets dive right into what you came to learn
The following email server security best practices list isnt a complete or comprehensive guide. However, this list provides you with a great starting place to help make your email server more secure.
A big mistake that organizations make is not taking the time to change their servers default settings and configurations. This may be because theyre in a rush or, perhaps, they dont realize just how risky it is to use the default settings. Regardless of the reason, be sure to take the extra step and change these settings.
This includes changing default login information as well. Account and password security are paramount in cybersecurity as a whole. If you use a default username and weak password combo to secure anything, its the equivalent of having the option of using a double deadbolt lock on your front door but opting to use a flimsy chain lock instead. Sure, it provides minimal security, but an attacker only needs to use a little brute force (get it?) to bust their way in and gain access to your home.
Using the default credentials (username and password) that comes with your server or software is like this. Its not secure and leaves your email server and its data at risk of theft and other compromises.
A mail transfer agent strict transport security is a verification check of incoming emails. According to Google, SMTP connections for email are more secure whenthe sending server supports MTA-STS and the receiving server has an MTA-STS policy in enforced mode.
Uh, sure. Great. But what does this mean? Basically, this is saying in laymans terms that if you have MTS-STS enabled on your organizations email server, itll only permit emails to be received via secure, authenticated connections (using TLS 1.2 or 1.3).
This helps protect your recipients against receiving unauthenticated messages sent via insecure connections (i.e., connections where someone could insert malware or modify data in transit, or whats known as a man-in-the-middle [MitM] attack).
If the senders digital identity cant be authenticated or they didnt have SSL/TLS enabled, then the message gets rejected.
Setting up a secure MTA is only part of the equation; you also need to take a few extra steps to help make your server and the inbound and outbound communications to/from it more secure.
Did you know that SSL/TLS also applies to email? Thats right, you can use SSL/TLS security to secure the communication channel of your messages. This allows you to encrypt the communications that transpire between your email server and other email servers that it communicates with. This way, no one can intercept the communications in transit.
Every time one of your employees sends or receives an email from someone, it creates a connection with that individuals email server. If that connection isnt secure, it means that anyone with the know-how can intercept that message in transit and steal or modify the data without the two original parties knowing what happened.
Of course, if youre using an email signing certificate to encrypt your email data directly (more on that later), then this serves as an additional layer of security for your communications.
Traditionally, IMAP or POP3 are protocols that are used for incoming emails (i.e., messages email clients grab from your mail server). SMTP, on the other hand, is used for outgoing emails. Be sure to set your services below to the following secure TCP/IP ports for incoming out outgoing messages:
Cybercriminals love playing dress up with companies brands and capitalizing on their reputations. Its not uncommon for bad guys to impersonate organizations as a way to carry out phishing scams. Check Point reports that the most impersonated brand of Q1 2022 was LinkedIn, which was involved in more than half (52%) of all phishing attacks they analyzed globally. In Q4 2021, Check Point said that DHL held that title, and Microsoft prior to that was the reigning champion of the title that no company wants.
Domain-based message authentication, reporting and conformance (DMARC) is an email protocol that helps to protect your domain against inauthentic usage by unauthorized individuals. The Internet Engineering Task Force (IETF) brought it into the fold as a way to help organizations protect their domains against these fraudulent usages. DMARC builds upon two other authentication protocols to ensure that only your authorized users are sending emails on behalf of your domain:
But just how popular is DMARC? Mimecast reports in their report The State of Email Security 2022 that nearly nine in 10 companies (89%) are either using DMARC or plan to do so over the next 12 months. This is according to their global survey of 1,400 IT and cybersecurity professionals from 12 countries.
Of course, you can take DMARC a step further and bring your organizations digital identity to the next level. You can do this by integrating brand indicators for message identification (BIMI) and verified mark certificates (VMCs) in your organizations email digital identity. Doing this will enable you to insert your organizations verified logo into all of your organizations outbound emails from legitimate senders.
Running an outdated or unpatched version of your servers software is a surefire recipe for disaster. Patches are a publisher or developers way to fix bugs and other issues that leave your email servers vulnerable. If you dont apply those patches in a timely manner, you run the risk of cybercriminals exploiting these vulnerabilities to gain access to your email server(s) and data.
