Mastering Your Email Reputation: Seven Strategies for Improving

Total Page:16

File Type:pdf, Size:1020Kb

Mastering Your Email Reputation: Seven Strategies for Improving WHITE PAPER | AugusT 2008 Best Practices in Email Marketing Mastering Your Email Reputation: seven strategies for Improving Deliverability Effective tips and best practices for safeguarding your email sender reputation in today’s ever-changing email environment PUBLISHED BY: StrongMail Systems, Inc. StrongMail Systems UK, Ltd 1300 Island Drive, Suite 200 Prospect House, Crendon Street Redwood City, CA 94065 High Wycombe, Bucks Telephone: (650) 421-4200 HP13 6LA Facsimile: (650) 421-4201 Telephone: +44 (0) 1494 435 120 Copyright © 2008 StrongMail Systems, Inc. All rights reserved. No part of the contents of this publication may be reproduced or transmitted in any form or by any means without the written permission of StrongMail Systems, Inc. STRONGMAIL and the STRONGMAIL logo are registered trademarks in the United States, other countries or both. All Rights Reserved. StrongMail Systems UK, Ltd is a company registered in England and Wales at Carmelite, 50 Victoria Embankment, Blackfriars, London EC4Y 0DX. Reg. No. 6398867. VAT # GB 925 07 6228. Trading Address: Prospect House, Crendon Street, High Wycombe, Bucks HP13 6LA. www.strongmail.com Table of Contents STRATEGY 1: MAINTAIN A CLEAN LIST .......................................................................1 Bounce Management .............................................................................................................1 List Hygiene ................................................................................................................................3 Feedback Loops ........................................................................................................................3 Spam Traps .................................................................................................................................4 STRATEGY 2: ADOPT EmAIL AUTHENTICATION .......................................................4 Forms of Email Authentication ............................................................................................5 Email Authentication Adoption ..........................................................................................5 STRATEGY 3: REDUCE COMPLAINT RATES ................................................................6 Relevancy ....................................................................................................................................6 Frequency ...................................................................................................................................6 Privacy Policy and Permissions............................................................................................6 STRATEGY 4: MONITOR YOUR SENDER REPUTATION .............................................7 Blacklists / Blocklists ................................................................................................................7 NANAE ..........................................................................................................................................8 SenderScore.org .......................................................................................................................8 SNDS .............................................................................................................................................8 Key Performance Indicators .................................................................................................8 STRATEGY 5: AVOID ALLIANCES WITH DISREPUTABLE PARTNERS ......................9 STRATEGY 6: VERIFY SETUP OF COmmERCIAL EmAIL SERVER .............................9 STRATEGY 7: RAMP UP NEW IPs SLOWLY ...............................................................10 CONCLUSION ................................................................................................................10 ABOUT STRONGMAIL SYSTEms ................................................................................11 Whether you know it or not, ISPs constantly check your reputation as a commercial email sender and filter or block messages accordingly. Gone are the days when receiving domains filtered on content and keywords alone. In fact, according to Return Path1, more than 80 percent of delivery problems today are caused by the sender’s email reputation. Given the important role that sender reputation plays in getting your email delivered, you need to take an active role in ensuring that your practices don’t prevent your messages from reaching the inbox – or being blocked entirely. Promotional emails aren’t the only messages at stake. The delivery of business-critical transactional emails are also affected by your sender reputation. Put simply, you can’t afford to overlook this increasingly important component of email deliverability. While there isn’t one standardized formula that all ISPs use to assess your sender reputation, there are a number