Email Security
Email Security
1. Introduction:
In the intricate tapestry of modern digital communication, email has emerged as an
indispensable thread, weaving together the personal and professional lives of individuals and
organisations across the globe. With its ubiquity and convenience, email has become the
lifeblood of our online interactions, facilitating the exchange of ideas, information, and
transactions with unprecedented ease. However, beneath the surface of this seemingly
seamless communication medium lies a troubling reality: the email system we have come to
rely on is built upon a foundation riddled with vulnerabilities, like a ticking time bomb,
exposing us to many security risks that threaten the integrity of our digital correspondence.
The purpose of this in-depth white paper is to urgently address the email security landscape,
delving into the technical intricacies, real-world implications, and potential solutions to the
pervasive problems that undermine the trustworthiness of our digital correspondence. By
presenting a balanced and nuanced perspective supported by the latest factual evidence,
expert insights, and compelling case studies from around the globe, I aim to engage a diverse
audience, including cybersecurity professionals, business leaders, policymakers, and
concerned individuals, in a meaningful discourse on the urgent need for robust email security
measures.
Throughout this white paper, I will explore the fundamental weaknesses in email protocols,
the alarming prevalence of email-based attacks, the limitations of current security practices,
and the transformative potential of emerging technologies in reshaping the email security
paradigm. Moreover, I will delve into the crucial role of user education, the importance of
international cooperation, and the policy and regulatory considerations that shape the email
security landscape. By the conclusion of this comprehensive analysis, I hope to have equipped
readers with a deep understanding of the email security challenge and inspired a collective
call to action, urging stakeholders across industries and disciplines to collaborate in forging a
more secure and trustworthy digital communication ecosystem.
1 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
The email protocols that form the backbone of our digital communication, such as Simple Mail
Transfer Protocol (SMTP), were designed in an era when security was not the top priority. This
oversight has left email vulnerable to a wide range of impersonation and spoofing attacks,
with attackers able to forge email headers and deceive recipients with relative ease.
To address this fundamental flaw, the email ecosystem has gradually adopted various
authentication mechanisms, each serving as a layer of defence against these insidious
threats. The most prominent among these are the Sender Policy Framework (SPF),
DomainKeys Identified Mail (DKIM), Domain-based Message Authentication, Reporting, and
Conformance (DMARC), and the critical role of Domain Name System Security Extensions
(DNSSEC) in securing the foundation of email authentication.
SPF allows domain owners to specify which mail servers are authorised to send emails on their
behalf. By publishing SPF records in the Domain Name System (DNS), domain owners can help
receiving mail servers verify that incoming emails originate from approved sources. DKIM, on
the other hand, uses cryptographic signatures to ensure the integrity and authenticity of email
content, deterring tampering and impersonation attempts. DMARC builds upon SPF and
DKIM, enabling domain owners to establish clear policies for handling emails that fail
authentication checks and to receive reports on the use of their domain in email
communications.
At the core of the email security conundrum lies a critical vulnerability: the inability to reliably
verify the identity of the sender. When an email message arrives in our inboxes, purportedly
from a trusted source, we are left with little assurance that it genuinely originated from the
claimed sender. This lack of robust sender authentication is a fundamental flaw in the email
ecosystem, which has far-reaching consequences for the integrity and trustworthiness of our
digital communications.
2 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
The email protocols that form the backbone of our communication infrastructure, such as the
Simple Mail Transfer Protocol (SMTP), were designed in an era when the Internet was a more
trusting and less hostile environment. These protocols prioritised simplicity and
interoperability over security, leaving them vulnerable to a wide range of impersonation and
spoofing attacks. Attackers with even moderate technical skills can easily forge email
headers, manipulating the "From" field to make it appear that a message originated from a
legitimate source, such as a trusted individual, organisation, or domain [1].
SPF is an email authentication protocol that allows domain owners to specify which mail
servers are authorised to send emails on behalf of their domain. By publishing SPF records in
the Domain Name System (DNS), domain owners can define a list of IP addresses or
hostnames that are permitted to send emails to their domain. When an email is received, the
receiving mail server can check the SPF record of the sender's domain to verify that the email
originated from an authorised source. If the sending server's IP address does not match the
SPF record, the email may be flagged as suspicious or rejected outright [2].
DKIM, on the other hand, focuses on verifying the authenticity and integrity of email content.
DKIM relies on public-key cryptography to digitally sign email messages, ensuring that the
content of the email has not been altered during transit. The sending mail server adds a DKIM
signature to the email header, which includes a cryptographic hash of the email content and
a digital signature generated using the sender's private key. The receiving mail server can
then use the sender's public key, published in the DNS, to verify the signature and confirm that
the email content has not been tampered with [3].
While SPF and DKIM provide valuable mechanisms for email authentication and integrity
verification, they do not address the issue of spoofed email headers. An attacker can still craft
an email with a forged "From" address that passes SPF and DKIM checks, as these
mechanisms do not validate the authenticity of the visible sender address. This is where
DMARC comes into play.
