{"id":5538,"date":"2015-06-19T20:50:40","date_gmt":"2015-06-19T19:50:40","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5538"},"modified":"2021-04-06T21:00:09","modified_gmt":"2021-04-06T20:00:09","slug":"security-why-does-a-business-need-a-third-party-email-security-offering","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering","title":{"rendered":"Why does a business need a third-party Email Security offering?"},"content":{"rendered":"<p>In October 2013, 153 million Adobe accounts were breached, with each containing clear text email addresses for their customers. The password cryptography was poorly done and many passwords were easily decrypted as well. Since the activation and licensing of Adobe\u2019s suite of products requires a valid account on Adobe\u2019s servers; cyber criminals quickly identified these as valid email addresses and a plethora of phishing emails and spam soon followed.<\/p>\n<p>In light of incidences like this and the availability of large databases of valid email addresses, there is an urgent requirement to protect legitimate email accounts from the virus-infected and malicious link phishing emails cyber criminals send out by the millions. Indeed, when it comes to this kind of attack, cloud-based\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/mail-assure\/solution\/microsoft-365-email-protection\">email protection<\/a>\u00a0services can provide more than just anti-spam capabilities and content filtering features.<\/p>\n<p>Of particular interest is the importance of filtering the common business email accounts like\u00a0sales@yourcompany.com; ap (accounts payable); ar (accounts receivable); hr (human resources) and of course\u00a0support@yourcompany.com.\u00a0It\u2019s even better when these accounts are distribution lists to multiple internal email addresses. Even if you\u2019re sceptical of the cost of protecting everyone\u2019s email inbox; putting protection in place for your company\u2019s generic email accounts is a \u201cquick-win\u201d to reduce the spam volumes and phishing emails.<\/p>\n<p>One of the key advantages of a\u00a0<a class=\"ext\" href=\"https:\/\/www.maxfocus.com\/mail-security?adv=29051&amp;loc=158\" target=\"_blank\" rel=\"noopener noreferrer\">hosted email protection<\/a>\u00a0service is that it sits in front of the mail infrastructure restricting the IP addresses of the connecting email servers. Configuring your mail exchange (MX) records to send mail to the hosted service for scanning, and then configuring your email server and firewall to only accept connections from the hosted protection service provides robust protection against email threats. This configuration ensures that only email that passes through the scanner is sent to your on-premise email server.<\/p>\n<p>This configuration also allows the hosted email protection service to monitor the volume of messages originating from your on-premise email server. A sudden spike in the number of sent messages could indicate a major problem inside the host network.<\/p>\n<h3>Why is this important?<\/h3>\n<p>One of the ways cyber criminals break into your company is by connecting to your email server directly. Clearly you can see the value of IP address restrictions on limiting the allowed list of connectors to an on-premise mail server. This network reconnaissance technique of direct connection is almost completely thwarted by a defence-in-depth strategy.<\/p>\n<p>Since cyber criminals are unable to connect directly, it will be impossible for them to know which email server software you run. That makes it very difficult to find vulnerabilities to exploit. This issue is important if older versions of Exchange are being run on older hardware with limited capacity.<\/p>\n<p>Running\u00a0a hosted mail protection service makes a lot of sense to defeat some of the most common attacks in use by cyber criminals, such as those listed below.<\/p>\n<h3>1. Buffer overflows<\/h3>\n<p>Buffer overflows will happen if an on-premise email server is hit with large quantities of data. A hosted email protection service is almost infinitely scalable to meet high load demands.<\/p>\n<h3>2. Phishing<\/h3>\n<p>Malicious attachments and malicious web links are frequently sent via email to business users. Hosted email protection solutions quarantine these emails before they are delivered to the on-premise email server.<\/p>\n<h3>3. Mail flooding outbound and inbound<\/h3>\n<p>Large volumes of inbound email are processed and filtered before being passed on to the on-premise email server; this saves the bandwidth and processing capability of the email server for legitimate email traffic. Outbound email floods are easily detected from a possibly compromised or misconfigured device.<\/p>\n<h3>4. Denial of Service (DoS)<\/h3>\n<p>The arrival of large volumes of email over a limited-bandwidth DSL or Cable Modem connection will degrade all external hosted services and render other Internet services, such as VPN or Remote Desktop, unusable.