of metrics and attributes that play a “A study by Return Path critical role, including complaint rate, bounce rate, sending infrastructure, indicates that more and spam trap and blocklist inclusions. Understanding the actions and best practices that can have a positive impact is critical, and this whitepaper will than 80% of delivery outline seven of the most important strategies for measuring, managing problems are caused and maintaining your reputation as a commercial email sender. by reputation.” George Bilbrey, GM of Delivery Assurance, Return Path STRATEGY 1: MAINTAIN A CLEAN LIST List hygiene is one of the most important practices that you can engage in – both from a reputation and results standpoint. Sending to bad addresses not only skews your response rates, it is a core metric that ISPs use to determine your sender reputation. The following sections offer proven advice for maintaining a clean list. Bounce Management Bounce management plays a principle role in list hygiene, as it’s the primary mechanism for tracking and responding to the failure codes that you receive from ISPs and other domains. ISPs and other receiving domains issue these bounce codes to let the sender know why a message has failed, and very few follow any standard protocols. As a result, you need to ensure that you have a robust bounce management system that can automatically process and correctly categorize varying bounce codes, so that you can address the causes of those failures. 1 DM News, “Questions and Answers About Sending Reputation,” February 2008 1 Mastering Your Email Reputation: Seven Strategies for Improving Deliverability Copyright © 2008 StrongMail Systems, Inc. All rights reserved. SM-AP10808 When evaluating your bounce management system and practices, you will want to ensure that they allow you to overcome the following five challenges: 1. Capture All Data Streams. You need to capture all data streams, including asynchronous and synchronous bounces. While most bounce systems capture the immediate synchronous bounces, it’s equally important to capture asynchronous bounces, which can be delayed by hours or days. 2. Interpret Data. You need to process bounce data and correctly interpret the varying bounce descriptions that come from each receiving domain. If bounces are not properly identified or categorized, problems may go undetected and good records could be invalidated. 3. Organize Data. After acquiring the data, you need to organize it into logical categories, such as hard bounce, soft bounce, block and technical failure. By normalizing the data across ISPs, you can more accurately identify delivery problems. 4. Make Data Actionable. Once organized, you should be able to generate reports that make the data actionable in addressing the causes of failures. The reporting “Senders should should be user-friendly and available near real-time so you can easily and quickly take action to clean your list, adjust your targeting or modify other practices to improve exercise proper bounce your deliverability. management by 5. Update Rules Continually. Unfortunately, the dynamic email environment causes promptly removing ISPs to periodically update bounce codes, so you need to make sure that your rules addresses returned as are updated regularly to keep up with the changes. Verify that your bounce management system has a process for being continually updated with the latest permanent errors by an bounce codes and messages. ISP or other receiver.” Email Sender and Provider Coalition, “Principles of Email Sender Reputation,” April 2006 Challenge 1 Challenge 2 Challenge 3 Challenge 4 Capture ALL Data Streams Interpret Data Organize Data Make Data Actionable Asynchronous Bounces 554: Quota 452: 421: 452: 552: 421: 550: Violation Server Timeout Out of Storage Service Not 421: Busy Memory Exceeded Available Timeout Access 452: 421: Denied Server Service Not Busy Available Thousands of 450: 550: 450: 421: Mailbox Mailbox 421: 550: 552: 550: 554: 571: ISPs, Domains Full Relay not Relay not SPAM Spam not Quota Unsolicited DNS Permitted 550: Unavailable Too Many Failure User Errors Permitted Accepted Violation Junk Mail Unknown Mishmash of inconsistent, incomplete, 450: 550: 550: 450: 553: ever-changing failure codes and messages Mailbox Account User Mailbox Address Unavailable Inactive Unknown Full Unknown 452: Smart Bounce Processor StrongMail Delivery Reports Out of 550: Memory 554: Account No No Failures logically categorized 550: Account 552: Inactive Code Description Spam not Disabled 553: SPAM 571: for management reporting, Accepted XXX: Address Unsolicited No Code Unknown Junk Mail diagnosis and corrective action
Recommended publications
  • Delivering Results to the Inbox Sailthru’S 2020 Playbook on Deliverability, Why It’S Imperative and How It Drives Business Results Introduction to Deliverability