DMARC builds upon SPF and DKIM to provide a comprehensive email authentication and
reporting framework. DMARC allows domain owners to specify how receiving mail servers
should handle emails that fail SPF or DKIM checks, as well as to request reports on the usage
of their domain in email communications. By publishing a DMARC policy in the DNS, domain
owners can instruct receiving mail servers to reject, quarantine, or accept emails that fail
authentication checks. DMARC also enables domain owners to receive aggregate and forensic
reports on email traffic using their domain, providing valuable insights into potential spoofing
attempts and helping to identify and mitigate email-based threats [4].
3 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
Once upon a time, in the vast expanse of the internet, an email named Dorothy set out on a
quest to reach her intended recipient. Like her namesake from the enchanting tale "The
Wizard of Oz," Dorothy had to traverse the winding paths of the digital landscape, facing
challenges and forging alliances along the way.
As Dorothy prepared for her adventure, she made sure to carry her trusty "From" header,
which served as her introduction to all she encountered. "I'm Dorothy, from
sender@[Link]," she proudly declared, ensuring everyone knew her true identity and
origin.
Dorothy's journey began on the Yellow Brick Road of the internet, a path fortified by the magic
of DNSSEC. This potent spell ensured that the road signs were genuine and had not been
tampered with by malicious actors. The Scarecrow, representing the Sender Policy Framework
(SPF), joined Dorothy on her journey. Though sometimes forgetful, the Scarecrow played a
vital role in confirming that Dorothy followed a route approved by her domain. "Think of SPF
as a map of authorised roads," the Scarecrow explained. "It helps ensure that only legitimate
senders can use a domain's reputation."
As they ventured further, Dorothy and the Scarecrow befriended the Tin Man, a kindhearted
soul embodying DomainKeys Identified Mail (DKIM). The Tin Man carried a special heart-
shaped seal, which he likened to a DKIM signature. "This seal proves that you are who you
claim to be and that your message hasn't been tampered with during your journey," he said.
Dorothy understood that the Tin Man's unwavering heart represented her own integrity and
authenticity.
Near the end of the Yellow Brick Road, Dorothy and her companions met the Cowardly Lion,
a Domain-based Message Authentication, Reporting, and Conformance (DMARC) symbol.
Despite his initial fears, the Lion found the courage to enforce the rules of the land. "DMARC
ensures you've followed the path SPF set out for you and that you have a true heart like
DKIM," the Lion explained. "If you don't meet these requirements, I'll have to send you back
to the start or deny you entry to the Emerald City."
4 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
Despite the availability of SPF, DKIM, and DMARC, the adoption of these email authentication
mechanisms still needs to be improved. A study by the Email Authentication Deployment
Survey found that only 30% of the top 1,000 global brands had fully implemented DMARC,
leaving a significant portion of the email ecosystem vulnerable to spoofing and impersonation
attacks [6]. The lack of widespread adoption can be attributed to various factors, including
the complexity of implementing and managing these technologies, the need for coordination
between different stakeholders, and the potential impact on email deliverability.
The absence of ubiquitous email authentication has given rise to a pervasive problem known
as Business Email Compromise (BEC) scams. In BEC scams, attackers impersonate high-level
executives or trusted business partners to manipulate employees into transferring funds or
sensitive data. These scams rely on the inherent trust placed in the sender's identity and often
employ social engineering techniques to create a sense of urgency or authority. According to
the FBI's Internet Crime Complaint Center (IC3), BEC scams have resulted in staggering
financial losses, with reported incidents exceeding $26 billion globally between June 2016 and
July 2019 [7].
One notable example of a BEC scam that highlights the consequences of inadequate email
authentication is the attack on Crelan Bank, a Belgian financial institution. In 2016, attackers
impersonated the CEO of Crelan Bank and successfully convinced an employee to transfer
€70 million ($75.8 million) to fraudulent accounts. The attackers exploited the lack of proper
email authentication mechanisms to craft convincing spear-phishing emails, ultimately
leading to a significant financial loss for the bank [8].
Throughout her journey, Dorothy relied on her "To" header map and received guidance from
the "Subject" line and "CC/BCC" fields, much like how Glinda the Good Witch offered wisdom
and support. These companions helped Dorothy stay focused on her goal and communicate
her purpose clearly.
When Dorothy finally reached the gates of the Emerald City, the gatekeeper, representing the
recipient's email server, carefully examined her SPF, DKIM, and DMARC credentials. The
gatekeeper also verified that the Yellow Brick Road had been protected by the magic of
DNSSEC, ensuring the integrity of Dorothy's journey. Seeing that Dorothy was a legitimate
and trustworthy email, the gatekeeper warmly welcomed her into the city, where she
successfully delivered her message.
5 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
Dorothy's adventure serves as a powerful allegory for the importance of email authentication
protocols and the critical role of DNSSEC in securing the foundation of email communication.
