The New Reality of Business Email
Picture this. It is a Tuesday morning and your marketing manager is sitting in a coffee shop in Manchester, drafting a campaign brief on her laptop. Your accountant is at home in Bristol, reviewing client invoices over breakfast. A sales rep is between meetings in London, checking his inbox on a personal phone while waiting for a train. Meanwhile, your office manager is at the main office, fielding emails from all three of them.
This is not an unusual scenario. This is how the majority of UK businesses now operate. According to the Office for National Statistics, around 40% of UK workers spent at least part of their working week at home in 2025, and that figure has remained stubbornly high ever since the pandemic permanently reshaped working habits. For small and medium-sized businesses, hybrid and fully remote arrangements have become the default rather than the exception.
And here is the problem that nobody talks about at the weekly team meeting: every single device your staff use, and every single network they connect to, is a potential doorway into your business email. When everyone worked from the same office, on the same network, using company-owned computers, security was relatively straightforward. The office had a router with a password. The computers were set up by someone who knew what they were doing. The door was locked at night.
Remote work changes everything. Your business email — containing client details, financial information, contracts, and confidential correspondence — is now scattered across home broadband connections, coffee shop Wi-Fi, personal phones, family laptops, and hotel networks. Most of these environments are ones your business does not control, cannot inspect, and has no visibility over.
For larger organisations with dedicated IT departments, managing this complexity is part of the job. But most UK small businesses do not have an IT department. They do not have a cybersecurity officer. They do not have device management policies or network monitoring tools. They have a business owner who wears fifteen hats and an inbox that needs protecting.
This guide is written for that business owner. It explains — in straightforward, practical language — what the real threats are, what you can do about them, and how to choose an email provider that makes remote work security something that happens automatically rather than something you have to think about every day.
Why Remote Work Changes the Security Picture
To understand why remote work creates security challenges, it helps to think about the difference between a physical office and a distributed team. In a traditional office, your business data exists within a defined perimeter. The office has walls, a door with a lock, and a network that only authorised people can access. Security is, in a sense, physical. You can see who is in the building, you control the equipment, and you know the network is yours.
Remote work dissolves that perimeter entirely. Instead of one controlled location, your business email is now accessed from dozens of uncontrolled locations. Consider what that means in practice:
- Home Wi-Fi networks — Most home broadband routers are set up once and never updated. Many still use the default password printed on a sticker on the bottom of the router. Your employee's home network is shared with family members, gaming consoles, smart televisions, and connected doorbells — all of which are potential weak points.
- Public networks — Coffee shops, hotels, co-working spaces, airports, and trains all offer Wi-Fi. These networks are shared with strangers. Some are poorly secured. Some are not secured at all. And some are not even real — criminals can set up fake Wi-Fi networks that look identical to legitimate ones.
- Personal devices — When an employee checks business email on a personal phone or family laptop, your business data sits alongside personal apps, games their children have installed, and websites that may not be entirely trustworthy. You have no control over what else is on that device.
- Blurred boundaries — Remote workers frequently switch between personal and business tasks on the same device. They check personal email, browse social media, shop online, and then switch to their business inbox. Each of those activities carries its own risks, and they all happen on the same machine that holds your business data.
- No oversight — In an office, if something unusual happens — a strange email, a suspicious pop-up, a computer behaving oddly — there is usually someone nearby to ask. At home or in a coffee shop, the employee is on their own. Problems go unreported for longer, and small mistakes escalate more quickly.
None of this means that remote work is inherently dangerous. It simply means that the security measures which worked in an office environment — a locked door and a company network — are no longer sufficient. You need different measures. The good news is that the right measures are surprisingly simple, surprisingly effective, and surprisingly affordable.
The UK Government's Cyber Security Breaches Survey 2025 found that 32% of UK businesses identified a cyber security breach or attack in the previous twelve months. Among medium-sized businesses the figure was 59%. Email was the most common attack vector, with phishing being the single most frequent type of attack. Remote and hybrid working patterns were cited as a contributing factor in a significant proportion of incidents.
The Threats Your Team Faces Every Day
Before we get to solutions, let us be specific about what you are protecting against. These are not theoretical risks or far-fetched scenarios. They are the everyday threats that affect real UK businesses, every week, across every industry.
