- Why your email account is the highest-value target
- Creating a password your email deserves
- Two-factor authentication: your single most important action
- Securing your account recovery options
- Auditing third-party app access
- Monitoring login activity and detecting unauthorised access
- Defending against email forwarding attacks
- Recognising and avoiding email-based phishing
- Building lasting email security habits
If an attacker had to choose a single account to compromise from your entire digital life, they would choose your email without hesitation. Your inbox is not just a communication tool — it is the universal recovery mechanism for every other account you own. Your bank, your investment accounts, your social media profiles, your streaming services, your cloud storage — every single one of them can be accessed by whoever controls your email address through the “forgot my password” function.
This is not a theoretical risk. Email account takeovers are among the most common and most damaging forms of cybercrime. When your email is compromised, the attacker does not need to know your passwords for other services. They simply request a password reset, which arrives in your inbox, and they work their way through your accounts systematically. By the time most people realise their email has been compromised, significant damage has already been done.
Why your email account is the highest-value target
The password reset flow that all services rely on creates a single point of failure for your entire digital life. Think about every service linked to your email address: your bank and any investment or savings accounts, Apple ID or Google account (which controls your phone backup), Amazon and any shopping accounts, Facebook, Instagram, Twitter, LinkedIn, your employer’s systems if you use your personal email for work recovery, and dozens of other services you have signed up for over the years.
Attackers who gain access to an email account also gain access to years of message history. That history often contains: passwords sent to you by services when you first registered, bank statements and account summaries, receipts that reveal what services you use, personal information that can be used for identity theft or targeted social engineering, and documents you have emailed to yourself or received from others.
There is also the damage that can be done using your email address itself. An attacker can impersonate you to your contacts, send phishing emails to everyone in your address book, create accounts on other services in your name, or use your email to conduct fraud — including ordering goods, taking out credit, or sending money — all while appearing to be you.
Creating a password your email deserves
Your email password deserves more care than any other password you have. It should be at least 16 characters long, ideally 20 or more. It should be completely unique — used on no other service, ever. It should contain a mix of uppercase and lowercase letters, numbers, and symbols. And ideally, it should be randomly generated by a password manager rather than constructed by your own imagination.
The reason random generation matters is that human-created passwords, even ones that feel complex, follow predictable patterns. People tend to substitute letters for numbers in obvious ways (3 for e, @ for a, 1 for i), capitalise the first letter, and add a number or symbol at the end. Automated password cracking tools account for all of these patterns. A randomly generated password like kX7#mQpL2!nRvYc9 follows no human pattern whatsoever and is exponentially harder to crack even with sophisticated tools.
If you use a password manager like Bitwarden (free), generating and storing a unique random password for your email takes about 30 seconds. You never need to remember it — the password manager stores it and fills it for you. You only need to remember your password manager’s master password, which you choose and memorise.
Two-factor authentication: your single most important action
Two-factor authentication (2FA) is the single most impactful security measure you can apply to your email account, and the most important thing you will read in this article. With 2FA enabled, even if an attacker obtains your exact password — through a data breach, phishing, or any other method — they still cannot access your account. They need a second piece of information that only you can provide in real time.
There are three common types of 2FA, and they are not equally secure. The weakest is SMS codes, where a 6-digit code is sent to your phone number via text message. This is better than nothing, but SMS codes can be intercepted through SIM swapping attacks where an attacker convinces your mobile carrier to transfer your number to a SIM they control. Much stronger is an authenticator app like Authy, Google Authenticator, or Microsoft Authenticator, which generates time-limited codes locally on your device without involving your phone number. Strongest of all are hardware security keys like YubiKey, physical devices that plug into your computer and are essentially impossible to phish remotely.
For most people, an authenticator app strikes the right balance of security and convenience. Here is how to enable it on Gmail: go to your Google Account, select Security, then select 2-Step Verification, then choose Authenticator App and follow the setup instructions. For Outlook: go to account.microsoft.com, select Security, then Advanced Security Options, then set up the Microsoft Authenticator app.