SPF, represented by the Scarecrow, ensures that only authorised senders can use a domain's
reputation. DKIM, embodied by the Tin Man, verifies the integrity and authenticity of email
content. DMARC, portrayed by the Cowardly Lion, enforces strict policies and guards against
fraudulent activity. DNSSEC, the magic that protects the Yellow Brick Road, ensures that the
critical DNS infrastructure is not compromised, strengthening the overall effectiveness of
email authentication.
The Crelan Bank incident and the alarming statistics on BEC scams underscore the urgent
need for organisations to prioritise the implementation of robust email authentication
protocols. By adopting SPF, DKIM, DMARC, and DNSSEC, organisations can significantly
reduce the risk of falling victim to costly impersonation attacks. However, the effectiveness
of these mechanisms relies on proper configuration, ongoing monitoring, and timely response
to authentication failures and reported incidents.
In cybercrime, email tampering has become a powerful tool for perpetrating fraud, theft, and
deception. Attackers can intercept and modify email messages in transit, altering the content,
attachments, or recipient list to suit their malicious intentions. This can lead to the redirection
of funds, the disclosure of sensitive information, or the dissemination of malware, all under
the guise of legitimate communication.
One of the most alarming consequences of email tampering is its impact on the legal and
justice system. In legal proceedings, emails often serve as crucial evidence, providing a digital
trail of communications, agreements, and transactions. However, the ease with which emails
can be tampered with casts a shadow of doubt over their reliability and admissibility in court.
The case of Parmalat, an Italian dairy and food corporation, serves as a sobering example of
the legal ramifications of email tampering. In 2003, Parmalat filed for bankruptcy protection
after discovering a massive fraud scheme that involved the manipulation of financial
statements and the forgery of bank documents. During the investigation, it was revealed that
the company's executives had used tampered emails to deceive auditors and investors,
creating a false impression of the company's financial health. The Parmalat scandal resulted
in criminal charges, lengthy legal proceedings, and billions of dollars in losses for investors [9].
6 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
The Parmalat case highlights the critical importance of preserving the integrity and
authenticity of email evidence in legal contexts. The ability to prove that an email has
remained the same since its creation is essential for establishing its admissibility and
credibility in court. This is where digital forensics and email authentication technologies play
a crucial role.
Digital forensics experts employ various techniques and tools to analyse email evidence and
detect signs of tampering. These techniques include examining email headers, metadata, and
cryptographic signatures to determine the authenticity and provenance of email messages.
By using specialised software and following established forensic procedures, experts can
identify inconsistencies, anomalies, or alterations that may indicate email tampering [10].In
addition to digital forensics, the use of email authentication protocols such as DKIM and
DMARC can provide an additional layer of protection against email tampering. By digitally
signing email messages and verifying the integrity of email content, these protocols create a
tamper-evident seal that can help establish the authenticity of email evidence in legal
proceedings.
The consequences of email tampering extend beyond the legal realm, impacting personal and
professional relationships, business transactions, and public trust. In an increasingly
interconnected world, where email has become the primary means of communication for
many individuals and organisations, the ability to rely on the authenticity and integrity of
email messages is crucial for building and maintaining trust.
One area where email tampering can have particularly severe consequences is in the
healthcare sector. Email is widely used for communication between healthcare providers,
patients, and insurance companies, often containing sensitive medical information and
personal data. Tampering with healthcare-related emails can lead to misdiagnosis, delayed
treatment, and breaches of patient confidentiality.
In a reported incident, a hacker gained access to a hospital employee's email account and
modified the content of an email containing a patient's medical records. The altered email
instructed the recipient to administer an incorrect medication dosage, risking the patient's
health. Fortunately, the tampering was detected before any harm was done, but the incident
underscores the potentially life-threatening consequences of email tampering in the
healthcare domain [12].
Organisations must adopt stringent security measures and comply with industry-specific
regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the
United States to mitigate the risks of email tampering in healthcare. HIPAA mandates the
implementation of technical safeguards, including encryption and access controls, to protect
the confidentiality and integrity of electronic protected health information (ePHI) transmitted
via email [13].
7 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
One of the most prevalent practices is the use of email disclaimers, those ubiquitous blocks of
text appended to the bottom of outgoing messages, declaring the confidentiality of the
contents and disclaiming liability for any unauthorised distribution or use. While these
disclaimers serve a legal purpose, they create a false sense of security, leading recipients to
believe that the mere presence of a disclaimer guarantees the authenticity and integrity of
the email.
Email disclaimers do little to prevent tampering or ensure the sender's identity. Attackers can
easily remove, modify, or spoof disclaimers, rendering them ineffective security measures.
Moreover, appending a disclaimer to an email message actually modifies the original content,
invalidating any digital signatures or authentication mechanisms that may have been applied
to the message. Consequently, organisations that rely solely on disclaimers to protect their
email communications are inadvertently contributing to the problem of email tampering.
Another common security practice is using spam filters and anti-malware software to identify
and block malicious emails. While these tools play a crucial role in reducing the volume of
unwanted and potentially harmful messages, they are not infallible. Attackers continuously
evolve their techniques, crafting more sophisticated and targeted phishing emails that can
evade detection by traditional security solutions.