Public Wi-Fi Snooping
When your employee connects to a coffee shop Wi-Fi network, they share that network with everyone else in the building. If the email connection is not encrypted — that is, if data is not scrambled into an unreadable form while it travels between the device and the email server — then someone else on the same network can potentially intercept it. Think of it like sending a postcard through a shared postbox: anyone who handles it can read what is written on the front.
The good news is that modern email providers encrypt these connections by default, turning that postcard into a sealed, tamper-proof envelope. But not all providers do this, and not all enforce it. Some providers allow unencrypted connections as a fallback, which means a determined attacker can sometimes trick a device into using the unprotected route.
Lost or Stolen Devices
A phone left in a taxi. A laptop forgotten on a train. A tablet stolen from a car. These things happen far more often than most business owners realise — the Metropolitan Police alone records thousands of phone thefts every month in London. If that device has business email on it and no security lock, whoever picks it up has immediate, complete access to every email, every contact, every calendar entry, and every attachment. They can read confidential client information, download financial documents, and even send emails pretending to be your employee.
Even with a screen lock, a lost device remains a risk if it cannot be wiped remotely. The screen lock buys you time, but it does not remove the data. What you need is the ability to erase all business information from the device the moment you learn it has gone missing.
Weak Passwords
When people are typing on a small phone screen, convenience wins over security almost every time. Passwords become shorter, simpler, and more predictable. "Password123" and "Company2026" are far more common than anyone would like to admit. And because people find it difficult to remember multiple different passwords, they reuse the same password across personal and business accounts. This means that if a personal account is breached — a shopping site, a social media platform, a forum — the attacker may now have the password to the business email account as well.
Weak passwords are the single most exploited vulnerability in business email. They are also the easiest to fix, as we will see shortly.
Phishing on Mobile Devices
Phishing — the practice of sending fake emails designed to trick people into revealing passwords or clicking dangerous links — is considerably more effective on mobile devices than on desktop computers. The reason is simple: smaller screens show less information. On a desktop computer, you can hover over a link to see where it actually leads before clicking. On a phone, there is no hover. Email addresses are often truncated, so you might see "accounts@your..." without seeing the full address that would reveal it is fake. The interface encourages quick tapping rather than careful inspection.
Remote workers checking email on their phones between meetings are exactly the audience that phishing attacks are designed to exploit: distracted, hurried, and working on a small screen.
Compromised Personal Devices
When business email runs on a personal device, it shares that device with everything else the owner — and their family — does on it. If a teenager installs a game from an untrustworthy source, or a family member clicks a malicious link, or the device picks up malware from a compromised website, that malware now has access to everything on the device. Including your business email.
This is not a reflection on your employees' personal habits. It is simply a mathematical reality: the more purposes a device serves, the more opportunities there are for something to go wrong. A device used exclusively for work has a smaller attack surface than a device used for work, entertainment, social media, online shopping, and children's homework.
Email is the single most targeted route into UK businesses. Over 80% of reported cyber attacks begin with a phishing email. Remote and hybrid workers are disproportionately affected because they are more likely to be checking email on mobile devices, on unfamiliar networks, and without colleagues nearby to sense-check suspicious messages.
Eight Security Measures That Actually Work
The threats above sound daunting, but the defences are practical, affordable, and — crucially — do not require technical expertise to implement. Here are eight measures, ordered from most to least impactful. If you do nothing else, implement the first two. If you implement all eight, your business email security will be stronger than that of most UK companies many times your size.
1. Two-Factor Authentication (2FA)
If you take only one action after reading this article, make it this one. Two-factor authentication is the single most effective security measure available to any business, of any size, at any budget level. It is so effective that it is worth understanding exactly what it does and why it matters so much.
Normally, logging into your email requires one thing: your password. If someone steals, guesses, or intercepts your password, they are in. Two-factor authentication adds a second requirement. After entering your password, you also need to enter a short code — usually six digits — that is generated by an app on your phone. This code changes every thirty seconds. Without it, the password alone is useless.
