Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare SolarWinds RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Why does a business need a third-party Email Security offering?
MSP Business

Why does a business need a third-party Email Security offering?

By Ian Thornton-Trump
19 June, 2015

In October 2013, 153 million Adobe accounts were breached, with each containing clear text email addresses for their customers. The password cryptography was poorly done and many passwords were easily decrypted as well. Since the activation and licensing of Adobe’s suite of products requires a valid account on Adobe’s servers; cyber criminals quickly identified these as valid email addresses and a plethora of phishing emails and spam soon followed.

In light of incidences like this and the availability of large databases of valid email addresses, there is an urgent requirement to protect legitimate email accounts from the virus-infected and malicious link phishing emails cyber criminals send out by the millions. Indeed, when it comes to this kind of attack, cloud-based email protection services can provide more than just anti-spam capabilities and content filtering features.

Of particular interest is the importance of filtering the common business email accounts like [email protected]; ap (accounts payable); ar (accounts receivable); hr (human resources) and of course [email protected] It’s even better when these accounts are distribution lists to multiple internal email addresses. Even if you’re sceptical of the cost of protecting everyone’s email inbox; putting protection in place for your company’s generic email accounts is a “quick-win” to reduce the spam volumes and phishing emails.

One of the key advantages of a hosted email protection service is that it sits in front of the mail infrastructure restricting the IP addresses of the connecting email servers. Configuring your mail exchange (MX) records to send mail to the hosted service for scanning, and then configuring your email server and firewall to only accept connections from the hosted protection service provides robust protection against email threats. This configuration ensures that only email that passes through the scanner is sent to your on-premise email server.

This configuration also allows the hosted email protection service to monitor the volume of messages originating from your on-premise email server. A sudden spike in the number of sent messages could indicate a major problem inside the host network.

Why is this important?

One of the ways cyber criminals break into your company is by connecting to your email server directly. Clearly you can see the value of IP address restrictions on limiting the allowed list of connectors to an on-premise mail server. This network reconnaissance technique of direct connection is almost completely thwarted by a defence-in-depth strategy.

Since cyber criminals are unable to connect directly, it will be impossible for them to know which email server software you run. That makes it very difficult to find vulnerabilities to exploit. This issue is important if older versions of Exchange are being run on older hardware with limited capacity.

Running a hosted mail protection service makes a lot of sense to defeat some of the most common attacks in use by cyber criminals, such as those listed below.

1. Buffer overflows

Buffer overflows will happen if an on-premise email server is hit with large quantities of data. A hosted email protection service is almost infinitely scalable to meet high load demands.

2. Phishing

Malicious attachments and malicious web links are frequently sent via email to business users. Hosted email protection solutions quarantine these emails before they are delivered to the on-premise email server.

3. Mail flooding outbound and inbound

Large volumes of inbound email are processed and filtered before being passed on to the on-premise email server; this saves the bandwidth and processing capability of the email server for legitimate email traffic. Outbound email floods are easily detected from a possibly compromised or misconfigured device.

4. Denial of Service (DoS)

The arrival of large volumes of email over a limited-bandwidth DSL or Cable Modem connection will degrade all external hosted services and render other Internet services, such as VPN or Remote Desktop, unusable.

Increasingly, email has become “the” critical business service, but our own systems support the worldwide statistics claiming that almost 70% of email traffic worldwide is spam or malicious (see graph below). In 2014 the percentage of spam in email traffic is forecasted to remain roughly the same. Among malicious attachments there is growth in malware (or links to malware) designed to steal confidential data, especially passwords and logins for social networking sites and, of course, banking systems.

MAXMAil_piechart

With statistics like this from our own systems, we can infer that the threat of malicious attachments, and increasingly malicious web links is a danger to anyone receiving and sending email – that accounts for almost every business in the Internet-connected world.

 

Ian Thornton-Trump, CSA+, CD, CEH, CNDA is CTO at Octopi Managed Services Inc. Ian is an ITIL certified Information Technology (IT) consultant with more than 20 years of experience in IT security and information technology. He enjoys and maintains a strong commitment to the security community. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013.

You can follow Ian on Twitter® at @phat_hobbit.

 

To find out how MAX Mail can help with your email security needs, download our free MAX Mail Email Security Guide

 

You might also like...
MSP Business

Hack Labs: The benefit of having your own

MSP Business

Operation Cloud Hopper-A wake-up call for MSPs and IT service providers

MSP Business

Are companies spending their IT Security Budget on the wrong things?

MSP Business

MSP Password Management

MSP Business

Using managed antivirus solutions in your MSP

MSP Business

How to keep on top of the malware threat

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • Three things I learned working for an MSP
  • Earning word-of-mouth referrals for your IT business
  • Backup automation part 1: Deploying backup devices
  • Ultimate Guide: MySQL Backup
  • Most common automation requests and how to solve them: Ep 2
Categories:
  • Security (240)
  • Tips & Advice (130)
  • Best Practices (97)
  • Backup & Disaster Recovery (96)
  • Managed Services (89)
  • The Head Nerds (82)
  • Business Growth (79)
  • IT Support (43)
  • Business (41)
  • Automation (40)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (33)
  • Remote Management (30)
  • ITSM (26)
  • Networking (22)
  • Data (21)
  • Cloud Computing (21)
  • Marketing (15)
  • PSA (13)
  • Product (11)
  • Service Desk (6)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
  • LOGICcards (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.