A study by the Ponemon Institute revealed that even with the deployment of advanced email
security technologies, organisations still experience a significant number of successful email-
based attacks. The study found that the average cost of a successful phishing attack is $3.7
million, highlighting the limitations of current email security practices in preventing financial
losses and reputational damage [14].
8 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
One reason spam filters and anti-malware software are limited in effectiveness is their
reliance on signature-based detection methods. These methods involve comparing incoming
email messages against a database of known malicious patterns, such as specific subject
lines, sender addresses, or attachment types. While effective against known threats,
signature-based detection struggles to identify novel or targeted attacks that do not match
existing patterns [15].
One example of an AI-powered email security solution is Darktrace's Antigena Email. This
solution uses unsupervised machine learning to build a dynamic understanding of normal
email behaviour within an organisation, detecting and neutralising novel and sophisticated
email-based threats that evade traditional security controls. By continuously learning and
adapting to new patterns, Antigena Email can identify and respond to emerging threats, such
as zero-day exploits and targeted spear-phishing campaigns [16].
While AI and machine learning technologies offer promising capabilities for email security,
they are not without their own challenges and limitations. The effectiveness of these
technologies heavily relies on the quality and quantity of training data used to develop the
underlying models. If the training data is biased, complete, and representative of the full
spectrum of email threats, the resulting models may generate false positives or miss critical
threats [17].
Another limitation of current email security practices is the reliance on reactive measures,
such as threat detection and incident response, rather than proactive prevention. While
identifying and blocking malicious emails is essential, it does not address the underlying
vulnerabilities in the email ecosystem that enable these attacks to occur in the first place.
Organisations must adopt a holistic and proactive approach that combines technological
solutions with robust policies, processes, and user education to enhance email security truly.
This includes implementing email authentication protocols, such as SPF, DKIM, and DMARC,
to prevent spoofing and ensure the integrity of email communications. It also involves
establishing strict access controls, monitoring systems, and incident response procedures to
detect and mitigate email-based threats in a timely manner.
9 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
One example of a successful security awareness program is the "Think Before You Click"
campaign implemented by the UK National Health Service (NHS). This program combines
online training modules, posters, and interactive quizzes to educate NHS staff on the dangers
of phishing and the importance of verifying email authenticity before engaging with
suspicious messages. Since the program's launch, the NHS has reported a significant
reduction in the number of successful phishing attacks and an increased awareness among
staff of email-based threats [20].
10 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
When an email is sent, the sender's email client signs the email content using the sender's
private key and broadcasts the signed transaction to the blockchain network. The network
nodes validate the transaction, verifying the sender's signature and ensuring that the email
content matches the hash stored in the corresponding block. Once validated, the transaction
is added to the blockchain, creating a permanent record of the email's origin and integrity.
The recipient's email client can then access the blockchain to verify the authenticity and
integrity of the received email. By comparing the email content with the hash stored in the
blockchain, the recipient can determine whether the email has been tampered with during
transit. The blockchain also provides a transparent and auditable trail of email transactions,
enabling the detection and investigation of any unauthorised modifications or spoofing
attempts.
While the BlockMail framework demonstrates the potential of blockchain technology in email
security, it is essential to acknowledge the challenges and limitations associated with its
implementation. One significant challenge is the scalability and performance of blockchain-
based systems. Given the vast volume of daily email traffic, the computational overhead
required to process and store every email transaction on a blockchain could be prohibitive
[22].
The Internet Engineering Task Force (IETF), the primary standardisation body for Internet
protocols, has been exploring the potential of blockchain technology in various applications,
including email security. The IETF's "Blockchain-based Authentication for Email" working
group [24] is actively developing standards and guidelines for integrating blockchain into
email authentication protocols, such as DMARC and DKIM. These standardisation efforts aim
to ensure interoperability, scalability, and backward compatibility with existing email systems.
In addition to blockchain, artificial intelligence (AI) and machine learning (ML) technologies
also show immense promise in revolutionising email security. By leveraging the power of AI
and ML algorithms, we can develop intelligent systems that can analyse vast amounts of email
data, identify patterns and anomalies, and adapt to evolving threats in real time.
11 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
One area where AI and ML are particularly effective is in detecting and preventing advanced
email-based threats, such as spear phishing, business email compromise (BEC), and zero-day
exploits. Traditional rule-based and signature-based security solutions often need help
keeping pace with the sophistication and diversity of these threats, leading to high false-
positive rates and missed attacks.
AI-powered email security solutions, on the other hand, can learn from large datasets of email
communications, building dynamic models of normal and abnormal behaviour. These models
can capture subtle patterns and indicators of compromise, such as unusual sender-recipient
relationships, atypical language patterns, or suspicious file attachments. By continuously
learning and adapting to new data, AI-based systems can detect novel and targeted threats
that evade traditional security controls.
One example of an AI-driven email security platform is Agari's "Agari Phishing Defense" [25].
