Source: http://blog.wordtothewise.com/ --------------- Time for a real security response Iâ€™ve seen a number of people and blogs address the recent breaches at some large ESPs make recommendations on how to fix things. Most of them are so far from right theyâ€™re not even wrong. One group is pointing at consumers and insisting consumers be taught to secure their machines. But consumers werenâ€™t compromised here. Another group is pointing to senders and insisting senders start authenticating all their email. But the failure wasnâ€™t in authentication and some of the mail is coming through the ESP systems and is authenticated. Still others are claiming that ISPs need to step up their filtering. But the problem wasnâ€™t with the ISPs letting too much email through. The other thing thatâ€™s been interesting is to watch groups jump on this issue to promote their pet best practices. DKIM proponents are insisting everyone sign email with DKIM. Extended SSL proponents are insisting everyone use extended SSL. But the problem wasnâ€™t with unsigned email or website trust. All of these solutions fail to address the underlying issue: ESPs do not have sufficient security in place to prevent hackers from getting into their systems and stealing their customersâ€™ data. ESPs must address real security issues. Not security issues with sending mail, but restricting the ability of hackers to get into their systems. This includes employee training as well as hardening of systems. These are valuable databases that can be compromised by getting someone inside support to click on a phish link. Not everyone inside an ESP needs access to address lists. Not everyone inside an ESP customer needs full access to address lists. ESPs must implement controls on who can touch, modify, or download address lists. These controls must address technical attacks, spear phishing attacks and social engineering attacks. Whatâ€™s happening here actually looks a lot like the Comodo certificate attack or the RSA compromise. Itâ€™s time for the ESP industry to step up and start taking system security seriously.