I agree with that emotion, that is, with the two factor auth. It has been employed for the on-line billing system we use, and I believe that ultimately this is the way to go.
For now, we have applied the same exim log analysis scripts to "dovecot_plain" as we did for spotting "dovecot_login". This at least gives us some sort of a early warning system in this regard.
Also, as for our customers keeping their accounts secure, they generally do an okay job. When they don't, we change their email account password, and then send them a report with a bunch of advice. A key component of that advice is to install an anti-key logger tool, i.e. the one that can be downloaded for free from qfxsoftware.com. IMHO, everyone with a Windows machine should have this one installed.
As for forcing members to use SSL logins. Yeah, well, I'm not sure why but iPhones almost never work in my experience when using SSL/TLS.
Also, correct me if I'm wrong, but the only place SSL offers any protection at all is when using a public WiFi connection. In all other cases for mobile devices using carriers such as Verizon, AT&T, etc. the connections, and the entire transmission uses spread spectrum technology that truly encrypts everything from A to Z, that is, unless someone has escalated privileges within the interior one of Verizon's NOCs (of course.)
And even if you are using SSL/TLS with your iPad at the airport, and someone spoofs the connection point with their laptop for example, then, while they can't get your password, they can certainly sang the body copy and most of the rest of the header, right? My understanding is that SSL/TLS only encrypts a small part of the header that contains the log in credentials, and that's it. For complete end-to-end email encryption, both the sender and the receiver would need to use a PGP/GPG key pair. Right?
So, you help someone reset their account password, then send it to them via email. And they (somewhat stupidly) reply with a "thanks," leaving the credentials in the email body.... then bang-o! There goes the password, even if they are using SSL/TLS.