To Enterprises and ESPs: A Warning

Mike Hillyer
Oct. 18, 2011 by Mike Hillyer

Don’t talk to ISPs about messaging threats. For them, the topic is old hat. Every day, ISPs are bombarded by messaging attacks, and each is one more targeted, more fiendish, more sophisticated than the one before.

Email Devil

Rather, today’s most dangerous attacks are aimed at particular organizations or people, and they employ highly sophisticated strategies combining identity theft, spoofing and malware. They use an intimate knowledge of the targeted organization and its partners, and they employ every strategy known to marketers to make their communications seem legitimate and relevant. Motivated by financial gain, these cybercriminals ultimately erode the necessary foundation of trust between enterprises, ESPs and customers.

Just last year, RSA was hit by one of these attacks, and it was no accident that RSA is a highly trusted security provider. RSA employees received innocent-looking emails that looked like insider emails, but were spoofs that contained malware. When opened, the malware allowed the bad guys to spy on RSA long enough to launch an even sneakier, more effective phishing campaign against RSA’s client, Lockheed Martin. Not only were identities stolen, but RSA’s hard-earned trust was dealt a decisive blow.

Such attacks are just the tip of the iceberg. And because our entire email ecosystem is predicated on trust, it’s critical for all parties, not just ISPs, to protect inbound and outbound mail. Often overlooked, message streams are frequently the original source of more complex attacks, and if they are compromised, criminals can proceed despite the most robust network security provisions.

But where to begin?

With the right strategy.  My co-author Dave Lewis addressed this in the previous post, but we’re setting out some new ideas about messaging security in a new white paper. Entitled Safeguarding Message Streams for Enterprises and Email Service Providers, the paper outlines seven principles for an effective strategy, and models for putting those principles into action to protect inbound and outbound mail. We’re eager to hear your thoughts on this important topic, so please have a read and comment below.

1 Comment

Related Content

How to be a Booth Gopher...if you Must! - Part 1 of 2

Senior Messaging Engineer, Steve Tuck, outlines his best practices for being a booth gopher: managing and executing a successful event booth.

read more

A 20 Step Plan to Being Viscerally Horrified of Public Speaking and Giving a Talk Anyway

Site Reliability Engineer and seasoned public speaker, Dave Josephsen, outlines his workflow for writing, practicing, and presenting tech-talks.

read more

Chris McFadden talks about SparkPost Signals on theCUBE at AWS re:Invent 2018

SparkPost's VP of Engineering & Cloud Operations, Chris McFadden, talked email and SparkPost Signals on theCUBE at AWS re:Invent 2018.

read more

Get started and start sending

Try SparkPost and see how easy it is to deliver your app’s email on time and to the inbox.

Try Free

Send this to a friend