Spammers Out Innovating SMB Security

In 2006, e-mail security provider MXLogic conducted a SMB survey that found the smaller the company, the more likely it was to be vulnerable to e-mail threats. Since then, there’s been an explosion of security technologies that promise SMBs protection from e-mail borne threats. With all this technology available, and with a growing number of […]

Dec 3, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In 2006, e-mail security provider MXLogic conducted a SMB survey that found the smaller the company, the more likely it was to be vulnerable to e-mail threats.

Since then, there’s been an explosion of security technologies that promise SMBs protection from e-mail borne threats. With all this technology available, and with a growing number of hosted security providers offering services like Solinus’ MailFoundry, it’d be logical to assume SMBs had become small fortresses buttressed against the flood of incoming threats.

Unfortunately, this is not the case. Even after the recent shutdown of hosting service McColo, one of the major producers of spam, SMBs remain vulnerable to e-mail borne attacks, spam and phishing.

Sam Masiello, director of MXLogic’s Threat Center, tells Channel Insider that as SMBs become savvier about security, spammers develop increasingly innovative ways to circumvent security measures and choose their targets more selectively. As that happens, solution providers in turn need to keep up to speed with the ever-changing threats that face their customers, and ensure they keep pace with spammers tactics.

“Spammers aren’t sending e-mails en masse, to millions of potential targets and hoping a few will bite. What we’re seeing now are more focused attacks sent to specific people—mostly executives—at  organizations,” says Masiello.

Masiello says one particular scam involved an e-mail sent to executives claiming to be from the Better Business Bureau (BBB) regarding a complaint—fictitious, of course. Concerned executives who clicked on the link provided in the e-mail were taken to a bogus site, and a keylogger was downloaded to their computer, allowing spammers to track these executives’ every move.

“What we saw last year was better social engineering tactics using ‘bait’ that really meant something to these executives – in this case, they were worried about a BBB complaint. And those guys were targeted because they have a lot to lose,” says Masiello. The keylogger allowed spammers to access information when the executives logged into their online banking, brokerage or credit card accounts.

For solution providers, education is key to the success of their business and for the security of their customers. Keeping abreast of the latest inbound threats means more than understanding that there’s no real Nigerian prince waiting to deposit $10 million into your bank account.

While there are still spammers using national financial services chains such as Chase or TDAmeritrade to lure in victims, Masiello says MXLogic has noted an increase in attacks using the names of smaller, regional banks.

“These guys are also now targeting local and regional banks as well, because they find account holders in these local banks may not be as educated about threats, and these smaller banks may not be as good at outreach to their customers as far as threats and scams,” he says.

And while there’s loads of technology out there to help customers deal with threats, that in and of itself isn’t enough. Trend Micro offers SMB-specific InterScan firewalls and client/server messaging security. Internet security vendor SmoothWall’s unified threat management (UTM) hardware appliances are targeted for midmarket companies. And security giants McAfee and Symantec (through its MessageLabs and Brightmail acquisitions) offers an SMB-focused e-mail security as a service solution.

But a multi-layered approach led by a well-educated channel partner is the most effective tactic, says Masiello.

“Having a multi-tiered approach means you can’t just make sure your e-mail is monitored, but also make sure IMs and web browsers aren’t vulnerable. You should also control access to certain sites and monitor outbound Web traffic,” he says.

So, when it really comes down to it, the human element is the missing link. With all the technology available, it doesn’t do end users any good if you aren’t educated about the threats, their vulnerabilities and the best solutions to address those.

“You really have to stay on top of security threats as they evolve, and make sure you’re enabling the solution that best covers your customers’ needs,” he says.

 

Recommended for you...

Concentric AI Adds Integrations to Data Governance Platform

Concentric AI adds Wiz, Salesforce, and GitHub integrations to boost Semantic Intelligence platform’s AI-driven data governance and security capabilities.

Jordan Smith
Aug 15, 2025
Brivo Launching New Solution to Boost Security Suite

Brivo and Envoy partner to unify access control & visitor management, delivering scalable, compliant, and secure workplace experiences.

Jordan Smith
Aug 13, 2025
GitHub CEO Steps Down as Microsoft Tightens AI Integration

GitHub CEO Thomas Dohmke to step down in 2025 as Microsoft moves platform into CoreAI, deepening its role in the company’s AI development strategy.

Allison Francis
Aug 13, 2025
Backblaze CEO on GTM Strategy & AI Demand on M&E Datasets

Backblaze CEO on record growth, AI and M&E wins, and how new products and partnerships are driving enterprise cloud storage adoption.

Jordan Smith
Aug 13, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.