I'm sorry that we didn't post a new article yesterday but, you see, my hard drive crashed. And so today I want to talk to you about the importance of regular backups, and to share with you my own backup set-up which, I'm happy to say, was very effective.
What do a spammer and two legitimate email marketers have in common? They all had their brand new IP addresses blocked as soon as they started using them. And you can too. Here's how.
You know, sometimes it's the silliest, most boneheaded things which trip us up. This is true for your email too. See if you can spot the mistakes in this email (this is a genuine, unretouched email, other than our changing the name of the service to "Geegaw" in order to protect the hapless).
Once upon a time somebody - somewhere - somehow decided that it would be good idea to send email to their mailing lists using an email address in their "From:" field that didn't really exist. But sending email "from" an email address that doesn't really exist is a spectacularly bad idea. In fact, it may even qualify as the Epic Fail of "from" email address ideas.
Most legitimate mail senders know to process bounce messages. This means that if they get what is called a "hard bounce" for an email address on their list (meaning that the bounce tells them that the email address simply doesn't exist), they remove the email address from their list permanently. But more and more ISPs are inserting the bounce message right into your mail log, right at the time of the SMTP transaction, instead. If you don't check your mail logs regularly, you'll never see the bounce.
Get to the Inbox by SuretyMail Email Deliverability Company Inbox Logo
Just mention the term 'DNS', and many email senders' eyes glaze over; say "rDNS" and a look of panic may replace the glaze. Yet, not only are these not complicated concepts, but having rDNS set up is critical to having consistent, good email delivery. Use our free rDNS check tool to confirm whether you have rDNS set up correctly.
Yesterday we talked about why you should give each of your customers their own IP address. But for various reasons, not everybody can do that - at least not right away - and so, as promised, today we are going to talk about segregating your outbound mail across different IP addresses based on opt-in quality.
DKIM (DomainKeys Identified Mail) is an important authentication mechanism to help protect both email receivers and email senders from forged and phishing email. Here's how to set up and use DKIM.
Hopefully by now you have read our article about what the big Yahoo DMARC p=reject rejection means for you and your email. And you may or may not be aware that yesterday AOL did the exact same thing, also publishing a DMARC policy of p=reject, which means, essentially, "reject any email coming from a yahoo.com or aol.com address if it was not sent through a Yahoo or AOL mail server."
If you are a business or commercial email sender, you can't help but have heard about the big issue with Yahoo that unfolded over this past week, having to do with Yahoo, DMARC, "p=reject", and Yahoo's rejection and bouncing of billions of pieces of email. But what does it mean for you, the commercial email sender?
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Filter by Categories
Content Issues
Email Authentication
Email List Building
Feedback Loops
Mailing List Hygiene
Monitoring and Tracking
Opt-in Practices
Our News
Privacy & Email Laws
Sending Practices
Spam Complaints
Technical Stuff
The Industry

Join our email community and get
How to Stay Out of the Spam Folder 
& How to Grow Your Email List free!

 Get to the Inbox by SuretyMail
The Original Email Deliverability Company

Free stuff!
Skip to content