
Email isn’t just a communication tool anymore. It is the “Universal Identity Provider” for your entire company. If an attacker controls your inbox, they can reset the password for your bank, your CRM, and your cloud infrastructure.
Building secure email for business isn’t about buying the most expensive enterprise suite; it’s about architecture. Whether you are a founder setting up your first domain or an MSP managing five hundred, the failure modes are identical. You are either secure by design, or you are leaking data.
This guide ignores the marketing buzzwords. We aren’t talking about “AI-driven threat heuristics.” We are talking about the boring, structural settings that — if ignored — will cause you to lose your domain reputation or your data.
How You Actually Get Hacked

Forget “Advanced Persistent Threats” from nation-states. Unless you are building guided missiles, nobody is burning a zero-day exploit on you. You will be compromised by low-effort, high-volume automated attacks.
Here are the three risks that account for 90% of SMB incidents:
- Credential Stuffing & Takeover: Attackers buy a database of leaked passwords from a random forum (e.g., LinkedIn 2012 leak). They run a script to try those email/password combos against your mail server. If you don’t have MFA, they are in.
- Forwarding Abuse (The “Silent Exfiltration”): Once an attacker gets in, they don’t announce it. They set up a hidden rule: “If email contains ‘invoice’ or ‘wire’, forward a copy to attacker@gmail.com and mark as read.” They watch your cash flow for months before striking.
- Spoofing (Identity Theft): Someone sends an email to your accountant from ceo@yourcompany.com. It looks real. It asks for an urgent wire transfer. If you haven’t configured your DNS correctly, your mail server will happily confirm the fake email is legitimate.
Account Security Baseline
This is your perimeter. If this fails, nothing else matters.
1. Phishing-Resistant MFA
Passwords are dead. You must enforce Multi-Factor Authentication (MFA) on every account.
- The Standard: Use an Authenticator App (Google/Microsoft Authenticator) or hardware keys (YubiKey).
- The Trap: SMS 2FA is better than nothing, but it is vulnerable to “SIM Swapping.” Avoid it if possible.
- The TrekMail Way: We give you the option to enable 2FA for all admin accounts.
2. Kill “Legacy Auth” Immediately
This is the single biggest security hole in 2026.
“Legacy Authentication” refers to old protocols (POP3, IMAP, SMTP AUTH) that do not support MFA. Even if you turn on 2FA, a hacker can bypass it by connecting via an old protocol that simply asks for a username and password.
- Action: Block legacy authentication at the tenant level.
- Exception: If you have a legacy printer or scanner that needs to email scans, isolate it. Create a dedicated account only for that device, with a complex, rotated password. Do not let your CEO’s main account have legacy protocols enabled.
3. No Shared Passwords
“info@company.com” is often shared by three people. They text the password to each other. One person leaves, and you forget to change it.
- The Fix: Use “Delegated Access” or “Shared Mailboxes” where users log in with their own credentials to access the shared folder.
- TrekMail Context: Because we use a flat-rate model, you don’t pay extra for users. Give everyone their own account. Stop sharing credentials to save $6/month.
Admin & Access Control Baseline
Who holds the keys to the kingdom?
The “Break-Glass” Account
If your primary identity provider goes down, or your cell phone falls in the ocean, you need a way back in.
- Create: One cloud-only admin account (e.g., admin-recovery@yourdomain.com).
- Secure: Give it a 30-character random password. Write it down on paper. Put that paper in a physical safe.
- Monitor: Set up an alert so that if this account ever logs in, every other admin gets a text message.
Separation of Duties
Your daily driver account (steve@company.com) should not be a Global Admin. If you click a phishing link while logged in as a Super Admin, the attacker owns the company.
- Protocol: Create a separate admin@ account. Only log into it when you need to change settings. Browse the web as a standard user.
Mail Authenticity Baseline
This is the technical plumbing that stops people from impersonating you. In 2026, Google and Yahoo will block your emails if you don’t have this set up.