This solution uses advanced machine learning algorithms to analyse multiple attributes of
incoming emails, including sender reputation, content analysis, and behavioural biometrics.
By building a comprehensive risk profile for each email, Agari can accurately identify and
block highly targeted spear-phishing attempts, even those that have never been seen before.
Another area where AI and ML are showing promise is in the automated analysis and triage
of email-based incidents. When a suspicious email is detected or reported, security teams
often face the challenge of quickly investigating and responding to the incident while dealing
with a high volume of alerts and limited resources. AI-powered incident response platforms
can streamline this process by automatically collecting and correlating relevant data from
multiple sources, such as email logs, network traffic, and endpoint sensors.
By applying machine learning algorithms to this data, AI-based incident response systems
can prioritise alerts based on their criticality and potential impact, reducing the workload on
security analysts. These systems can also provide contextual insights and recommendations
for remediation actions, enabling faster and more effective incident resolution.
One example of an AI-driven incident response platform is IBM's "QRadar Advisor with
Watson" [26]. This solution combines the power of IBM's QRadar SIEM (Security Information
and Event Management) with the cognitive capabilities of IBM Watson, an AI system trained
on vast amounts of cybersecurity data. When an email-based incident is detected, QRadar
Advisor with Watson can automatically gather and analyse relevant data from across the
organisation's security infrastructure, providing analysts with a comprehensive view of the
threat and suggested response actions.
While AI and ML technologies offer significant advantages for email security, it is essential to
recognise their limitations and potential risks. One challenge is the "black box" nature of many
AI algorithms, particularly models, which can make it difficult to understand and explain their
decision-making processes. This lack of transparency can hinder the ability to audit and
validate the effectiveness of AI-based security solutions, leading to potential biases or errors.
12 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
To address this challenge, researchers are working on developing more interpretable and
explainable AI models for cybersecurity applications. Techniques such as feature importance
analysis, rule extraction, and visual analytics can help provide insights into the key factors
influencing an AI model's decisions, enabling security teams to understand better and trust
the system's recommendations [27].
Another risk associated with AI-based email security is the potential for adversarial attacks.
As AI and ML technologies become more widely adopted, attackers develop sophisticated
techniques to evade or manipulate these systems. Adversarial examples, carefully crafted
inputs designed to deceive AI models, pose a significant threat to the reliability and
robustness of AI-powered security solutions.
Researchers are exploring various defence mechanisms to mitigate the risk of adversarial
attacks, such as adversarial training, input validation, and ensemble methods. Adversarial
training involves incorporating adversarial examples into the training data of AI models,
helping them learn to recognise and resist these attacks. Input validation techniques aim to
detect and filter out malicious inputs before they reach the AI model, while ensemble methods
combine multiple models to improve overall robustness and resilience [28].
One crucial aspect of user education is teaching individuals to recognise and report phishing
attempts. Phishing, a social engineering technique that manipulates users into divulging
sensitive information or clicking on malicious links, remains one of the most prevalent and
effective methods of compromising email security. The Anti-Phishing Working Group (APWG)
reported over 1 million phishing attacks in 2021, a 28% increase from the previous year [29].
Practical phishing awareness training should include real-world simulations and hands-on
exercises that allow users to practice identifying and reporting phishing emails in a safe
environment. Studies have shown that interactive training methods, such as gamification and
simulated phishing campaigns, can significantly improve users' ability to detect and respond
to phishing attempts [30].
13 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
One notable example of gamification in phishing awareness training is the "Phishing Derby"
developed by the National Institute of Standards and Technology (NIST) [31]. This online
game presents users with a series of email scenarios, challenging them to identify phishing
emails based on cues such as suspicious sender addresses, urgent language, or mismatched
URLs. By providing immediate feedback and explanations for each scenario, the game
reinforces the key concepts and best practices for phishing detection.
Another practical approach to phishing awareness training is the use of simulated phishing
campaigns. These campaigns involve sending mock phishing emails to employees, mimicking
real-world phishing tactics and templates. By monitoring employee responses to these
simulated attacks, organisations can assess their training programs' effectiveness and
identify areas for improvement.
One case study of a successful simulated phishing campaign is that of the University of North
Carolina at Chapel Hill (UNC) [32]. In 2018, UNC launched a comprehensive phishing
awareness program that included regular simulated phishing emails, interactive training
modules, and targeted education for high-risk departments. Over the course of two years, the
university observed a significant reduction in the click rate on simulated phishing emails, from
an initial 18% to less than 5%. This improvement demonstrates the power of consistent and
engaging phishing awareness training in changing user behaviour and reducing
organisational risk.
In addition to phishing awareness, user education programs should also cover other essential
aspects of email security, such as password management, data classification, and secure file
sharing. Users should be trained to use strong, unique passwords for their email accounts and
to enable multi-factor authentication (MFA) whenever possible. MFA adds an extra layer of
security by requiring users to provide additional verification factors, such as a fingerprint or
a one-time code, in addition to their password.
