SlideShare una empresa de Scribd logo
1 de 65
Descargar para leer sin conexión
Keeping Your App's Email out of
the SPAM folder
Elmer Thomas
Hacker in Residence
@thinkingserious
“If your emails don’t make it to the Inbox,
you are talking to yourself. Not cool.”
- Email Sending Ninja, Elmer Thomas
I want you to stop talking to yourself.
Definitions & Assumptions
How SPAM Filters Work
The Key: Reputation
Securing Your Identity
Infrastructure
Content & Relevancy
Analytics
The SPAM Game!
Sender’s Outbox Recipient’s Inbox
Sender’s Outbox Recipient’s Inbox
Sender’s Mail Server (MTA)
The Internet
Recipient’s Mail Server
(MTA)
Anti-Spam Filter
TRANSACTIONAL
Confirmations
Alerts
Notifications
Receipts
Password Delivery
Account Verifications
Statements
Shipping Notifications
Reminders
Cancellations
Updates
Announcements
22% of Opt-in Email Missing from
Subscribers’ Inboxes!
Email Deliverability
=
Getting to the Inbox
User Interaction
Tracking
Heuristics, Statistics & Magic
Reputation
Discover the Keys to
Building Your Reputation
Relevant, Properly Formatted Email
Send the
right message
to the
right person
at the
right time
with the
right frequency
0
15
30
45
60
M T W Th F S Su
Emails Sent
Few Complaints
SPAM
Few Bounces
Pro Infrastructure
Don’t Get Blacklisted
https://www.senderscore.org/blacklistlookup
http://www.mxtoolbox.com/blacklists.aspx
http://www.dnsstuff.com/docs/ip4r/
Transactional Emails are Exempt from
CAN-SPAM
Learn How to Confirm Your Identity
Through Email Authentication
in 5 Steps
Audit your Computers
Sender Policy Framework (SPF)
SenderID
Domain Keys Identified Mail (DKIM)
Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx
SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-validation-verisimilitude
DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
Update Your DNS Records
Sign Outbound Email with DKIM
Test
Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html
Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.html
Sender Policy Framework: http://www.openspf.org/Tools
How To Setup a Professional Infrastructure
127.0.0.1
Secure Your Servers
postmaster and abuse
@yourdomain.com
Loops
Receive Your Emails
127.0.0.1
Learn About List Management
Never
Never
Never
NEVA!!!
Keep Clean
Double Opt-In
Hard Bounce = Go Away
Soft Bounce = Call Me Later
Content and Relevancy
Segment Wisely
Avoid Trigger Words & Phishing
Phrases
100 SPAM Trigger Words & Phrases to Avoid:
http://blog.mannixmarketing.com/2009/08/spam-trigger-words/
Short List of Common Phishing Phrases:
http://www.24hoursupport.com/index.php?option=com_content&task=view&id=192&Itemid=1
HTML + Text
SPAM Check
spamchecker.org
Text : Image Ratio
Too BIG
HTML, CSS and Images
validator.w3.org
Send the
right message
to the
right person
at the
right time
with the
right frequency
Build and Maintain Your Reputation
Check All of the Technical Checkboxes
Be Relevant
Monitor, Review and Improve
Analyze, Measure, Improve
Now you can stop talking to yourself.
Thanks!
To learn more, check out:
http://go.sendgrid.com/DeliverabilityGuide.html
or feel free to reach out:
elmer.thomas@sendgrid.com
@thinkingserious

Más contenido relacionado

Similar a Keeping Your App's Email out of the SPAM Folder

Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessSendio
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as SpamMoving Up Mobile
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)marwaleed
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 

Similar a Keeping Your App's Email out of the SPAM Folder (20)

Web spam
Web spamWeb spam
Web spam
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
Email basics
Email basicsEmail basics
Email basics
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam!
Spam!Spam!
Spam!
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's Business
 
Direct Mail vs. SPAM
Direct Mail vs. SPAMDirect Mail vs. SPAM
Direct Mail vs. SPAM
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as Spam
 
Spam Traps 101
Spam Traps 101Spam Traps 101
Spam Traps 101
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Keeping Your App's Email out of the SPAM Folder

