SlideShare une entreprise Scribd logo
1  sur  65
Télécharger pour lire hors ligne
Keeping Your App's Email out of
the SPAM folder
Elmer Thomas
Hacker in Residence
@thinkingserious
“If your emails don’t make it to the Inbox,
you are talking to yourself. Not cool.”
- Email Sending Ninja, Elmer Thomas
I want you to stop talking to yourself.
Definitions & Assumptions
How SPAM Filters Work
The Key: Reputation
Securing Your Identity
Infrastructure
Content & Relevancy
Analytics
The SPAM Game!
Sender’s Outbox Recipient’s Inbox
Sender’s Outbox Recipient’s Inbox
Sender’s Mail Server (MTA)
The Internet
Recipient’s Mail Server
(MTA)
Anti-Spam Filter
TRANSACTIONAL
Confirmations
Alerts
Notifications
Receipts
Password Delivery
Account Verifications
Statements
Shipping Notifications
Reminders
Cancellations
Updates
Announcements
22% of Opt-in Email Missing from
Subscribers’ Inboxes!
Email Deliverability
=
Getting to the Inbox
User Interaction
Tracking
Heuristics, Statistics & Magic
Reputation
Discover the Keys to
Building Your Reputation
Relevant, Properly Formatted Email
Send the
right message
to the
right person
at the
right time
with the
right frequency
0
15
30
45
60
M T W Th F S Su
Emails Sent
Few Complaints
SPAM
Few Bounces
Pro Infrastructure
Don’t Get Blacklisted
https://www.senderscore.org/blacklistlookup
http://www.mxtoolbox.com/blacklists.aspx
http://www.dnsstuff.com/docs/ip4r/
Transactional Emails are Exempt from
CAN-SPAM
Learn How to Confirm Your Identity
Through Email Authentication
in 5 Steps
Audit your Computers
Sender Policy Framework (SPF)
SenderID
Domain Keys Identified Mail (DKIM)
Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx
SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-validation-verisimilitude
DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
Update Your DNS Records
Sign Outbound Email with DKIM
Test
Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html
Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.html
Sender Policy Framework: http://www.openspf.org/Tools
How To Setup a Professional Infrastructure
127.0.0.1
Secure Your Servers
postmaster and abuse
@yourdomain.com
Loops
Receive Your Emails
127.0.0.1
Learn About List Management
Never
Never
Never
NEVA!!!
Keep Clean
Double Opt-In
Hard Bounce = Go Away
Soft Bounce = Call Me Later
Content and Relevancy
Segment Wisely
Avoid Trigger Words & Phishing
Phrases
100 SPAM Trigger Words & Phrases to Avoid:
http://blog.mannixmarketing.com/2009/08/spam-trigger-words/
Short List of Common Phishing Phrases:
http://www.24hoursupport.com/index.php?option=com_content&task=view&id=192&Itemid=1
HTML + Text
SPAM Check
spamchecker.org
Text : Image Ratio
Too BIG
HTML, CSS and Images
validator.w3.org
Send the
right message
to the
right person
at the
right time
with the
right frequency
Build and Maintain Your Reputation
Check All of the Technical Checkboxes
Be Relevant
Monitor, Review and Improve
Analyze, Measure, Improve
Now you can stop talking to yourself.
Thanks!
To learn more, check out:
http://go.sendgrid.com/DeliverabilityGuide.html
or feel free to reach out:
elmer.thomas@sendgrid.com
@thinkingserious

Contenu connexe

Similaire à Keeping Your App's Email out of the SPAM Folder

Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessSendio
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as SpamMoving Up Mobile
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)marwaleed
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 

Similaire à Keeping Your App's Email out of the SPAM Folder (20)

Web spam
Web spamWeb spam
Web spam
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
Email basics
Email basicsEmail basics
Email basics
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam!
Spam!Spam!
Spam!
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's Business
 
Direct Mail vs. SPAM
Direct Mail vs. SPAMDirect Mail vs. SPAM
Direct Mail vs. SPAM
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as Spam
 
Spam Traps 101
Spam Traps 101Spam Traps 101
Spam Traps 101
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 

Dernier

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Keeping Your App's Email out of the SPAM Folder

