Most IT leaders already know email is the primary attack vector. You see it every day through phishing attempts, spoofed domains, and impersonated vendors that slip past filters. 

What’s changing is not just the frequency of attacks but the sophistication behind them. Threat actors are eroding trust by mimicking executives, exploiting gaps in authentication, and manipulating the signals users rely on to determine legitimacy. 

 

How Email-Based Threats Are Evolving Beyond Filters

 

The scale of the impact is measurable: 

  • 91% of cyberattacks begin with email (Verizon DBIR). 
  • $2.9B in BEC-related losses were reported in 2023 alone (FBI IC3). 

Filtering isn’t enough. Trust is the new battleground. 

For a deeper dive into this shift, listen to Part 1 of our podcast series on email security where we unpack how attackers are undermining trust and what IT leaders can do about it. 

 Listen to the episode

 

 

Microsoft’s Integrated Defense: Defender for Office 365 

 

For organizations on Microsoft 365, Defender for Office 365 is the baseline control. It isn’t just anti-spam; it’s tenant-level protection that integrates with Microsoft’s broader security ecosystem. 

 

Plan 1 (included in Microsoft 365 Business Premium): 

    • Anti-phishing, malware, and spam protection 
    • Safe Links and Safe Attachments with real-time scanning 
    • Coverage across Outlook, SharePoint, OneDrive, and Teams 

Plan 2 (included in Microsoft 365 E5 or E5 Security add-on): 

    • Advanced reporting and threat intelligence 
    • Automated investigation and response 
    • Attack simulation and user training 
    • Enhanced business email compromise protection 

Signals across identity, endpoints, and apps converge. Even if a phishing email gets through Outlook, related activity in other parts of the Microsoft ecosystem can still trigger containment.

 

Authentication Is No Longer Optional 

 

Microsoft, Google, and Yahoo now require SPF, DKIM, and DMARC for bulk senders. This is not theoretical. Misconfigured or missing records will block legitimate business email.

  • SPF: Defines which mail servers are authorized to send. 
  • DKIM: Cryptographically signs messages to prove integrity. 
  • DMARC: Directs receivers on how to handle failed checks. 

By 2026, Gartner projects 90% of organizations will enforce DMARC, up from just 20% in 2023. 

 

Key Areas of Focus for Strengthening Email Defenses

 

  • Audit domain authentication with MXToolbox or DMARC Analyzer. 
  • Validate Microsoft licensing so you know what Defender features you already own. 
  • Layer defenses by combining Microsoft’s native stack with API-based third-party tools that extend protection without breaking authentication.
     

Explore What’s Next with Sourcepass MCOE’s Email Security Series

 

Email security is no longer just about filtering threats. It’s about restoring trust. As attackers evolve, defenses must evolve too. The Sourcepass Center of Excellence for Microsoft helps IT teams strengthen their Microsoft ecosystem with strategic guidance, authentication best practices, and layered protection that scales.

Whether you're auditing your domain setup or evaluating Defender capabilities, now is the time to take a closer look at how trust is built and maintained across your email infrastructure.

In Part 2, we’ll examine how attackers are using AI to scale phishing campaigns and how Microsoft is responding with its own machine learning. Parts 3 and 4 will explore advanced authentication methods like MTA-STS and BIMI, and how to align email security with a Microsoft-powered defense-in-depth strategy.

 

Get in touch with Sourcepass MCOE experts

 

Microsoft Licensing: Teams Unbundling Expands Collaboration Options

5 min read

Microsoft Licensing: Teams Unbundling Expands Collaboration Options

Microsoft has announced a major change to its licensing strategy. Starting November 1, 2025, organizations worldwide can purchase Microsoft 365 and...

Read More
Entra ID Authentication Migration: Steps to Secure your Environment

5 min read

Entra ID Authentication Migration: Steps to Secure your Environment

On September 30, 2025, Microsoft will retire legacy multi-factor authentication (MFA) and self-service password reset (SSPR) policies in Entra ID...

Read More
Microsoft Licensing Update: New Defender Suite for Business Premium

5 min read

Microsoft Licensing Update: New Defender Suite for Business Premium

Small and midsize businesses are increasingly targeted by sophisticated cyber threats, yet many advanced security solutions have historically been...

Read More
How to Keep Children Safe Online in a Changing Threat Landscape

How to Keep Children Safe Online in a Changing Threat Landscape

The most effective way to protect children online is to combine layered technical controls with ongoing, honest conversations about digital risks....

Read More
How to Build Digital Resilience and Safety for Families

How to Build Digital Resilience and Safety for Families

Digital safety requires a layered approach that combines intentional habits, clear boundaries, and ongoing education. Protecting children and...

Read More
Securing Email Delivery in Microsoft 365 with MTA-STS and DNSSEC

Securing Email Delivery in Microsoft 365 with MTA-STS and DNSSEC

Microsoft’s new email security standards (MTA-STS, TLS-RPT, DANE, and DNSSEC) are redefining how organizations protect email in transit. These...

Read More