Securing your account recovery options
Account recovery options are the backdoor to your account — the mechanism designed to let you back in if you forget your password or lose access to your 2FA device. Ironically, they are also one of the most common ways attackers bypass security to take over accounts. If an attacker can access your recovery email address or your recovery phone number, they can often circumvent your password and your 2FA entirely.
Go to your email account’s security settings right now and review your recovery options. Check every recovery email address and recovery phone number listed. Ask yourself: do I still have access to this email account? Do I still own this phone number? Has anything changed? Remove any recovery options that are outdated or that you no longer control.
Ensure your recovery email is itself a well-secured account. It is pointless to protect your main email with a strong password and 2FA if your recovery email has a weak password and no 2FA. The weakest link in the chain determines your overall security. Your recovery email should have the same level of protection as your main email.
Auditing third-party app access
Over time, you have almost certainly granted dozens of third-party applications access to your email account. When you signed up for a new service and clicked “Sign in with Google” or gave an app permission to “read your emails”, you granted that application an access token — effectively a permanent pass to your inbox that does not expire when you change your password.
To review these in Gmail, go to myaccount.google.com, then Security, then Third-party apps with account access. You will see every application that has been granted access and the specific permissions they have. Look critically at each entry. Do you still use this application? Did you knowingly grant this access? Does the level of access seem appropriate for what the app does? Remove anything you do not actively recognise or use.
Pay particular attention to any app that has “read all email” or “manage email” permissions. These permissions give the app the ability to read every message in your inbox, including anything sensitive. There are very few legitimate applications that actually require this level of access. If you cannot immediately identify why an app needs it, remove the access.
Monitoring login activity and detecting unauthorised access
Gmail provides a log of recent account activity that shows every device and location from which your account has been accessed. To view it, scroll to the bottom of your Gmail inbox and click the “Details” link next to “Last account activity”. You will see the access type (web browser, mobile app, IMAP), the location, and the time of each recent access.
Review this list periodically — every two to four weeks is a reasonable cadence. Investigate any login you do not recognise. An unfamiliar location or device could indicate that someone else has access to your account. If you see something suspicious, click “Sign out of all other sessions” immediately, then change your password and review your recovery options.
For Outlook accounts, go to account.microsoft.com and select Sign-in activity to view recent logins with similar detail including the device type and IP address used for each access.
Defending against email forwarding attacks
One of the most insidious and least-known email attack techniques is the silent forwarding rule. When an attacker gains even temporary access to an email account — perhaps through a phishing attack that you later caught and addressed by changing your password — one of the first things many attackers do is create an email filter or forwarding rule that silently sends copies of every incoming email to an address they control.
This means that even after you have changed your password and regained control of your account, the attacker continues to receive everything that arrives in your inbox indefinitely. They can monitor your banking alerts, your two-factor authentication codes for other services, your personal communications, and any sensitive documents you receive — all without any further access to your actual account.
In Gmail, go to Settings, then the Filters and Blocked Addresses tab, and review every filter listed. Then go to the Forwarding and POP/IMAP tab and check whether any forwarding addresses are configured. Delete anything you did not set up yourself. In Outlook, go to Settings, Mail, Rules, then review all rules; and Settings, Mail, Forwarding to check for any forwarding addresses.
Building lasting email security habits
Technical security measures are only as effective as the habits that maintain them. The most secure email configuration in the world can be undermined by clicking a convincing phishing link. Building the right habits provides a layer of protection that technical measures alone cannot replicate.
- Never click links in unexpected emails asking you to log in — always navigate directly to the service by typing the address yourself
- Check the actual sender email address before trusting any email, not just the display name
- Be suspicious of any email creating urgency — legitimate services do not threaten immediate account closure
- Review your account recovery options and connected apps every six months
- Check your login activity periodically for unfamiliar sessions
- Verify your email forwarding settings every three months
- Change your email password immediately if you ever click a suspicious link
- Enable login notifications so you receive an alert whenever your account is accessed from a new device