Notes de l'éditeur

  1. ## Keep Your App's Email Out of the SPAM Folder Drawing from his experience at SendGrid, which has delivered over 114 billion emails on behalf of over 130,000 customers, Elmer will teach you the factors that determine whether your email will hit the inbox and the practical steps you can take today to avoid the SPAM folder and ensure that your customers receive the communications they expect. ## Bio: Elmer Thomas Elmer is formally trained as a Computer & Electrical Engineer with a B.S. in Computer Engineering and a Masters in Electrical Engineering (Focus was on Control Systems, specifically with GPS navigation systems) at the Univeristy of California, Riverside. Afterwards, he added a few mentors, then some sales and marketing skills to his repertoire and co-founded several companies, including AboveTheLimit.com , ThemBid.com and L ogoBids.com . He then began at SendGrid as a Web Development Manager (along with the many hats early SendGrid'ers wore), then moved to a Product Development role. Currently, Elmer is SendGrid's Hacker in Residence. His mission is to help SendGrid live up to its slogan: "Email Delivery. Simplified" by improving the lives of developers, both internally and externally. He is known in social media circles as ThinkingSerious.
  2. Summary Treat this topics as a checklist to follow.
  3. How Email Appears to Work
  4. How Email Actually Works
  5. What kind of emails are we talking about?
  6. Source: Email_Intelligence_Report_-_Placement_Benchmarks_1H_2013.pdf Next is video summary
  7. So what is email deliverability anyway? It’s getting to the inbox vs. junk/bulk/missing
  8. Most Important fact: Delivery is never guaranteed
  9. What happens when these emails don’t get delivered? It’s pretty much the end of the world. - no purchase confirmations - no shipping information - no password resets - lost revenue - never get to meet that special someone at your favorite dating site Image Source: http://hubcityblues.wordpress.com
  10. What happens when these emails get delivered? Unicorns and rainbows, of course. (and sometimes cupcakes and lollipops) :) - establish trust - better conversions Image Source: http://maxtheunicorn.blogspot.com
  11. Let’s talk about how SPAM filters work. Understanding what stands between you and the inbox is key. Image Source: http://sendgrid.com/blog/10-tips-to-keep-email-out-of-the-spam-folder
  12. Some measure and track user interaction (messages that aren't read, or aren't opened and clicked on, are more likely to be sent to the Junk folder) Image Source: http://www.umnet.com
  13. Some use heuristics (rules, often with regular expressions, to search for spammy content), message structure (does this look like a Newsletter we've seen before?), message fingerprinting (look up fingerprint to see if it matches know spam) and/or statistical methods (Bayesian filter: Does this message contain words similar to known spam or known clean messages?)
  14. Some use human user feedback and community voting ("This is spam" button in mail client or webmail app.)
  15. Some look at sender reputation (based on sending IP or domain) Image Source: http://myfirstfarce.blogspot.com
  16. ...but there's no silver bullet. Spammers adapt. Filters adapt. Some innocent messages get caught in the crossfire (false positives). Image Source: http://sbrownehr.com
  17. Building Your Reputation Why? Because it's a key factor that determines if you hit the Inbox Image Source: http://herocomplex.latimes.com
  18. The formula Send Relevant, Properly Formatted Email. If they asked to be alerted, send an alert. I will go into detail during the Content & Relevancy portion
  19. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  20. Consistent Volume Predictable
  21. Very Few Complaints Re-iterate the relevancy formula Image Source: http://www.goodfinancialcents.com
  22. Avoid SPAM Traps Image Source: http://instanttrap.com /
  23. Low Bounce Rates Image Source: http://www.cybersalt.org/
  24. Professionally Configured Infrastructure Source: http://www.motifake.com
  25. No Blacklist Appearance See List Management section for help keeping off of black lists Blacklist checking resources: https://www.senderscore.org/blacklistlookup http://www.mxtoolbox.com/blacklists.aspx h ttp://www.dnsstuff.com/docs/ip4r/ Image Source: http://www.deliverability.com
  26. Comply with CAN-SPAM or face penalties up to $16,000 Reference: www.ftc.gov—bus61.shtm Note: If your email contains only transactional emails or relationship content, then you are exempt from these rules; however, you must still not include false or misleading routing information.
