fxrm.com · FXRM Email Security — Product Overview
FX
FXRM
Email Security
Product Overview · 2026

Protecting your inbox
from every angle.

84% of cyberattacks start with an email. Phishing, spoofing, ransomware, BEC — all delivered to an inbox. This overview explains the threats and how FXRM defends against them.

84% OF ATTACKS
of all cyberattacks begin with a malicious email — phishing, malware, or social engineering
$55B BEC LOSSES
estimated global Business Email Compromise losses — targeted, patient, and financially devastating
7.1M PHISHING SITES/MONTH
new phishing sites detected every month — attackers rotate infrastructure faster than manual blocklists
The threat landscape
Domain Spoofing
Attackers forge the From: address to impersonate your CEO, bank, or suppliers. Without DKIM and DMARC in place, receiving mail servers cannot detect the forgery. SPF, DKIM, and DMARC close this gap — we configure all three, with an enforcing DMARC policy, from day one.
Phishing
Social engineering by email. Attackers craft convincing messages — fake invoices, IT password resets, parcel notifications — with links to credential-harvesting sites. Spear phishing targets individuals precisely using personal details. We scan links at click-time, not just delivery.
Business Email Compromise
A patient, targeted fraud. Attackers impersonate an executive or supplier over days of reconnaissance, then redirect a payment or extract sensitive data. DMARC policies and strong authentication are the primary defences.
Ransomware
Email is the most common ransomware delivery vector. A dropper arrives via attachment or link, installs the payload, and propagates before triggering encryption. Intercepting the email is the single most effective preventive control.
Account Takeover
Credential stuffing, phishing, or brute force gains access to a real mailbox. The attacker reads correspondence, sets up silent forwarding, and resets other service passwords. We enforce strong authentication and monitor unusual login patterns.
How FXRM protects you
SPF, DKIM & DMARC
Correctly configured authentication records stop spoofed messages at source. We set an enforcing DMARC policy that rejects mail failing both checks, and send you aggregate reports of authentication failures.
Virus & Malware Scanning
Every attachment is scanned before delivery using up-to-date signatures, including nested archives. Dangerous extensions are blocked outright. Links are checked at click-time against live phishing and malware infrastructure.
TLS Encryption in Transit
All connections use TLS 1.2 or higher. We do not fall back to unencrypted transmission. DANE and MTA-STS prevent certificate substitution attacks on mail in transit.
DNS Block Lists & Honeypots
Multiple real-time DNSBLs plus our own. Honeypot addresses identify new phishing campaigns the moment they launch — blocking them platform-wide within minutes of the first message.
Phishing & Impersonation Heuristics
Beyond DMARC, heuristic analysis catches lookalike domains, mismatched display names, urgency language, and suspicious link structures — flagging attempts before they reach the inbox.
FXRM · fxrm.com · support@fxrm.com
Page 1 of 2
FXRM | Email Security
Product Overview · 2026
30+
Years UK email expertise
Operating UK email infrastructure since 1992 — Demon Internet, fido.net, through to FXRM Email Hosting today.
£0
Cost of security add-ons
SPF, DKIM, DMARC, TLS, virus scanning, DNS block lists, and honeypot detection — all included as standard.
UK
Data centre & jurisdiction
Your email stays on hardware FXRM owns, in UK data centres, governed by UK law. Not a US cloud platform.
Key terms explained
SPF
A DNS record listing every server authorised to send email for your domain. Receivers reject unlisted senders.
DKIM
A cryptographic signature on every outgoing message, verified by receivers. Proves the message was not altered in transit.
DMARC
Ties SPF and DKIM together with a policy — reject, quarantine, or monitor. Generates aggregate reports of authentication failures.
TLS
Encrypts connections between mail servers, preventing passive eavesdropping. Does not encrypt messages at rest.
DNSBL
Real-time database of IPs known to send spam or host phishing. Listed IPs are refused before a single byte is accepted.
BEC
Business Email Compromise. Targeted fraud using spoofed or compromised accounts to redirect payments.
Honeypot
A decoy address never shared legitimately. Any mail to it signals spam or phishing — campaigns are blocked platform-wide within minutes.
DANE
Uses DNSSEC to bind a mail server's TLS certificate to its DNS record, preventing certificate substitution attacks.
MTA-STS
An HTTPS-based policy that tells senders to require TLS — preventing downgrade attacks without needing DNSSEC.
On-Path Attack
An attacker between two mail servers who intercepts messages in transit. TLS, DANE and MTA-STS prevent this.
Ready to protect your inbox?
Every FXRM email account comes with SPF, DKIM, and DMARC configured correctly from day one — TLS enforced, virus scanning active, and honeypot-driven blocking included as standard. Not sold as extras.
fxrm.com/hosting/email-hosting
support@fxrm.com
0330 788 2211
© 2026 FXRM Services Ltd · Registered in England and Wales
Page 2 of 2