    Delivering Results to the Inbox Sailthru’s 2020 Playbook on Deliverability, Why It’s Imperative and How It Drives Business Results Introduction to Deliverability Every day, people receive more than 293 billion Deliverability is the unsung hero of email marketing, emails, a staggering number that only represents ultimately ensuring a company’s emails reach their the tip of the iceberg. Why? The actual number intended recipients. It’s determined by a host of of emails sent is closer to 5.9 quadrillion, with the factors, including the engagement of your subscribers overwhelming majority blocked outright or delivered and the quality of your lists. All together, these factors to the spam folder. result in your sender reputation score, which is used to determine how the ISPs treat your email stream. Something many people don’t realize is that to the Deliverability is also a background player, so far in the major Internet Service Providers (ISPs) — Gmail, shadows that many people don’t think about it, until Yahoo!, Hotmail, Comcast and AOL — “spam” there’s a major issue. doesn’t refer to marketing messages people may find annoying, but rather malicious email filled with That’s why Sailthru’s deliverability team created this scams and viruses. In order to protect their networks guide. Read on to learn more about how deliverability and their customers, the ISPs cast a wide net. If a works on the back-end and how it impacts revenue, message is deemed to be spam by the ISP’s filters, it’s your sender reputation and how to maintain a good dead on arrival, never to see the light of the inbox, as one, and best practices for list management, email protecting users’ inboxes is the top priority of any ISP.
    [Show full text]
  • Spam, Spammers, and Spam Control a White Paper by Ferris Research March 2009
    Spam, Spammers, and Spam Control A White Paper by Ferris Research March 2009. Report #810 Ferris Research, Inc. One San Antonio Place San Francisco, Calif. 94133, USA Phone: +1 (650) 452-6215 Fax: +1 (408) 228-8067 www.ferris.com Table of Contents Spam, Spammers, and Spam Control................................................3 Defining Spam.................................................................................3 Spammer Tactics .............................................................................3 Sending Mechanisms.................................................................4 Spammer Tricks.........................................................................4 Techniques for Identifying Spam ....................................................5 Connection Analysis..................................................................5 Behavioral Analysis...................................................................6 Content Scanning.......................................................................6 Controlling Spam: How and Where ................................................7 The Key Role of Reputation Services .......................................7 Conclusion: An Arms Race.............................................................8 Trend Micro Interview........................................................................9 Ferris Analyzer Information Service. Report #810. March 2009. © 2009 Ferris Research, Inc. All rights reserved. This document may be copied or freely reproduced provided you
    [Show full text]
  • Email Authentication Faqs V3
    Email Authentication GUIDE Frequently Asked QUES T ION S T OGETHER STRONGER EMAIL AUTHENTICATION Marketers that use email for communication and transactional purposes should adopt and use identification and authentication protocols.” This document will explain what authentication is – includ- ing some recommendations on what you should do as an email marketer to implement these guidelines within your organization. * This Guide should not be considered as legal advice. It is being provided for informational purposes only. Please review your email program with your legal counsel to ensure that your program is meeting appropriate legal requirements. THIS COMPLIANCE GUIDE COVERS: Basics of Email Authentication Technologies Basic FAQs on the DMA’s Email Authentication Guidelines Implementation: Complementary Types of Email Authentication Systems Beyond Authentication: Email Reputation Email Authentication Resources for Marketers 1. What Do the DMA’s Email Authentication Guidelines Require? The DMA’s guidelines require marketers to choose and implement authentication technolo- gies in their email systems. It is up to your company to decide what kind of authentication protocol to use, though all are recommended based on current-day trends. The DMA does not require nor endorse the use of any specific protocol, as there are several interoperable, inexpensive, and easy to implement solutions available today. 2. Why does the DMA Require Members to Authenticate Their Email Systems? The DMA requires its members to authenticate their email systems primarily because mailbox providers (aka ISPs, MSPs or receivers) are increasingly requiring authentication. This strongly aligns with a growing trend in the email deliverability industry that’s leaning more towards domain-based reputation (as opposed to IP-based reputation a couple of years ago).