Think of it like the front door to your home. A password is like a key — if someone copies it, they can walk in. Two-factor authentication adds a second lock that requires a different key, one that changes every thirty seconds and only exists on your phone. A thief would need to steal both your original key and your phone simultaneously, and use them within thirty seconds of each other. The odds of a remote attacker managing that are vanishingly small.
Google has stated publicly that accounts with 2FA enabled are 99% less likely to be compromised than accounts without it. That is not a marginal improvement. That is the difference between leaving your shop door open and installing a security system.
Setting up 2FA takes about two minutes per account. Your email provider should offer it — and ideally should allow you, as the business owner, to require it for all accounts, not just recommend it. If 2FA is optional, some employees will not bother. If it is enforced, everyone is protected.
epost.plus includes two-factor authentication on all business email accounts. You can enforce 2FA across your entire organisation, ensuring every team member is protected — not just the security-conscious ones. Setup takes two minutes using any standard authenticator app.
2. Strong, Unique Passwords
Two-factor authentication is your strongest defence, but it works best alongside strong passwords rather than as a substitute for them. A strong password is one that is long (at least twelve characters), unpredictable (not based on dictionary words, names, dates, or company information), and unique (not used for any other account).
The challenge, of course, is that nobody can remember dozens of long, random passwords. This is where a password manager comes in. A password manager is an app — available for phones, tablets, and computers — that generates strong passwords for you, stores them securely, and fills them in automatically when you need to log in. You only need to remember one master password: the one that unlocks the password manager itself.
Popular password managers include 1Password, Bitwarden, and Dashlane. Many offer business plans with shared vaults, so you can securely share login credentials for team accounts without sending passwords via email or writing them on sticky notes. Recommending a specific password manager to your team — and providing it as a business expense — is one of the highest-value security investments you can make.
If a password manager feels like too large a step for now, establish a minimum standard: all business email passwords must be at least twelve characters long and must not be reused from any other account. Even this simple rule eliminates the vast majority of password-based attacks.
3. Remote Wipe Capability
When a device containing business email is lost or stolen, you need the ability to erase that data remotely — without relying on the device being returned, without needing physical access, and without waiting. Remote wipe is the feature that makes this possible.
Here is how it works in practice. Your employee reports that their phone has been stolen. You (or whoever manages your email accounts) log into the email administration panel, find the employee's account, see the list of connected devices, and send a wipe command to the stolen phone. The next time that phone connects to the internet — which is usually within minutes — it receives the command and all business email, calendar entries, and contacts are erased. The data on the server is untouched. Only the copy on the device is removed.
Critically, this is a selective wipe. It removes only business data, not personal photos, apps, or messages. This is especially important when employees use their own personal devices for work. You can protect business data without destroying their personal belongings.
Remote wipe requires a technology called ActiveSync — a protocol that keeps email, calendar, and contacts synchronised between the server and the device. Most modern phones and tablets support ActiveSync natively. Your email provider needs to support it on the server side and provide an administration interface that lets you trigger wipe commands. Not all providers offer this, and it should be a non-negotiable requirement for any business with remote workers.
4. Encrypted Connections
Encryption sounds technical, but the concept is simple. When your employee's phone sends or receives email, the data travels across the internet between the device and the email server. Encryption scrambles that data so that anyone who intercepts it in transit sees nothing but gibberish. Only the device and the server can decode it.
Think of it like a conversation in a crowded room. Without encryption, you are speaking in plain English and anyone nearby can listen in. With encryption, you and your conversation partner are speaking in a code that only the two of you understand. Everyone else hears noise.
For email, encryption in transit is handled by a technology called TLS (Transport Layer Security). A good email provider enforces TLS on all connections by default — meaning the encrypted route is the only route available. Some providers offer TLS as an option but allow devices to fall back to an unencrypted connection if there is a problem. This fallback is a security weakness. Your provider should enforce encryption, not merely offer it.
The important point for business owners is this: you should not need to configure encryption yourself. It should be built into the service, enabled by default, and enforced automatically. If your provider requires you to manually enable encryption or configure certificates, that is a sign that security is an afterthought rather than a foundation.
5. Device Screen Lock
This is the simplest measure on the list, and one of the most effective. Every device that accesses business email — every phone, every tablet, every laptop — should be protected by a screen lock. A PIN, a fingerprint, face recognition, or a pattern. The method matters less than the fact that something is in place.