<\/p>\n<p>Increasingly, email has become \u201cthe\u201d critical business service, but our own systems support the worldwide statistics claiming that almost 70% of email traffic worldwide is spam or malicious (see graph below). In 2014 the percentage of spam in email traffic is forecasted to remain roughly the same. Among malicious attachments there is growth in malware (or links to malware) designed to steal confidential data, especially passwords and logins for social networking sites and, of course, banking systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"size-full wp-image-4985 aligncenter\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2015\/05\/MAXMAil_piechart_1206162.jpg\" alt=\"MAXMAil_piechart\" width=\"600\" height=\"500\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>With statistics like this from our own systems, we can infer that the threat of malicious attachments, and increasingly malicious web links is a danger to anyone receiving and sending email \u2013 that accounts for almost every business in the Internet-connected world.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"no-ext\"><em>Ian Thornton-Trump, CSA+, CD, CEH, CNDA is CTO at\u00a0<a href=\"https:\/\/www.octopitech.com\/\" target=\"_blank\" rel=\"follow noopener\">Octopi Managed Services Inc<\/a>. Ian is an ITIL certified Information Technology (IT) consultant with more than 20 years of experience in IT security and information technology. He enjoys and maintains a strong commitment to the security community. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013.<\/em><\/p>\n<p><em>You can follow Ian on Twitter\u00ae at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/phat_hobbit\" target=\"_blank\" rel=\"noopener noreferrer\">@phat_hobbit<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>To find out how MAX Mail can help with your email security needs, download our free\u00a0<a class=\"ext\" href=\"https:\/\/www.maxfocus.com\/whitepapers\/max-mail-email-security-guide\" target=\"_blank\" rel=\"noopener noreferrer\">MAX Mail Email Security Guide<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In October 2013, 153 million Adobe accounts were breached, with each containing clear text email addresses for their customers. The password cryptography was poorly done and many passwords were easily&#8230;<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5538","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why does a business need a third-party Email Security offering? - N-able<\/title>\n<meta name=\"description\" content=\"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why does a business need a third-party Email Security offering? - N-able\" \/>\n<meta property=\"og:description\" content=\"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-19T19:50:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T20:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Why does a business need a third-party Email Security offering?\",\"datePublished\":\"2015-06-19T20:50:40+01:00\",\"dateModified\":\"2021-04-06T20:00:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\"},\"wordCount\":862,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\",\"name\":\"Why does a business need a third-party Email Security offering? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2015-06-19T20:50:40+01:00\",\"dateModified\":\"2021-04-06T20:00:09+00:00\",\"description\":\"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why does a business need a third-party Email Security offering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why does a business need a third-party Email Security offering? - N-able","description":"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering","og_locale":"fr_FR","og_type":"article","og_title":"Why does a business need a third-party Email Security offering? - N-able","og_description":"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!","og_url":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2015-06-19T19:50:40+00:00","article_modified_time":"2021-04-06T20:00:09+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Guest","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Why does a business need a third-party Email Security offering?","datePublished":"2015-06-19T20:50:40+01:00","dateModified":"2021-04-06T20:00:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering"},"wordCount":862,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["MSP Business"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering","url":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering","name":"Why does a business need a third-party Email Security offering? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2015-06-19T20:50:40+01:00","dateModified":"2021-04-06T20:00:09+00:00","description":"Why does a business need a third-party Email Security offering? Security Lead Ian Trump has the answer!","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/security-why-does-a-business-need-a-third-party-email-security-offering#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Why does a business need a third-party Email Security offering?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5538"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5538\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}