Notas del editor

  1. ## Keep Your App's Email Out of the SPAM Folder Drawing from his experience at SendGrid, which has delivered over 114 billion emails on behalf of over 130,000 customers, Elmer will teach you the factors that determine whether your email will hit the inbox and the practical steps you can take today to avoid the SPAM folder and ensure that your customers receive the communications they expect. ## Bio: Elmer Thomas Elmer is formally trained as a Computer & Electrical Engineer with a B.S. in Computer Engineering and a Masters in Electrical Engineering (Focus was on Control Systems, specifically with GPS navigation systems) at the Univeristy of California, Riverside. Afterwards, he added a few mentors, then some sales and marketing skills to his repertoire and co-founded several companies, including AboveTheLimit.com , ThemBid.com and L ogoBids.com . He then began at SendGrid as a Web Development Manager (along with the many hats early SendGrid'ers wore), then moved to a Product Development role. Currently, Elmer is SendGrid's Hacker in Residence. His mission is to help SendGrid live up to its slogan: "Email Delivery. Simplified" by improving the lives of developers, both internally and externally. He is known in social media circles as ThinkingSerious.
  2. Summary Treat this topics as a checklist to follow.
  3. How Email Appears to Work
  4. How Email Actually Works
  5. What kind of emails are we talking about?
  6. Source: Email_Intelligence_Report_-_Placement_Benchmarks_1H_2013.pdf Next is video summary
  7. So what is email deliverability anyway? It’s getting to the inbox vs. junk/bulk/missing
  8. Most Important fact: Delivery is never guaranteed
  9. What happens when these emails don’t get delivered? It’s pretty much the end of the world. - no purchase confirmations - no shipping information - no password resets - lost revenue - never get to meet that special someone at your favorite dating site Image Source: http://hubcityblues.wordpress.com
  10. What happens when these emails get delivered? Unicorns and rainbows, of course. (and sometimes cupcakes and lollipops) :) - establish trust - better conversions Image Source: http://maxtheunicorn.blogspot.com
  11. Let’s talk about how SPAM filters work. Understanding what stands between you and the inbox is key. Image Source: http://sendgrid.com/blog/10-tips-to-keep-email-out-of-the-spam-folder
  12. Some measure and track user interaction (messages that aren't read, or aren't opened and clicked on, are more likely to be sent to the Junk folder) Image Source: http://www.umnet.com
  13. Some use heuristics (rules, often with regular expressions, to search for spammy content), message structure (does this look like a Newsletter we've seen before?), message fingerprinting (look up fingerprint to see if it matches know spam) and/or statistical methods (Bayesian filter: Does this message contain words similar to known spam or known clean messages?)
  14. Some use human user feedback and community voting ("This is spam" button in mail client or webmail app.)
  15. Some look at sender reputation (based on sending IP or domain) Image Source: http://myfirstfarce.blogspot.com
  16. ...but there's no silver bullet. Spammers adapt. Filters adapt. Some innocent messages get caught in the crossfire (false positives). Image Source: http://sbrownehr.com
  17. Building Your Reputation Why? Because it's a key factor that determines if you hit the Inbox Image Source: http://herocomplex.latimes.com
  18. The formula Send Relevant, Properly Formatted Email. If they asked to be alerted, send an alert. I will go into detail during the Content & Relevancy portion
  19. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  20. Consistent Volume Predictable
  21. Very Few Complaints Re-iterate the relevancy formula Image Source: http://www.goodfinancialcents.com
  22. Avoid SPAM Traps Image Source: http://instanttrap.com /
  23. Low Bounce Rates Image Source: http://www.cybersalt.org/
  24. Professionally Configured Infrastructure Source: http://www.motifake.com
  25. No Blacklist Appearance See List Management section for help keeping off of black lists Blacklist checking resources: https://www.senderscore.org/blacklistlookup http://www.mxtoolbox.com/blacklists.aspx h ttp://www.dnsstuff.com/docs/ip4r/ Image Source: http://www.deliverability.com
  26. Comply with CAN-SPAM or face penalties up to $16,000 Reference: www.ftc.gov—bus61.shtm Note: If your email contains only transactional emails or relationship content, then you are exempt from these rules; however, you must still not include false or misleading routing information.