A screen lock serves as the first line of defence when a device is lost, stolen, or left unattended. Without it, anyone who picks up the device has immediate access to everything on it. With it, they face a barrier that buys you the time you need to activate remote wipe or change passwords.
For business purposes, require that all devices use a PIN of at least six digits or, preferably, biometric authentication (fingerprint or face). Set the screen to lock automatically after no more than two minutes of inactivity. These are simple settings that every phone and laptop offers, and they take less than a minute to configure.
6. Separate Work and Personal Email
When employees mix personal and business email on the same account or the same app, the boundaries between the two blur in ways that create real security risks. A phishing email aimed at a personal account can lead to a compromised device that also holds business data. A casual click on a link in a personal email can have business consequences.
The solution is straightforward: use a dedicated app or account for business email. On phones, this might mean using the built-in email app for business and a separate app for personal email, or vice versa. The key principle is that business email should be accessed through a clearly defined channel that does not intermingle with personal activity.
Equally important: never forward business email to a personal account. It might seem convenient — "I will just forward everything to my Gmail so I can see it all in one place" — but it means business data is now sitting on a personal email server that your business does not control, cannot wipe, and has no visibility over. If the personal account is compromised, your business data goes with it.
7. Regular Security Reviews
Security is not something you set up once and forget. People leave the company. Devices are replaced. Passwords age. Circumstances change. A quarterly security review — and it does not need to be anything more formal than a thirty-minute check — keeps your email security current.
Here is what a quarterly review looks like in practice:
- Check who has access — Review your email accounts. Are there accounts belonging to people who have left the company? Disable or delete them immediately. An active email account belonging to a former employee is an open door that nobody is watching.
- Review connected devices — Look at which devices are connected to each account. Does anyone have three phones connected when they only use one? Remove devices that are no longer in use.
- Verify 2FA is active — Confirm that two-factor authentication is enabled on every account. If you have added new team members since the last review, make sure they have set it up.
- Check forwarding rules — Make sure no accounts have email forwarding rules sending copies of business email to external addresses.
- Update passwords if needed — If any accounts are still using passwords that predate your security policy, now is the time to update them.
Thirty minutes, four times a year. That is two hours of effort annually to maintain a level of security that protects your business every day.
8. Staff Awareness
The most sophisticated security technology in the world is defeated by an employee who clicks a link in a phishing email without thinking. Technology protects your systems, but awareness protects the people using them. And people remain the most common point of failure in email security.
Staff awareness does not mean formal training courses, expensive workshops, or tedious online modules. For a small business, it means a fifteen-minute conversation at a team meeting. Cover three things:
- How to spot a phishing email — Look for urgency ("Your account will be closed in 24 hours"), unexpected requests ("Please transfer £5,000 to this new account"), and mismatched sender addresses. If something feels wrong, it probably is. When in doubt, contact the supposed sender through a different channel — pick up the phone, do not reply to the email.
- Password hygiene — Do not reuse passwords. Use a password manager. Do not share passwords over email or messaging apps. Do not write them on sticky notes attached to your monitor.
- Public Wi-Fi awareness — Avoid networks that do not require a password. Do not log into sensitive accounts on networks you do not trust. Be aware of who can see your screen.
That is it. Fifteen minutes. You do not need to turn your team into cybersecurity experts. You need to make them aware enough to pause before clicking, to question things that look unusual, and to know who to ask when they are not sure. That alone prevents the vast majority of successful phishing attacks.
Of the eight measures listed above, the first two — two-factor authentication and strong passwords — provide roughly 80% of the total protection. If you find the full list overwhelming, start with just those two. You can add the remaining measures over time. The important thing is to start, not to be perfect on day one.
The Remote Work Email Security Checklist
Here is everything in one place. Print this, pin it to your wall, or save it as a file you review quarterly. Each item is a concrete action, not an aspiration.
- Two-factor authentication enabled on all accounts — Every mailbox, no exceptions. If your provider allows you to enforce this for all users, do so.
- Strong, unique passwords on every account — Minimum twelve characters. No reuse across accounts. Ideally managed through a password manager.
