Beyond Mail Check: Securing UK Public Sector Email After the NCSC Changes

Sean Bird • March 10, 2025

In a significant development for email security protocols in the UK, the National Cyber Security Centre (NCSC) announced forthcoming changes to its Mail Check service.

Starting 24 March 2025, the NCSC will be discontinuing DMARC aggregate reporting as part of a broader strategy to expand Mail Check services to all UK-based organisations while managing costs and complexity.

Understanding the Mail Check Changes

The NCSC has confirmed that Mail Check will continue to provide essential security checks, including:

  • DMARC policy, policy strength and errors
  • SPF policy, effectiveness and errors
  • MTA-STS policy, policy strength and errors
  • Inbound TLS (certificate validity, encryption ciphers)

However, support will cease for several critical components:

  • DMARC aggregate reporting
  • DMARC insights
  • DKIM checks
  • TLS reporting (TLS-RPT)

As cyber threats become increasingly sophisticated, these changes raise important considerations for public sector organisations that rely on comprehensive email security monitoring.

The Critical Role of DMARC Reporting

DMARC (Domain-based Message Authentication, Reporting and Conformance) reporting isn't merely an optional add-on—it's a fundamental component of a robust email security strategy. Here's why reporting capabilities remain essential:

Continuous Protection Against Evolving Threats

Without continuous monitoring and reporting, organisations can't effectively track emerging threats or identify potential vulnerabilities in their email infrastructure. As threat actors rapidly adapt their techniques, static security measures quickly become outdated.

Preventing Security Drift and System Failures

Email systems are dynamic, with frequent changes to configurations, updates to services, and modifications to sending infrastructure. Without proper reporting, security "drift" can occur where previously compliant systems gradually become vulnerable. For organisations operating at DMARC enforcement levels, this can result in legitimate emails being blocked—potentially disrupting critical communications.

Compliance with UK Government Standards

DMARC reporting is integral to meeting the requirements outlined in the Cyber Assurance Framework (CAF), which is mandatory for UK government organisations. The framework specifically requires:

  • Management of security risks
  • Protection against cyber attacks
  • Implementation of detection tools for cybersecurity events
  • Minimisation of incident impact

Additionally, the NCSC advises organisations to develop capabilities for detecting common cyber attacks and to maintain defined response plans for security incidents.

Transition Solutions for Public Sector Organisations

At Altiatech, we're offering impacted organisations a free assessment to help navigate this transition and implement alternative solutions.


Best Practices Moving Forward

As public sector organisations adapt to these changes, here are recommended best practices to maintain robust email security:

1. Implement Alternative DMARC Reporting Solutions

Consider partnering with specialised security providers like Altiatech that offer comprehensive DMARC reporting and analysis.

2. Maintain Continuous Monitoring

Email security is never a "set and forget" solution. Regular monitoring is essential to identify and address potential vulnerabilities before they can be exploited.

3. Conduct Regular Security Audits

Periodic security audits help ensure that email configurations remain compliant with best practices and regulatory requirements.

4. Stay Informed About Security Standards

As email security standards evolve, organisations should remain informed about new recommendations and requirements from entities like the NCSC.


Conclusion

The upcoming changes to the NCSC's Mail Check service represent a significant shift for UK public sector organisations. While the core security checks will remain available, the discontinuation of DMARC reporting capabilities necessitates a proactive approach to maintaining robust email security.

By implementing alternative reporting solutions and following best practices for email security, organisations can continue to protect themselves against evolving cyber threats while meeting regulatory requirements.

For more information about how Altiatech can support your organisation through this transition, contact our team at innovate@altiatech.com or call 0330 332 5482.

October 31, 2025
Zero trust has become one of the most discussed concepts in cybersecurity, yet widespread misconceptions make it difficult for organisations to understand what it actually involves. Vendor marketing hasn't helped, with many claiming their products deliver "zero trust" when in reality, it's neither a product nor a simple switch you can flip.  This guide cuts through the confusion to explain what zero trust genuinely means and when your organisation should consider adopting it.
October 30, 2025
A critical vulnerability in Chromium's Blink rendering engine remains unpatched despite being disclosed to Google over two months ago, leaving billions of users vulnerable to browser crashes and system freezes.
October 30, 2025
Microsoft's Azure cloud platform experienced a significant global outage on Wednesday, taking down major websites including Heathrow Airport, NatWest, Minecraft, and numerous retailers across several hours before services were restored.
By fahd.zafar October 28, 2025
AI-powered browsers with agentic capabilities are introducing a fundamental security vulnerability that experts believe may never be fully resolved: prompt injection attacks.
October 28, 2025
The National Cyber Security Centre has taken the extraordinary step of co-signing a ministerial letter to chief executives and chairs of Britain's leading businesses, including all FTSE 350 companies. The message is unambiguous: cyber security is no longer just an IT concern—it's a matter of business survival.
October 24, 2025
Microsoft published an unscheduled security patch on Friday addressing a severe vulnerability in Windows Server Update Services (WSUS), creating weekend work for system administrators.
October 24, 2025
Alaska Airlines experienced its second mystery IT outage in three months, grounding its entire fleet for eight hours and cancelling over 360 flights. The incident raises uncomfortable questions about disaster recovery planning in critical infrastructure.
By fahd.zafar October 24, 2025
Amazon has revealed the shocking cause behind one of history's most devastating cloud outages: a simple race condition in DynamoDB's DNS management system brought down AWS services globally for an entire day, with damage estimates potentially reaching hundreds of billions of dollars.
By fahd.zafar October 21, 2025
When Amazon Web Services' US-EAST-1 region went down on 20th October, it didn't just affect services in Northern Virginia—it brought down websites and critical services across the globe, from European banks to UK government agencies. The incident has exposed a fundamental vulnerability in modern cloud infrastructure that no amount of redundancy planning can fully address.
By fahd.zafar October 20, 2025
The numbers are stark and deeply concerning. The National Cyber Security Centre (NCSC) handled a record 204 nationally significant cyber attacks in the year to September 2025—an average of four every single week. This represents a dramatic increase from 89 incidents in the previous year, more than doubling in just 12 months.  For British businesses, this isn't abstract threat intelligence—it's a clear warning that the cyber threat landscape has fundamentally changed, and urgent action is required.