Modern Email Security: Why a Layered, Identity-First
Approach Is Critical.
In today’s digital business landscape, email remains the
most common vulnerability for cybersecurity threats, despite all the email
filtering, threat protection, and other defensive measures that are on the
market.
Why? Because attacks don’t just attack passwords and
firewalls, they go after users and identities.
While email providers like Microsoft 365 provide robust
security options natively, compared to other popular
competitors, the protection your business is getting right out of the box still
may not be reaching its full potential without the proper configuration or
management. Even with proper configuration, threats today are constantly
evolving and can still slip through the cracks of even the most air-tight email
security systems.
Let’s take a deeper dive at what email security looks like.
The Modern Email Threat Landscape
Today’s email threats are very sophisticated and try to
exploit individuals’ susceptibility to attacks through several different
vectors. Below are some of the most common methods of email compromise.
- Phishing
& spear phishing targeting specific employees
- Business
Email Compromise (BEC) using impersonation and social engineering
- Account
takeover (ATO) through stolen credentials
- MFA
fatigue attacks where users are spammed with push requests
- AI-generated
phishing emails that bypass traditional filters
People typically think about malware as the main way systems
and computers get compromised by hackers, as data becomes increasingly
centralized through cloud-based systems gaining access to a user’s account with
their credentials can give them the ability to
- Redirect
invoices
- Download
or delete sensitive data
- Move
laterally through the environment
- Deploy
ransomware
This is why having one or only a few defensive measures is
no longer enough in today’s cyber-threat landscape.
Layer 1: Microsoft Defender for Office 365
Microsoft Defender is the premier, native email filtering
system trusted by businesses around the world as the first line of defense for
email-based attacks.
What It Does
- Safe
Links: Scans and rewrites URLs in real time
- Safe
Attachments: Scans attachments before delivery.
- Anti-phishing
policies: Detect impersonation attempts and blocks/quarantines emails
for review.
- Impersonation
protection: Protects users from ”send from” addresses impersonating
internal employees and executives.
Why It Matters
Most traditional email filtration systems out there rely on
outdated or static threat definitions, but Microsoft Defender dynamically scans
threats with advanced filtration parameters.
While having Defender licenses on all accounts is better
than none, there is an ample amount of advanced configuration of its policies
that make it even more effective for filtering out threats without blocking or
quarantining the emails you actually need to receive. That’s why partnering
with experts like Lean On Me I.T. to configure and deploy tools like Defender
is also a crucial piece of your company’s email security arsenal.
Layer 2: Multi-Factor Authentication (MFA)
If you haven’t seen the dozens of data breaches and
compromises that are covered on the news every year, you can confidently assume
that every password you have ever used has been compromised, regardless of how
complicated it is. This makes an extra layer of security like MFA critical to
keeping your account secure.
Attackers use
- Credential
stuffing
- Phishing
kits
- Password
spraying
- Data
breach dumps
Multi-Factor Authentication (MFA) blocks over 99% of
automated password attacks, but it also requires proper configuration and
management to be effective. Utilizing MFA methods like authenticators has
become a much more secure way to protect your email accounts compared to legacy
2FA methods like text and email codes.
Layer 3: Sign-In Risk & User Risk (Identity
Protection)
In today’s threat landscape, it should be assumed that
credentials will be stolen or compromised at some point. The question is: what
happens next?
Microsoft Entra ID (formerly Azure AD) includes risk-based
detection capabilities that can intelligently prevent signs based on risk
markers flagged by common indicators of account compromise.
Sign-In Risk
Detects suspicious login attempts such as:
- Impossible
travel (logins from two countries within minutes)
- Anonymous
IP addresses
- Malware-linked
infrastructure
- Tor
network usage
User Risk
Detects compromised accounts based on:
- Leaked
credentials
- Suspicious
behavior patterns
- Other
known attack techniques
Why This Is Critical
If credentials are stolen, risk policies can:
- Force
password resets
- Require
reauthentication
- Block
access entirely
Risk policies like these can be the difference that stops an
attacker from infiltrating a user’s account with compromised credentials by
intelligently recognizing common risk factors. Similar to Defender policies,
configuration and maintenance of effective Entra policies by professionals is
critical to ensure your business users are protected 24/7.
Layer 4: ITDR (Identity Threat Detection & Response)
Even with the most comprehensive threat protection policies
like those mentioned above, bad actors continue to find ways to successfully
circumvent system defenses. One of the most effective companion services we
deploy in tandem with Microsoft’s Defender and Entra systems is called ITDR.
Identity Threat Detection & Response (ITDR) focuses on monitoring and protecting the identity layer itself.
What Is ITDR?
- Continuous
monitoring of identity abuse
- Detection
of privilege escalation
- Protection
of admin accounts
- Integration
with SOC/SIEM tools
In the Microsoft ecosystem, ITDR capabilities integrate
across:
- Microsoft
Defender for Office 365
- Microsoft
Defender for Endpoint
- Microsoft
Sentinel
Why It Matters
Once an attacker compromises email, they are often:
- Add
inbox rules
- Grant
OAuth app permissions
- Elevate
privileges
- Target
finance or executive accounts
At Lean On Me I.T., we utilize Huntress’ ITDR system and have
before the user accounts could be infiltrated. While adding another layer of
protection like ITDR may seem overkill, we continue to see day after day how
the sophistication and sheer number of attacks facing our clients makes a
multi-layered approach like this critical to full account security.
Layer 5: Security Awareness Training
Building a comprehensive defense on the software side is
critical, but sometimes the best defense is a great offense. Equipping your
employees through training to be able to identify threats even further
decreases the effectiveness of the most common attack vectors used today.
Attackers exploit:
- Urgency
- Authority
- Fear
- Financial
pressure
Even the best technical controls can’t stop a user who
willingly shares credentials.
Effective Security Awareness Programs Include:
- Ongoing
phishing simulations
- Short,
engaging micro-learning sessions
- Targeted
retraining for high-risk users
- Easy
phishing reporting mechanisms
- Executive-specific
training
An investment in ongoing threat awareness training is one of
the best ways to amplify the effectiveness of your email and identity
protection systems. We actively deploy Security Awareness Training for many
clients with Huntress to make sure they are prepared for any sort of threat
they may face in the real world.
A Layered Defense Strategy
One of the biggest reasons a layered approach is effective
is because many layers reinforce and build upon one another.
- Defender
blocks malicious emails
- MFA
prevents stolen credentials from being used
- Risk
policies detect suspicious logins
- ITDR
monitors identity abuse
- Training
reduces human error
No single layer is inherently more effective than the other,
but when deployed together, they give a company the best chance to be fully
protected on many fronts.
Common Gaps We See in Small & Mid-Sized Businesses
Even though organizations believe they have sufficient
protection, there are a few major gaps we see quite often:
- MFA is
enabled but isn’t enforced everywhere
- No
Conditional Access policies are configured
- Impersonation
protection not configured
- Risk
policies disabled or limited.
- Alerts
not monitored by professionals
- Limited
or outdated security training
- Legacy
authentication still allowed
These are just a few of the gaps exploited by hackers to
gain access to company systems.
What a Managed Email Security Approach Looks Like
In a perfect world, we think all companies should invest time
and resources to implement all the steps above. While we know this may not be
feasible, discussing your needs and business situation with experts like Lean
On Me I.T. is the first step to making sure that your systems are meeting their
full potential to keep your business and livelihood as safe and secure as
possible.