- Remote wipe capability confirmed and tested — Know how to trigger a remote wipe before you need to. Test it once on a spare device so the process is familiar.
- Screen lock active on every device — PIN, fingerprint, or face recognition. Auto-lock after two minutes of inactivity or less.
- Business email in a dedicated app — Separated from personal email. No co-mingling of personal and business messages in the same inbox.
- No email forwarding to personal accounts — Business email stays within business systems. No copies going to Gmail, Outlook.com, or Yahoo.
- Former employees removed — Accounts belonging to people who have left the company are disabled or deleted immediately upon departure.
- Quarterly access review scheduled — A recurring calendar entry to check accounts, devices, 2FA status, and forwarding rules.
- Team briefed on phishing recognition — A fifteen-minute conversation covering how to spot suspicious emails, password hygiene, and public Wi-Fi awareness.
- Email provider encrypts all connections by default — TLS enforced, not optional. No fallback to unencrypted connections.
What Your Email Provider Should Offer Remote Teams
Not every email provider is built for the realities of remote work. Many consumer email services — and even some business email services — lack the features that make remote work secure. When evaluating or reconsidering your email provider, these are the capabilities that matter most for a distributed team.
Two-Factor Authentication — Enforceable, Not Just Available
Many providers offer 2FA as an option. Fewer allow you to enforce it for all users. The difference matters enormously. If 2FA is optional, some employees will enable it and others will not, leaving inconsistent protection across your organisation. You need a provider that lets you require 2FA for every account, with no opt-out.
ActiveSync for Seamless Device Management
ActiveSync is the protocol that synchronises email, calendar, and contacts between the server and mobile devices. It is also the foundation for remote wipe. Without ActiveSync, your phone or tablet downloads a copy of your email but has limited interaction with the server. With ActiveSync, the server maintains an active connection to every device, enabling real-time synchronisation and — critically — the ability to remotely erase business data from any device at any time.
ActiveSync should be included in your email plan, not offered as an expensive add-on. It is not a luxury feature. For remote teams, it is essential infrastructure.
Remote Wipe Capability
We have covered this in the security measures section, but it bears repeating here because it is a provider-level feature. Your provider must support ActiveSync-based remote wipe and must provide you with an administration interface where you can view connected devices and trigger wipe commands. If your provider cannot do this, they are not equipped to support a remote workforce.
Encrypted Connections by Default
TLS encryption should be enforced, not offered as an option. Every connection between every device and the email server should be encrypted automatically, with no possibility of falling back to an unencrypted connection. This is what protects your data on public Wi-Fi, on home networks, and everywhere in between. Ask your provider whether they enforce TLS or merely support it. The distinction matters.
Webmail for Quick Access from Any Browser
Sometimes an employee needs to check email quickly from a device that is not their own — a hotel business centre computer, a client's office machine, or a borrowed laptop. Webmail provides this access through a standard web browser, without installing anything on the device. When the browser window is closed, no data remains on the machine.
Webmail is also a useful backup when a primary device fails. If an employee's laptop breaks down, they can continue working through webmail on any available device while a replacement is arranged. For remote teams, where in-person IT support is not available, this continuity is valuable.
Login Activity Monitoring
You should be able to see who is logging into your business email, from which devices, and when. Login activity monitoring provides this visibility. It lets you spot unusual patterns — a login from an unexpected country, a device you do not recognise, access at an unusual time — and take action before damage is done. It also helps with routine administration: when an employee leaves, you can see exactly which devices were connected and confirm that access has been fully revoked.
The Cyber Essentials Connection
If you do business with UK government bodies, or if you are considering certification to demonstrate your cybersecurity credentials to clients and partners, you have probably heard of Cyber Essentials. This is the UK Government's certification scheme designed to help organisations protect themselves against the most common cyber attacks.
Cyber Essentials covers five key areas: firewalls, secure configuration, user access control, malware protection, and patch management. Several of the email security measures in this guide align directly with Cyber Essentials requirements:
- User access control — Cyber Essentials requires that user accounts are protected with strong authentication. Two-factor authentication and strong password policies directly address this requirement.
