To Enterprises and ESPs: A Warning

Mike Hillyer
Oct. 18, 2011 by Mike Hillyer

Don’t talk to ISPs about messaging threats. For them, the topic is old hat. Every day, ISPs are bombarded by messaging attacks, and each is one more targeted, more fiendish, more sophisticated than the one before.

Email Devil

Rather, today’s most dangerous attacks are aimed at particular organizations or people, and they employ highly sophisticated strategies combining identity theft, spoofing and malware. They use an intimate knowledge of the targeted organization and its partners, and they employ every strategy known to marketers to make their communications seem legitimate and relevant. Motivated by financial gain, these cybercriminals ultimately erode the necessary foundation of trust between enterprises, ESPs and customers.

Just last year, RSA was hit by one of these attacks, and it was no accident that RSA is a highly trusted security provider. RSA employees received innocent-looking emails that looked like insider emails, but were spoofs that contained malware. When opened, the malware allowed the bad guys to spy on RSA long enough to launch an even sneakier, more effective phishing campaign against RSA’s client, Lockheed Martin. Not only were identities stolen, but RSA’s hard-earned trust was dealt a decisive blow.

Such attacks are just the tip of the iceberg. And because our entire email ecosystem is predicated on trust, it’s critical for all parties, not just ISPs, to protect inbound and outbound mail. Often overlooked, message streams are frequently the original source of more complex attacks, and if they are compromised, criminals can proceed despite the most robust network security provisions.

But where to begin?

With the right strategy.  My co-author Dave Lewis addressed this in the previous post, but we’re setting out some new ideas about messaging security in a new white paper. Entitled Safeguarding Message Streams for Enterprises and Email Service Providers, the paper outlines seven principles for an effective strategy, and models for putting those principles into action to protect inbound and outbound mail. We’re eager to hear your thoughts on this important topic, so please have a read and comment below.

1 Comment

Related Content

Emailchella: How Music Festivals Send Email

Check out a few examples of how some of the leading music festivals send email before, during, and after their respective events to facilitate great CX.

read more

Looping Event Booth Videos: Lights, Camera, Action! - Part 2 of 2

Our step-by-step guide will teach you how to make your event booth video file play on a low-cost device such as an Amazon Fire TV Stick.

read more

The Challenges of High-Volume Senders

Join us for our upcoming webinar on March 26th with Blueshift and LendingTree where we will discuss and address the challenges of high-volume senders.

read more

Get started and start sending

Try SparkPost and see how easy it is to deliver your app’s email on time and to the inbox.

Try Now

Send this to a friend