  27. Check your Sender Score here: https://www.senderscore.org Email Deliverability Checker: https://chrome.google.com/w ebstore/detail/mbfenkanhbafpdmlmhiicehikmfccebb
  28. Step 1: Identify all machines that send mail for your company and determine the IPs and sending domains used. Source Image: http://www.limonwhitaker.com
  29. Step 2: Create your authentication records Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-vali dation-verisimilitude DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
  30. Step 3: Publish your authentication records via your DNS records
  31. Step 4: Setup your mail server to sign outbound email with DKIM Reference: http://www.sendmail.com/sm/wp/dkim
  32. Step 5: Test by publishing in "test" mode. Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.ht ml Sender Policy Framework: http://www.openspf.org/T ools Keep an eye on DMARC: http://sendgrid.com/blog/what-is-dmarc-and-why-sh ould-you-care/ Image Source : http://www.geeky-gadgets.com
  33. Make sure your Infrastructure is Sound
  34. Get a dedicated IP address. Use separate IPs for your transactional and marketing emails.
  35. Secured servers
  36. Setup and monitor "postmaster" and "abuse" mailboxes
  37. Signed up for ISP Feedback Loops Resource: http://blog.whitesites.com/ISP-Feedback-Loop-list__634207841076562500_blog.htm Image Source: http://microadvert.net
  38. Is your sending domain able to receive mail? Don’t use [email_address]
  39. Warm up your IPs and do not switch IPs to resolve deliverability problems
  40. List Management
  41. Don't rent or buy email lists, ever!
  42. Keep your lists clean Image Source: http://en.wikipedia.org
  43. Use an industry standard opt-in process. The best is confirmed opt-in (aka double opt-in) where you send the subscriber a verification email that requires confirmation (click link) before you add them to your list.  Senders should store proof of their subscribers' confirmed opt-in status. (New Canadian anti-spam law requires senders to show proof of subscriber opt-in if a case comes to court.)
  44. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  45. Engage! What kind of data are ISPs using to determine engagement? Beyond opens and clicks to your specific message, ISPs are use TiNS data (“This is not spam), panel data, trusted reporter data and inactive accounts as measures of engagement. TiNs data is gathered from users actively clicking a button that says “This is Not Spam.” This shows that users really want your email and will help improve your reputation metrics over time. Panel data is a panel of users that determine whether email messages have been correctly marked as spam based on specific criteria specified by the email providers. Trusted reporter data is culled from accounts that have proven to be real users who display normal behavior when interacting with their email messages. To avoid issues overall, employ strong permissioning practices. Inactive accounts are mailboxes that do not have regularly activity. To avoid mailing to inactive accounts, segment out inactives every six months and alter your email strategy in consideration of their lack of response. As a sender, you are not privy to these metrics, but knowing that some ISPs are using this data to determine inbox placement helps you prioritize your goals when it comes to list hygiene, messaging and your overall email strategy. Use SendGrid's Event API to gather real-time engagement metrics so they can segment their list better
  46. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  47. Make it easy to unsubscribe so they don't hit the "This is SPAM" button Image Source: http://www.damiansaunders.net
  48. Segment by demographics, interests and purchase behavior to increase relevancy and value Image Source: http://www.huffingtonpost.com
  49. 100 SPAM Trigger Words & Phrases to Avoid: http://blog.mannixmarketing.com/2009/08/spam-trigger-words/ Short List of Common Phishing Phrases: http://www.24hoursupport.com/index.php?option=com_content&t ask=view&id=192&Itemid=1
  50. Include a text version if sending HTML Emails
  51. Maintain a good text to image ratio. Don't send any image-only emails. For every graphic include 2 lines of text. Optimize your images.
  52. Use the ALT tag & store images on a web server. Don't use CSS. Double check your message's HTML content code: validator.w3.org
  53. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  54. Key Takeaways
  55. http://blog.sendgrid.com/email-deliverability-metrics-7-metrics-watch-prevent-delivery-failures/
  56. Please remember though, sometimes other forms of communications can be superior to email ;)
  57. Either play the name that SPAM game, or the create the worlds worst SPAM message game, depending on the audience.