- Secure configuration — Devices accessing email should be securely configured, including screen locks and automatic locking after inactivity. The checklist in this guide covers these points.
- Access management — The requirement to remove access promptly when employees leave aligns with the quarterly review process we described.
Having an email provider that supports 2FA enforcement, encrypted connections, device management, and remote wipe makes the email-related aspects of Cyber Essentials certification significantly easier. You are not starting from scratch — you are building on infrastructure that your provider has already put in place.
For small businesses that want to demonstrate security credibility to clients without the cost and complexity of more advanced certifications like ISO 27001, Cyber Essentials is an excellent starting point. And if your email security is already solid — which it will be if you follow this guide — you are already a good portion of the way there.
Cyber Essentials certification is mandatory for UK government contracts involving the handling of certain sensitive or personal data. Even for private-sector businesses, holding the certificate is increasingly seen as a baseline expectation by larger clients and partners. The cost of certification starts at around £300 for the self-assessment level — a modest investment that signals a genuine commitment to security.
How epost.plus Supports Secure Remote Work
Every security measure and provider capability discussed in this guide comes down to a simple question: does your email provider make secure remote work easy, or does it make you do all the heavy lifting yourself? The right provider builds security into the fabric of the service, so that your team is protected whether they are in the office, at home, or in a coffee shop — without anyone needing to think about it.
epost.plus is built on the Axigen mail server platform, and it is designed with exactly this philosophy in mind. Every feature that this guide recommends is included as standard:
- Two-factor authentication on every account — 2FA is available on all business email accounts and can be enforced across your organisation. No extra cost, no add-on, no complex setup. Your team is protected from day one.
- ActiveSync included — Email, calendar, and contacts synchronise seamlessly across all devices. This is also the foundation for remote wipe, which means you always have the ability to erase business data from a lost or stolen device.
- Remote wipe capability — Through the administration panel, you can view every device connected to every account and trigger a selective wipe that removes only business data. Personal photographs, apps, and messages on the device remain untouched.
- Encrypted connections enforced — All connections to epost.plus use TLS encryption by default. There is no unencrypted fallback. Data in transit is protected on every network, including public Wi-Fi. Beyond TLS, epost.plus also implements MTA-STS (which ensures that other email servers must use encryption when sending to your domain) and DANE (which pins the encryption to verified certificates, preventing man-in-the-middle attacks).
- Full-featured webmail — Access your email from any web browser, anywhere, without installing anything. Ideal for quick access from unfamiliar devices, as a backup when primary devices are unavailable, or for employees who prefer browser-based email.
- UK and EU data centres — Your email data is stored in data centres located in the UK and EU, fully compliant with GDPR. Your business data stays under UK and EU jurisdiction, not in a data centre on another continent governed by different privacy laws.
- Complete email authentication — epost.plus runs DMARC at its strongest setting (p=reject with strict alignment), DNSSEC, and the full email authentication stack. This means your domain is protected against impersonation, and your outgoing emails are more likely to be trusted by recipients' email systems.
- eM Client included — A professional desktop email application for Windows and macOS is included with business email plans at no extra cost. A dedicated, well-maintained email client is inherently more secure than accessing email through a web browser or a poorly maintained third-party app.
For UK businesses with remote or hybrid teams, epost.plus provides the security infrastructure that the guides, checklists, and best practice documents recommend — without requiring a dedicated IT team to implement it. The security features described in this article are not premium add-ons or enterprise-tier extras. They are part of the standard service, available to businesses of every size.
You can view business email plans and order through smartxhosting.uk, or explore the full range of email infrastructure options including dedicated business email servers for organisations with larger teams or higher security requirements. If you have questions about securing your remote team's email, the support team is available to help — get in touch.
epost.plus enforces encryption at every level: TLS for connections in transit, MTA-STS to require encryption from other sending servers, and DANE to pin encryption to verified certificates. This means your team's email is protected on every network — home broadband, hotel Wi-Fi, coffee shop hotspot — automatically and without any configuration on your part.
Frequently Asked Questions
Is it safe to check business email on public Wi-Fi?
