{"id":45906,"date":"2022-03-24T19:00:00","date_gmt":"2022-03-24T19:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/for-msps-next-gen-email-security-is-a-must-"},"modified":"2022-03-24T19:00:00","modified_gmt":"2022-03-24T19:00:00","slug":"for-msps-next-gen-email-security-is-a-must","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/","title":{"rendered":"For MSPs, Next-Gen Email Security Is a Must"},"content":{"rendered":"<p>Cyberattacks have become a routine part of our lives, but it&#8217;s business email compromise (BEC) attacks that could cost businesses the most. <\/p>\n<p>Email remains one of the leading communication channels \u2014 both in the private and business spheres \u2014 with <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.statista.com\/statistics\/456500\/daily-number-of-e-mails-worldwide\/\">319.6 billion messages<\/a> exchanged across the globe every day. But just a single <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/articles\/spear-phishing\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q1-darkreading-sp-gobig-email_security\">targeted email attack<\/a> on a single endpoint can quickly spread to other devices and even servers \u2014 bringing down an entire corporate network.<\/p>\n<p>Users open emails quickly, and often with little thought. The risk is significant: These messages may contain sensitive data, and sometimes even passwords or other critical information that can be stolen. Users can also be deceived in revealing information that they shouldn&#8217;t. <\/p>\n<p>Though email service providers try to stay on top of persistent email threats, they often lack advanced, AI-powered tools to intelligently detect attack patterns. The responsibility of deciding whether or not a message is safe is left entirely up to the recipient, making breaches almost inevitable.<\/p>\n<p>As a result, email security will continue to challenge corporate security professionals in 2022 and beyond.<\/p>\n<p><strong>Types of BEC Attacks and How They Work<\/strong><br \/>BEC attacks are sophisticated scams that typically encourage victims to unwittingly transfer funds to the attacker, though data may be a target for theft as well. Attackers often impersonate a CEO or other executive at the organization to lend their request a sense of legitimacy and urgency. <\/p>\n<p>In a mix-and-match approach, BEC attackers often use well-known social engineering techniques to first collect identity information, and then leverage that information in a very focused way \u2014 deceiving employees into transferring funds or opening a malware attachment.<\/p>\n<p>BEC exploits are like old-fashioned sting operations: people tricking people. Here are some examples that demonstrate how they work and the damage they can cause.<\/p>\n<p><strong>CEO Fraud<br \/><\/strong>Perhaps the most common form of BEC attack is CEO fraud, in which attackers convincingly position themselves a leading executive \u2014 sometimes by gaining illicit access to the executive&#8217;s real email account, and other times by creating a falsified account that is similar enough to be appear believable.<\/p>\n<p>The cybercriminals will typically reach out to employees with financial privileges and ask them to take a specific action, such as carrying out a wire transfer payment to an owed vendor, with a sense of urgency. Of course, the actual receiving account is controlled by the attackers.<\/p>\n<p>In February 2016, attackers launched a strike against Snapchat, in which they <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/oag.ca.gov\/system\/files\/Snapchat Inc updated Sample of Employee Notice of Data Breach_Redacted_0.pdf\">impersonated the company&#8217;s CEO<\/a> to obtain highly sensitive data about current and former employees \u2014 including Social Security numbers, salaries, and healthcare plans. Snapchat offered the affected employees two years of free credit monitoring, plus up to $1 million in compensation.<\/p>\n<p><strong>Vendor Email Compromise<\/strong><br \/>Vendor email compromise (VEC), in which criminals take over a recognized vendor\u2019s legitimate email account, is another common form of BEC exploit. These attacks abuse the trust between partnered organizations for nefarious purposes.<\/p>\n<p>In March 2021, a cybercriminal <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/votiro.com\/blog\/anatomy-of-an-advanced-vec-attack-using-a-password-protected-zip-file\/\">compromised the email account of a law firm<\/a> and sent a password-protected zipped file to an employee of one of its active clients, a large insurance company. The insurance company&#8217;s secure email gateway did not block the message, and the unsuspecting employee was tricked by a seemingly legitimate request to review documents. However, the attachment contained a stealthy Valyrian trojan (VB:Trojan.Valyria.3963) that executes automatically upon computer startup.<\/p>\n<p>The obfuscated and encrypted malicious code would be missed by most traditional malware scanners. Luckily, an additional layer of defense was able to detect the cyberthreat and block it from executing.<\/p>\n<p><strong>False Invoice Schemes<\/strong><br \/>Some BEC campaigns see attackers present fraudulent invoices to an organization\u2019s suppliers. Supplier invoices are often high-value; just one such successful attack could potentially net criminals hundreds of thousands, or even millions, of dollars.<\/p>\n<p><a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.tessian.com\/blog\/business-email-compromise-bec-examples\/\">Facebook and Google fell victim to a gang of cybercriminals<\/a> who set up a fake company called Quanta Computer, which was actually the name of a bona fide hardware supplier. Over a period of two years, these two tech giants were presented with what seemed to be legitimate invoices, which were duly paid to bank accounts controlled by the malicious actors \u2014 to the tune of $121 million. The ringleader of this attack, Evaldas Rimasauskas, was ultimately apprehended, and in 2019 was sentenced to five years in prison.