Data classification training is another critical component of user education. Users should be
taught to identify and label different types of sensitive information, such as personally
identifiable information (PII), financial data, or intellectual property, and to understand the
appropriate methods for handling and sharing this information via email. This may include
encrypting sensitive attachments, limiting access to authorised recipients, and following
secure file transfer protocols.
One example of a comprehensive data classification and handling program is the "Data
Classification Toolkit" developed by the UK government's National Cyber Security Centre
(NCSC) [33]. This toolkit provides a set of guidelines, templates, and training materials to help
organisations implement a consistent and effective data classification scheme. By educating
users on the importance of data classification and providing clear instructions for handling
different types of information, organisations can reduce the risk of data breaches and
compliance violations resulting from improper email practices.
14 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
User education should also extend beyond the confines of the organisation, reaching
individuals in their personal lives. As email is a ubiquitous communication tool, the security
habits and practices that individuals develop in their personal lives can significantly impact
their behaviour in the workplace. By promoting email security awareness among the general
public, we can create a more security-conscious culture that benefits both individuals and
organisations.
One initiative that aims to raise public awareness about email security is the "Stop. Think.
Connect." campaign, a global online safety awareness program led by the National Cyber
Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG) [34]. This campaign
provides a wide range of resources, including tips, videos, and infographics, to help individuals
stay safe online and protect their personal information. By encouraging users to adopt secure
email practices, such as being cautious of unsolicited emails, verifying the identity of senders,
and avoiding clicking on suspicious links or attachments, the "Stop. Think. Connect." campaign
contributes to a more resilient and security-aware digital society.
Another potential solution is the use of "Off-Chain" transactions, where the bulk of email data
is stored and processed outside the blockchain, with only critical metadata and verification
information recorded on-chain. This approach can reduce the storage and computational
burden on the blockchain network while still leveraging its security and immutability
properties.
15 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
Another challenge in implementing AI-based email security is the potential for algorithmic
bias and fairness issues. If the training data used to develop AI models is biased or not
representative of the diverse range of email users and threat actors, the resulting models may
exhibit discriminatory or unfair behaviour. For example, an AI-based spam filter that is
trained on a dataset predominantly composed of English-language emails may need help to
accurately classify emails in other languages or from different cultural contexts.
16 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
To address these ethical concerns, organisations must develop and adhere to solid data
governance frameworks that prioritise user privacy and transparency. This includes obtaining
explicit consent from users for collecting and using their email data, providing clear and
accessible privacy policies, and implementing robust data protection measures, such as
encryption and access controls.
Furthermore, AI-based email security solutions must be developed and deployed according
to ethical principles such as fairness, accountability, and explainability. Organisations should
establish ethical review processes and oversight mechanisms to ensure their AI systems align
with societal values and do not cause unintended harm or discrimination.
From a regulatory perspective, using blockchain and AI technologies in email security must
comply with data protection and privacy laws, such as the General Data Protection Regulation
(GDPR) in the European Union and the California Consumer Privacy Act (CCPA) in the United
States. These regulations impose strict requirements for collecting, processing, and storing
personal data, including email data, and provide individuals with certain rights, such as the
right to access, correct, and delete their data.
Organisations must conduct thorough data protection impact assessments (DPIAs) when
implementing blockchain and AI technologies in email security to ensure regulatory
compliance. These assessments should identify and mitigate potential risks to user privacy
and data security and ensure that appropriate safeguards and governance mechanisms are
in place.
Organisations should also engage with regulators and policymakers to clarify the legal and
ethical implications of using blockchain and AI technologies in email security and contribute
to developing appropriate legal frameworks and guidelines. Collaborative initiatives, such as
the "Blockchain and Law Enforcement" working group established by the World Economic
Forum [40], can help bridge the gap between technology providers, law enforcement
agencies, and regulators and promote the responsible adoption of these technologies.
17 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
According to the FBI's Internet Crime Report [41], business email compromise (BEC) scams
alone caused over $1.8 billion in losses in 2021, making them one of the most costly types of
cybercrime. These losses can be attributed to various factors, such as fraudulent wire
transfers, invoice fraud, and employee impersonation. In addition to direct financial losses,
email security breaches can also result in significant legal and compliance costs, as
organisations may face regulatory investigations, lawsuits, and penalties for failing to protect
sensitive data.
To quantify the potential economic impact of email security breaches, let us consider a
hypothetical scenario involving a medium-sized enterprise with 1,000 employees. Suppose this
organisation falls victim to a targeted spear-phishing campaign that results in the
compromise of 100 employee email accounts, including those of several senior executives. The
attackers use these compromised accounts to launch a successful BEC scam, tricking the
finance department into transferring $500,000 to a fraudulent overseas account.
In addition to the direct financial loss of $500,000, the organisation must now bear the costs
of incident response and remediation, which can include hiring forensic investigators, legal
counsel, and crisis management consultants. These costs can easily reach hundreds of
thousands of dollars, depending on the complexity and duration of the investigation.