Something youll need to choose is how you want to implement updates. Do you want to handle them manually? Do you want to explore the option of automation? Each approach has its pros and cons, but the point is that you need to ensure that updates and patches dont fall between the cracks and dont find yourself facing another Eternal Blue situation.
(Quick explanation: Eternal Blue was a vulnerability in legacy Windows systems that Microsoft issued a patch for but organizations neglected to roll out in a timely manner. The end result was hundreds of thousands of devices globally being infected by ransomware in an attack that impacted hundreds of millions of people [if not more].)
Alright, were more than half way through our list of secure email server best practices. Much like how network firewalls operate, email server firewalls filter inbound and outbound traffic based on the rules on your email server. What this does is help you to keep tabs on incoming and outgoing communications on your domain to look out for any suspicious activities.
Of course, we cant give you any specific directions about setting up rules on your email server since every system is different. So, youll need to refer to your specific firewall manufacturers site for specifics on how to accomplish this goal.
While its important to monitor your traffic, youll also want to be sure to restrict both the number of emails that can originate from your domain as well as their sizes. A spike in outbound messages could indicate that one or more of your authorized accounts could be compromised and is being used to send spam or phishing messages. Setting rate limits can help protect your domains reputation.
Weve said it before and will continue to say that not everyone needs access to everything. This is true regarding everything from customer and employee database info to privileged access to your email servers. This is where access management best practices come into play.
You can set employee profiles so that users have only the minimal level of access they need to do their jobs. If someone needs access to a sensitive system for a project, assign them permission for the amount of time necessary to complete it. Be sure to remove those privileges once that access is no longer necessary (e.g., when they complete the project).
Furthermore, be sure to have a procedure in place that ensures access is revoked for accounts when employees leave your organization. Attackers or even disgruntled former employees love to use old logins to nose around systems they should no longer have access to. You can prevent this from occurring by deactivating their accounts right away.
As an administrator, you likely use secure shell (SSH) to manage your organizations various servers. Traditionally, this requires using a username and password combination for authentication. But theres a better (and more secure) way of doing that than relying on potentially weak login credentials: you can use public-private key pairs instead.
This method of authentication involves using cryptographic keys to prove your digital identity as a legitimate authorized user. One of which is public and the other your device keeps private that proves youre you. This process enables you to authenticate easily and securely without ever having to remember a cumbersome password.
Weve talked at length about the importance of SSH key management best practices previously. To quickly recap, SSH key management is about securing your cryptographic keys as part of your SSH access management strategy and security practices. (Be sure to check out the article linked at the beginning of this paragraph for more in-depth information.)
Protecting account credentials isnt optional; its the responsibility of every individual employee and network user. Why? Because compromising users accounts is the easiest way for hackers to compromise your server. Part of this approach to hardening your organizations cyber defenses involves educating and training users on cyber security best practices.
Some of the things effective cyber awareness trainings should cover include:
To help prevent your employees especially admins and other privileged user from falling for credential phishing scams, require everyone to digitally sign their emails. By adding a cryptographic digital signature (i.e., a signature thats verified by a public CA) to your email, youre doing two big things:
You can also use these certificates to encrypt emails containing sensitive data for added measure. This process requires both parties (sender and recipient) to have email signing certificates, and for the email sender to use the recipients public key. You then use their public key to encrypt the email before pressing Send and they use their corresponding private key to decrypt the message on their end.
If this sounds complicated, dont worry all you have to do is ask the recipient to send you a digitally signed email first. This way, you have a copy of their public key readily available. Its that simple.
Frankly, there are many reasons why implementing these email server security best practices is crucial for businesses and other organizations globally. The biggest reason is that its the right and responsible thing to do. Your customers, users and other stakeholders are entrusting you to protect their data.
Second, it helps to protect your interest by keeping your data secure from prying eyes. Cybercriminals or even your competitors would love to get their hands on the digital goodies you have stored on your email server.
Here are a few other quick reasons why having a secure email server is essential for your organization:
Read the original:
10 Email Server Security Best Practices to Secure Your Email Server - Hashed Out by The SSL Store
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]