Skip to main content

Quick Links

  • Share your knowledge
  • Jobs & RFP's
  • Log in
Legal Services National Technology Assistance Project
  • Forum
  • Events
  • Topics

    Topics

    Go to Topics Overview
    • Client Facing
      • Artificial Intelligence (AI)
      • Diversity, Equity, & Inclusion (DEI)
      • Social Media
      • UX / Design
      • Accessibility
      • Websites
      • Call Centers
      • Self Representative Litigation
    • Organization
      • Tech Initiative Grant (TIG)
      • Project Management
      • Tech Policies
      • Training
      • Data & Evaluation
      • Remote Work
      • Security
      • Disasters
  • Tools & Resources

    Tools & Resources

    Go to Tools & Resources Overview
    • DATA Analysis Tool for All
      • Data Overview
      • Data Resources
      • DATA Origins
      • DATA FAQ
      • Analysis Guide
      • Tips & Recommendations
      • Location Quotient
      • Partnerships
      • Give Feedback
    • Other Resources
      • Toolkits
      • Articles
      • AI & Legal Information Database
      • Legal Aid Tech Stack
      • Consumer Self-Help Solutions
  • Tech Assistance

    Tech Assistance

    Go to Tech Assistance Overview
    • Tech Assistance Program
    • Legal Aid Tech Vendors & Service Providers
  • About

    About

    Go to About Overview
    • News
  • Share your Knowledge
  • Jobs & RFPs
Search

Breadcrumb

  1. Home
  2. Tools & Resources
  3. Toolkits
  4. 4.4. Security Toolkit: Email Security

2022 Legal Aid Security Toolkit

yellow, green, and blue angled lines

Explore This Toolkit

4.4. Security Toolkit: Email Security

Last Updated: 2/17/25

Download Toolkit
Facebook
X

What Everyone Needs to Know


Developing an approach to email security typically involves multiple procedures and techniques for protecting email accounts, content, and communication against unauthorized access, loss, or compromise. Email can be used to infect a device with malware, spread spam, and target users with phishing attacks.

Attackers use deceptive messages (e.g., emails that look like they’re from a reputable source like Microsoft). They use these deceptive emails to entice recipients to part with sensitive information (e.g. to share account passwords), to open attachments (which might install hidden software on the user’s computer), or click on hyperlinks (which will also install malware on the victim’s device). Email is also a common way for attackers to gain access to a network and obtain valuable company data, often using “social engineering” (e.g., pretending to be an official representative from a company to get passwords, information about security, etc.).


What IT Needs to Know


While basic spam and antivirus email protection are useful in reducing email threats, standard email filtering is no longer sufficient. A dedicated advanced email security tool will offer improved spam and phishing protection, compared to the basic protection included by default with most email services. When looking at options for email security, look for solutions that can:

  • Control device access
     
  • Identify suspicious user behavior
     
  • Improve spam and phishing protection
     
  • Maintain communication confidentiality
     
  • Protect against zero-day threats
     
  • Provide real-time threat protection
     
  • Stop ransomware attacks and other threats


As with many other technologies, the price for email security tools can vary greatly depending on how you contract and purchase the different services. As usual, consider services that integrate with your existing technology infrastructure and strategy to reduce setup time and cost.


Solutions to Consider

  • IronScales: Website, Pricing
     
  • Proofpoint: Website, Pricing
     
  • MS Defender: Website, Pricing
     
  • Mimecast: Website, Pricing


Resources


“The Transformation of Email Security” (Forbes)
“What is Email Security? Definition, Benefits, Examples & Best Practices” (Toolbox)

Contents

Toolkit chapter traversal links for 4.4. Security Toolkit: Email Security

  • Previous
    4.3. Security Toolkit: Backups and Securing Backups
  • Next
    4.5. Security Toolkit: Data Sharing
Join the Community! It's your best resource to get the answers you need.
Sign up today
dark purple dots
Legal Services National Technology Assistance Project

Key Resources

  • Browse by Topic
  • Tech Assistance
  • Tools & Resources
  • Log in

Get Involved

  • Share Your Knowledge
  • Events
  • Give us Feedback

Connect with us

Like on Facebook
Follow on Twitter
Subscribe on YouTube
Legal Services National Technology Assistance Project can leverage technology for better client service with LSNTAP's training, resources, and online community. Empowering them to serve their communities more effectively.

Our Partners

Logo for Michigan Advocacy Program white logo for Legal Services Corporation