Furthermore, the organisation may face regulatory fines and legal liabilities if the
compromised email accounts contain sensitive customer data, such as personal identification
information (PII) or financial records. Under the GDPR, for example, organisations can face
fines of up to €20 million or 4% of their global annual revenue, whichever is higher, for failing
to protect personal data [42]. In the United States, the average cost of a data breach reached
$9.44 million in 2022, according to the IBM Cost of a Data Breach Report [43].
The reputational damage caused by the email security breach can also have significant
economic consequences. Customers may lose trust in the organisation's ability to protect their
data and may choose to take their business elsewhere. The loss of customer trust can translate
into reduced sales, lower market share, and decreased brand value.
In the long run, the cumulative economic impact of email security breaches can be staggering.
A study by the Ponemon Institute and IBM Security [44] found that the global average total
cost of a data breach reached $4.35 million in 2022, a 12.7% increase from the previous year.
The study also revealed that the average time to identify and contain a data breach was 287
days, highlighting the prolonged economic impact of these incidents.
18 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
For example, implementing blockchain-based email security solutions can require significant
upfront investments in infrastructure, software development, and personnel training.
Organisations may need to hire blockchain experts, developers, and security professionals to
design, implement, and maintain these solutions. The costs of developing and deploying a
blockchain-based email security system can range from hundreds of thousands to millions of
dollars, depending on the complexity and scale of the project.
Similarly, adopting AI-based email security technologies can involve substantial costs,
including data collection and annotation investments, algorithm development and training,
and hardware and software infrastructure. Organisations may also need to hire data
scientists, machine learning engineers, and cybersecurity experts to build and operate these
AI-powered systems.
For example, let us consider an organisation that is evaluating the implementation of an AI-
based email threat detection system. The upfront costs of implementing the system, including
software licenses, hardware infrastructure, and personnel training, are estimated at $500,000.
The organisation estimates that the AI-based system will reduce the risk of successful email-
based attacks by 80%, potentially saving the company $2 million in direct and indirect losses
annually.
a) Using the ROSI framework, the organisation can calculate the expected return on
investment (ROI) of the AI-based email security system as follows:
· ROI = (Annual Loss Reduction - Annual Cost of the Solution) / Annual Cost
of the Solution
· ROI = 3 or 300%
In this example, the organisation can expect a 300% return on its investment in the AI-based
email security system, indicating a strong economic justification for the adoption of this
technology.
19 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
However, it is essential to recognise that the economic benefits of investing in advanced email
security technologies go beyond direct cost savings. By adopting blockchain and AI-based
solutions, organisations can also differentiate themselves in the market and attract customers
who prioritise security and privacy. This can lead to increased market share, higher customer
loyalty, and improved brand reputation.
Furthermore, investments in email security can help organisations comply with increasingly
stringent data protection and privacy regulations, such as the GDPR and CCPA. By
demonstrating a solid commitment to data security and privacy, organisations can avoid
costly regulatory fines and legal liabilities and maintain their customers' and stakeholders'
trust and confidence.
One key aspect of this collaborative effort is the development of robust email authentication
standards and protocols. Industry stakeholders, including email service providers, software
vendors, and cybersecurity experts, must work together to establish and implement
standardised mechanisms for verifying the identity of email senders and ensuring the integrity
of email content.
DMARC is an email authentication protocol that builds upon the Sender Policy Framework
(SPF) and DomainKeys Identified Mail (DKIM) standards to provide a comprehensive email
authentication and reporting framework. By implementing DMARC, organisations can protect
their domains from being used in email spoofing attacks, monitor the email traffic associated
with their domains, and receive aggregate reports on the effectiveness of their email
authentication policies.
ARC is a standard aiming to preserve email authentication information across multiple hops
in email delivery. When an email message passes through intermediary services, such as
mailing lists or forwarding services, the original authentication information can be lost or
modified, making verifying the message's authenticity difficult. ARC addresses this issue by
allowing intermediaries to add cryptographic signatures to the email headers, creating a
verifiable chain of custody for the message.
20 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
BIMI is an emerging standard that enables organisations to display their verified brand logos
in the email clients of recipients who have configured their email providers to support BIMI.
By implementing BIMI, organisations can provide a visual indicator of the authenticity of their
email communications, helping recipients distinguish legitimate emails from phishing
attempts and other fraudulent messages.
The widespread adoption of these email authentication standards and protocols requires
collaboration and commitment from all stakeholders in the email ecosystem. Email service
providers must support and enforce these standards, while organisations must prioritise
implementing and monitoring email authentication policies. Industry associations and
standardisation bodies, such as the Internet Engineering Task Force (IETF) and the
Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), play a crucial role in
developing and adopting these standards.
For example, the U.S. National Institute of Standards and Technology (NIST) has been actively
funding research projects focused on email security, including the development of a "Trusted
Email" framework [49] that leverages blockchain technology to provide end-to-end email
authentication and integrity verification. The Trusted Email framework aims to create a
decentralised and tamper-proof email ecosystem that can resist advanced email-based
threats, such as man-in-the-middle attacks and email spoofing.