It depends entirely on whether your email provider encrypts the connection. If your provider enforces encrypted connections — which reputable providers do by default — then the content of your emails is protected even on a public network. The data travels in an encrypted tunnel that cannot be read by anyone else on the same Wi-Fi. However, public Wi-Fi still carries other risks: fake networks set up to look like legitimate ones, and shoulder surfing where someone simply watches your screen. The safest approach is to use encrypted email connections (which your provider should enforce automatically), avoid networks that do not require a password, and be aware of who can see your screen. If your provider does not encrypt connections by default, that is a reason to switch providers, not a reason to avoid coffee shops.
What exactly is two-factor authentication and how does it work?
Two-factor authentication, often shortened to 2FA, adds a second step to your login. Normally, you type your password and you are in. With 2FA enabled, after entering your password you also need to provide a short code — typically six digits — that changes every thirty seconds. This code comes from an app on your phone, such as Google Authenticator or Microsoft Authenticator. The idea is simple: even if someone steals or guesses your password, they still cannot access your account because they do not have your phone. It is like having two locks on your front door — a thief would need both keys to get in. Setting it up takes about two minutes and involves scanning a QR code with your phone. After that, the process of entering the code becomes second nature very quickly.
What happens if an employee's phone is stolen and it has business email on it?
If the phone has a screen lock — a PIN, fingerprint, or face recognition — the thief cannot access anything immediately. That gives you time to act. The first step is to perform a remote wipe of business data from the device. If your email provider supports ActiveSync, an administrator can send a remote wipe command that deletes all email, calendar entries, and contacts from the stolen phone. This does not affect the data on the server — only the copy on the device is erased. The employee can then set up their email again on a new phone. If your email provider does not support remote wipe, the only protection is the phone's screen lock and whatever security the phone manufacturer provides. This is why remote wipe capability should be a requirement when choosing an email provider.
Do I need a VPN to access business email remotely?
For most small and medium-sized businesses, a VPN is not necessary for email access, provided your email provider encrypts all connections by default. Modern email providers use TLS encryption to protect data in transit, which means your emails are already travelling through an encrypted tunnel between your device and the email server. A VPN adds an additional layer of encryption around all your internet traffic, not just email. This can be useful if your business handles particularly sensitive data, if employees regularly use untrusted networks, or if you need to access other internal systems beyond email. But for email alone, a provider that enforces encryption makes a VPN largely redundant. Think of it this way: if your letters are already sealed in tamper-proof envelopes, putting them inside a second envelope adds very little practical benefit.
How do I enforce password policies across my team?
The most effective approach is to choose an email provider that allows you to set password requirements at the account level. A good provider lets you enforce minimum password length, require a mix of character types, and prevent the reuse of previous passwords. If your provider does not offer these controls, you can establish a company policy document that sets out password requirements and ask employees to acknowledge it. However, policy documents rely on trust, whereas provider-enforced rules are automatic. In practice, the single most impactful step is to require two-factor authentication for all accounts. Even a weak password becomes far less dangerous when a second factor is required. Combining enforced 2FA with a minimum password length of twelve characters gives most small businesses a very strong security baseline.
Can I see who is currently logged into our business email accounts?
Yes, if your email provider offers login activity monitoring. This feature shows you which devices are connected to each account, when they last synchronised, and sometimes the approximate location based on IP address. It is an invaluable tool for spotting unauthorised access — for example, if an account shows a login from a country where none of your staff are located, that is an immediate red flag. Login monitoring also helps with routine administration: you can see which devices a departing employee had connected and ensure they are all removed. Not all providers offer this feature, so it is worth checking before you commit. Providers built for business use — rather than consumer email services repurposed for business — are more likely to include it.
What is the difference between remote wipe and a factory reset?
A factory reset erases everything on the device — all apps, photos, personal data, and business data alike. It returns the phone or tablet to the state it was in when it left the factory. A remote wipe of business email, by contrast, targets only the business data: email messages, calendar entries, contacts, and tasks that are linked to the business email account. Personal photos, personal apps, and other non-business data remain untouched. This distinction matters enormously when employees use their own personal devices for work. If a personal phone is lost, you want to erase the business data without destroying the employee's personal photographs and messages. ActiveSync remote wipe gives you this precision — it removes only what belongs to the business.