  27. Check your Sender Score here: https://www.senderscore.org Email Deliverability Checker: https://chrome.google.com/w ebstore/detail/mbfenkanhbafpdmlmhiicehikmfccebb
  28. Step 1: Identify all machines that send mail for your company and determine the IPs and sending domains used. Source Image: http://www.limonwhitaker.com
  29. Step 2: Create your authentication records Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-vali dation-verisimilitude DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
  30. Step 3: Publish your authentication records via your DNS records
  31. Step 4: Setup your mail server to sign outbound email with DKIM Reference: http://www.sendmail.com/sm/wp/dkim
  32. Step 5: Test by publishing in "test" mode. Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.ht ml Sender Policy Framework: http://www.openspf.org/T ools Keep an eye on DMARC: http://sendgrid.com/blog/what-is-dmarc-and-why-sh ould-you-care/ Image Source : http://www.geeky-gadgets.com
  33. Make sure your Infrastructure is Sound
  34. Get a dedicated IP address. Use separate IPs for your transactional and marketing emails.
  35. Secured servers
  36. Setup and monitor "postmaster" and "abuse" mailboxes
  37. Signed up for ISP Feedback Loops Resource: http://blog.whitesites.com/ISP-Feedback-Loop-list__634207841076562500_blog.htm Image Source: http://microadvert.net
  38. Is your sending domain able to receive mail? Don’t use [email_address]
  39. Warm up your IPs and do not switch IPs to resolve deliverability problems
  40. List Management
  41. Don't rent or buy email lists, ever!
  42. Keep your lists clean Image Source: http://en.wikipedia.org
  43. Use an industry standard opt-in process. The best is confirmed opt-in (aka double opt-in) where you send the subscriber a verification email that requires confirmation (click link) before you add them to your list.  Senders should store proof of their subscribers' confirmed opt-in status. (New Canadian anti-spam law requires senders to show proof of subscriber opt-in if a case comes to court.)
  44. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  45. Engage! What kind of data are ISPs using to determine engagement? Beyond opens and clicks to your specific message, ISPs are use TiNS data (“This is not spam), panel data, trusted reporter data and inactive accounts as measures of engagement. TiNs data is gathered from users actively clicking a button that says “This is Not Spam.” This shows that users really want your email and will help improve your reputation metrics over time. Panel data is a panel of users that determine whether email messages have been correctly marked as spam based on specific criteria specified by the email providers. Trusted reporter data is culled from accounts that have proven to be real users who display normal behavior when interacting with their email messages. To avoid issues overall, employ strong permissioning practices. Inactive accounts are mailboxes that do not have regularly activity. To avoid mailing to inactive accounts, segment out inactives every six months and alter your email strategy in consideration of their lack of response. As a sender, you are not privy to these metrics, but knowing that some ISPs are using this data to determine inbox placement helps you prioritize your goals when it comes to list hygiene, messaging and your overall email strategy. Use SendGrid's Event API to gather real-time engagement metrics so they can segment their list better
  46. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  47. Make it easy to unsubscribe so they don't hit the "This is SPAM" button Image Source: http://www.damiansaunders.net
  48. Segment by demographics, interests and purchase behavior to increase relevancy and value Image Source: http://www.huffingtonpost.com
  49. 100 SPAM Trigger Words & Phrases to Avoid: http://blog.mannixmarketing.com/2009/08/spam-trigger-words/ Short List of Common Phishing Phrases: http://www.24hoursupport.com/index.php?option=com_content&t ask=view&id=192&Itemid=1
  50. Include a text version if sending HTML Emails
  51. Maintain a good text to image ratio. Don't send any image-only emails. For every graphic include 2 lines of text. Optimize your images.
  52. Use the ALT tag & store images on a web server. Don't use CSS. Double check your message's HTML content code: validator.w3.org
  53. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  54. Key Takeaways
  55. http://blog.sendgrid.com/email-deliverability-metrics-7-metrics-watch-prevent-delivery-failures/
  56. Please remember though, sometimes other forms of communications can be superior to email ;)
  57. Either play the name that SPAM game, or the create the worlds worst SPAM message game, depending on the audience.