1. SPF (The Guest List)
Sender Policy Framework is a DNS TXT record that lists the IP addresses allowed to send email for your domain.
- The Mechanism: v=spf1 include:_spf.trekmail.net -all
- The Gotcha: You are limited to 10 DNS lookups. If you include Google, Mailchimp, Salesforce, and Zendesk, you will break SPF. Use an SPF flattening tool if you have too many vendors.
- Hard Fail: Always use -all (Hard Fail) instead of ~all (Soft Fail) once you are confident in your list. ~all tells hackers, “I’m not sure who sends my email, so just let it through.”
2. DKIM
DomainKeys Identified Mail adds a digital signature to every email header. It proves the email hasn’t been tampered with in transit.
- Implementation: You publish a public key in your DNS. Your mail server (TrekMail) holds the private key and signs every outgoing message.
- Why it matters: Forwarding breaks SPF (because the IP changes), but DKIM survives forwarding. You need both.
3. DMARC
Domain-based Message Authentication, Reporting, and Conformance tells the receiver what to do if SPF or DKIM fails.
- Phase 1 (Monitoring): v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com
- This tells the world: “Tell me who is sending as me, but don’t block them yet.”
- Phase 2 (Enforcement): Once you verify only legitimate sources are sending, switch to p=quarantine or p=reject.
- Warning: If you set p=reject without auditing your sources, you will block your own invoices and marketing emails. Move slowly.
Forwarding & Catch-All Safety Notes
The Catch-All Trap
A “Catch-All” address accepts email sent to anything@yourdomain.com.
- The Risk: Spammers love this. They will hammer your domain with dictionary attacks. If you reply to a spam trap, your domain gets blacklisted.
- Advice: Disable Catch-All unless you have a specific business requirement. If you must use it, monitor it daily.
Block Automatic External Forwarding
As mentioned in the Threat Model, attackers use forwarding rules to steal data.
- The Fix: Configure your mail server to block automatic forwarding to external domains.
- Why: There is almost no legitimate business reason for an employee to auto-forward all their corporate email to a personal Gmail account. It is a massive data leak risk.
A Simple “Security Done” Checklist
If you can check these 12 boxes, you are more secure than 95% of the Fortune 500.
- MFA Enforced: On all users, no exceptions.
- Legacy Auth Blocked: POP3/IMAP disabled for general users.
- Dedicated Admin: You do not browse the web as a Global Admin.
- Break-Glass Account: Created and credentials locked in a physical safe.
- SPF Valid: Record exists, ends in -all, and has <10 lookups.
- DKIM Active: Keys rotated annually (or managed by your host).
- DMARC Policy: At least p=none, moving toward p=reject.
- Forwarding Blocked: Auto-forwarding to external domains disabled.
- Catch-All Disabled: Or strictly filtered.
- Alerts Configured: You get notified of suspicious logins.
- Offboarding Protocol: You have a written list of steps to take when someone is fired (Reset password -> Revoke sessions -> Wipe device).
- Vendor Review: You know exactly which 3rd party tools (CRM, Billing) are sending as your domain.
The “Per-User” Tax vs. Security
Here is the dirty secret of the industry: Per-user pricing makes you less secure.
When a provider charges $6 to $30 per user, businesses start cutting corners. They share the info@ password among three interns. They don’t create accounts for contractors. They leave ex-employees active because they don’t want to migrate the data.
Secure email for business requires isolation. Every human needs their own identity.
This is why TrekMail uses a flat-rate model. Whether you have 5 users or 500, you pay for the storage pool, not the seat count. This allows you to give every employee, contractor, and service bot their own secure, isolated credentials without blowing up your budget.
For a deeper dive on how to structure your email for growth, read our guide on Business Email for Small Business: What It Is, Why It Matters, and How to Choose a Provider (2026).
Security isn’t about buying a magic tool. It’s about setting the baseline correctly and sticking to it. Configure your DNS, enforce your MFA, and stop sharing passwords.
Comments
Post a Comment