Similarly, the European Union's Horizon 2020 research and innovation program has supported
several projects to advance email security through AI and machine learning. One such project
is the "PROTECTIVE" initiative [50], which focuses on developing an AI-powered platform for
detecting and mitigating advanced email-based threats, such as spear-phishing and CEO
fraud.
These research and innovation efforts are critical to pushing the boundaries of email security
and developing new technologies and approaches that can keep pace with the evolving threat
landscape. However, it is essential to recognise that more than technological innovation is
needed to address the email security challenge. Equally important is the need for sustained
effort in promoting user education and awareness.
As the human element remains the weakest link in the email security chain, empowering
individuals with the knowledge and skills to identify and respond to email-based threats is
crucial to building a more secure email ecosystem. Organisations must prioritise
comprehensive and continuous security awareness training programs beyond simple best
practices and engage users in hands-on, interactive learning experiences.
21 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
AI-powered adaptive learning systems can further enhance the effectiveness of these
innovative training approaches. These systems can analyse user behaviour and performance
data to personalise the learning experience, delivering targeted content and feedback based
on individual strengths and weaknesses. By continuously adapting to users' learning needs,
these AI-driven training platforms can help organisations maximise the impact and efficiency
of their security awareness programs.
10. Conclusion
In conclusion, the email security landscape is a complex and ever-evolving arena that
demands a multi-faceted, collaborative, and forward-looking approach. As email continues to
serve as a critical communication tool for individuals and organisations alike, the importance
of safeguarding email communications' integrity, confidentiality, and authenticity cannot be
overstated.
Throughout this white paper, we have explored the various dimensions of the email security
challenge, from the fundamental vulnerabilities in email protocols and the limitations of
current security practices to the transformative potential of emerging technologies such as
blockchain and artificial intelligence. We have examined real-world case studies, delved into
the technical intricacies of email authentication and threat detection, and highlighted the vital
role of user education and awareness in creating a more secure email ecosystem.
The path forward in email security requires sustained effort, continuous innovation, and
unwavering collaboration among all stakeholders. Governments, industry associations,
academic institutions, and technology providers must work together to drive the development
and adoption of robust email security standards, protocols, and best practices. Researchers
and innovators must push the boundaries of what is possible, exploring new technologies and
approaches that can anticipate and mitigate the ever-evolving email-based threats.
At the same time, organisations must prioritise investments in advanced email security
technologies, such as those based on blockchain and AI, while also dedicating resources to
comprehensive and engaging user education programs. These investments' economic and
business considerations are complex and multifaceted, requiring careful cost-benefit analyses
and a long-term, strategic perspective on cybersecurity.
22 of 23
Email Exposed:The Startling Reality of How Easily Your Messages Can Be Compromised
As we look to the future of email security, it is clear that there is no silver bullet solution.
Instead, the key to building a more secure and resilient email ecosystem lies in our collective
commitment to collaboration, innovation, and education. We must be willing to challenge
conventional wisdom, embrace new paradigms, and adapt to the ever-changing threat
landscape.
The stakes could not be higher. As email continues to serve as a vital lifeline for
communication, commerce, and social interaction, the consequences of email insecurity can
be devastating, ranging from financial losses and reputational damage to the erosion of trust
in the digital world. Our shared responsibility is to rise to this challenge, marshal our collective
expertise and resources, and build a future where individuals and organisations can
confidently communicate, knowing their emails are secure, private, and authentic.
In the end, the path to email security is a journey, not a destination - much like Dorothy's epic
trek through the land of Oz. It is a journey that requires brains, heart, courage, and the power
of protocols like DNSSEC to protect the integrity of the path itself. By embracing these
principles and working collaboratively to implement robust email authentication measures,
we can create a more trustworthy and resilient email landscape for all.
Just as Dorothy's success hinged on the collective support of her companions - the Scarecrow
(SPF), the Tin Man (DKIM), the Cowardly Lion (DMARC), and the protective magic of the Yellow
Brick Road (DNSSEC) - our journey towards email security relies on the unified efforts of
technology providers, organisations, and individuals. The challenges we face may change, but
our determination to enhance authentication and thwart deception must be unwavering, just
as Dorothy persisted despite the obstacles along her path.
Moreover, Dorothy's journey underscores a critical lesson: the importance of authenticity and
honesty in our digital communications. Just as the Wizard was ultimately unmasked, revealing
his true nature, email communications that lack proper authentication are vulnerable to
impersonation and manipulation. By prioritising SPF, DKIM, DMARC, and DNSSEC, we strip
away illusions and ensure emails are genuinely sourced and unaltered - worthy of trust.
So, let us forge ahead on this journey, drawing inspiration from Dorothy's adventure, courage,
and commitment to the truth. As we progress, strengthened by our shared purpose and
collective wisdom, we create a more secure digital world—one message at a time—where the
integrity of our communications is as precious as the truth itself.
23 of 23