<\/p>\n<p><strong>Choosing an Email Security Service Provider<\/strong><br \/><a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/articles\/msp\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q1-darkreading-sp-gobig-email_security\">Managed service providers (MSPs)<\/a> are responsible for delivering secure email services. They must choose their security solution vendors carefully through a multistaged selection process.<\/p>\n<p>First, create a list of potential vendors based on factors like time in market, available integrations with other solutions, global presence, and cloud-native offerings. At this stage, the task is to evaluate the vendor&#8217;s business and technical maturity.<\/p>\n<p>Next, narrow down the list based on independent lab reviews and customer testimonials to assess how effective these solutions are. Having a <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/dl.acronis.com\/u\/rc\/Data-Sheet-Acronis-Cyber-Protect-Cloud-with-Advanced-Email-Security-EN-US.pdf\">checklist of email security essentials<\/a> can help ensure a more thorough, objective assessment.<\/p>\n<p>Together with the shortlisted vendors, create a proof of concept for the future email security solution that meets the MSP\u2019s unique business needs. This stage is important as many vendors are not ready for a long-term partnership that fosters collaboration and addresses custom requirements \u2014 preferring instead to sell purported &#8220;one-size-fits-all&#8221; solutions.<\/p>\n<p>The vendor should next create a specialized offering for the MSP to test in a sandbox environment, making sure there are no gaps in the solution requirements and final implementation.<\/p>\n<p>This process enables MSPs to start playing a major role in protecting their customers&#8217; email flows and work against the weaponization of email by cybercriminals.<\/p>\n<p>An enhanced email security stack means new revenue streams, a better reputation, and sustainable growth for every managed service provider. Acronis offers a cloud-native deployment that enables fast integration with existing email systems and requires less effort on the customer side. Learn more about their <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/products\/cloud\/cyber-protect\/email-security\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q1-darkreading-sp-gobig-email_security\">Advanced Email Security<\/a> pack for <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/products\/cloud\/cyber-protect\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q1-darkreading-sp-gobig-email_security\">Acronis Cyber Protect Cloud<\/a>.<\/p>\n<p><strong>About the Author<\/strong><\/p>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" asset_uid=\"blt0efb26dbb0aa3375\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" height=\"auto\">\n<\/picture>\n<p>Candid W\u00fcest is the VP of Cyber Protection Research at Acronis, where he researches new threat trends and comprehensive protection methods. Previously, he worked for more than 16 years as the tech lead for Symantec&#8217;s global security response team. W\u00fcest is a frequent speaker at security-related conferences, including RSAC and AREA41, and is an adviser for the Swiss federal government on cyber-risks. He holds a master&#8217;s in computer science from ETH Zurich and various certifications and patents.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/for-msps-next-gen-email-security-is-a-must-\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay one step ahead of the constantly evolving cyber threats with the right MSP email security solution. Discover how to evaluate and select the best service and solutions for your clients. Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/for-msps-next-gen-email-security-is-a-must-\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-45906","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-24T19:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"For MSPs, Next-Gen Email Security Is a Must\",\"datePublished\":\"2022-03-24T19:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/\"},\"wordCount\":1066,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0efb26dbb0aa3375\\\/61fc568e1086c07cd1ee20c1\\\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/\",\"name\":\"For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0efb26dbb0aa3375\\\/61fc568e1086c07cd1ee20c1\\\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2022-03-24T19:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0efb26dbb0aa3375\\\/61fc568e1086c07cd1ee20c1\\\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0efb26dbb0aa3375\\\/61fc568e1086c07cd1ee20c1\\\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/for-msps-next-gen-email-security-is-a-must\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"For MSPs, Next-Gen Email Security Is a Must\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/","og_locale":"en_US","og_type":"article","og_title":"For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-24T19:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"For MSPs, Next-Gen Email Security Is a Must","datePublished":"2022-03-24T19:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/"},"wordCount":1066,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/","url":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/","name":"For MSPs, Next-Gen Email Security Is a Must 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2022-03-24T19:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0efb26dbb0aa3375\/61fc568e1086c07cd1ee20c1\/Candid_150x125.jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/for-msps-next-gen-email-security-is-a-must\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"For MSPs, Next-Gen Email Security Is a Must"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45906"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45906\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}