    [Show full text]
  • WHITE PAPER Email Deliverability Review
    WHITE PAPER Email DELIVeraBility REView dmawe are the White Paper Email Deliverability Review Published by Deliverability Hub of the Email Marketing Council Sponsored by 1 COPYRIGHT: THE DIRECT MARKETING ASSOCIATION (UK) LTD 2012 WHITE PAPER Email DELIVeraBility REView Contents About this document ...............................................................................................................................3 About the authors ...................................................................................................................................4 Sponsor’s perspective .............................................................................................................................5 Executive summary .................................................................................................................................6 1. Major factors that impact on deliverability ..............................................................................................7 1.1 Sender reputation .............................................................................................................................7 1.2 Spam filtering ...................................................................................................................................7 1.3 Blacklist operators ............................................................................................................................8 1.4 Smart Inboxes ..................................................................................................................................9
    [Show full text]
  • Effectiveness and Limitations of Statistical Spam Filters
    International Conference on “New Trends in Statistics and Optimization” Effectiveness and Limitations of Statistical Spam Filters M. Tariq Banday, Lifetime Member, CSI P.G. Department of Electronics and Instrumentation Technology University of Kashmir, Srinagar, India Tariq R. Jan P. G. Department of Statistics University of Kashmir, Srinagar, India Abstract Spam is not only clogging the Internet traffic by consuming a hefty amount of network bandwidth but it is also a source for e-mail born viruses, spyware, adware and Trojan Horses. It is also used to carry out denial of service, directory harvesting and phishing attacks that directly cause financial losses. Further, the contents of spam are often offensive and contain adult oriented and fraudulent materials which are objectionable to recipients. Several anti-spam procedures are currently employed to distinguish spam from legitimate e-mails; however spammers and phishers employ dynamic spam structures to obfuscate e- mail content to circumvent these procedures. Apart from other technological procedures various adaptive learning filters have been developed that have an ability to allow an algorithm to constantly learn what sort of e-mail’s or e-mail content a recipient would typically process and what to see in normal course of its business. These filters are based on complex statistical techniques that classify future e-mails based on the word content of accepted e-mails. The statistical techniques employed in these filters separate an incoming e-mail into tokens and assign a probability value to each token. The probability of each token are collectively used to calculate the overall spam probability and accordingly the incoming e-mail is scored as spam, probably spam or legitimate e-mail.
    [Show full text]
  • Email Deliverability: the Ultimate Guide
    1 Email Deliverability: the Ultimate Guide Why does email deliverability matter? According to the "2015 Email Data Quality Trends Report" by Experian, a majority (73%) of companies experienced email deliverability issues in the past 12 months. Return Path has reported that over 20% of legitimate email are missing. Undoubtedly, marketers have problems with deliverability, and that negatively affects their business. "The most common consequences of poor email deliverability are the inability to communicate with subscribers (41%), poor customer service (24%), unnecessary costs (22%), and lost revenue (15%)" - the Experian's "2015 Email Data Quality Trends Report." How to deliver emails to the recipient's Inbox? This simplest question might have the most complicated answer. As an email marketer, you have to make people engage with your emails in a positive way: open, click, forward or reply. Recipient engagement is a powerful factor that mailbox providers rely on when filtering inbound messages. Keeping recipients engaged is not just about sending beautiful, optimized emails. It's also about positioning yourself as a reputable sender, avoiding spam filters and getting to the user's Inbox. That's where email deliverability comes in. 2 In this article, we'll touch the most important factors that determine email deliverability and should be on the mind of every marketer: 1. Permission-Based Marketing: - Single Opt-In vs. Confirmed Opt-In - Pre-checked Boxes or Passive Opt-in - Subscriber's Expectations 2. Sender Reputation: - Branding - Spam Traps - Bounces and Complaints - Monitoring Tools 3. Sending Infrastructure: - Shared IP vs. Dedicated IP - Blacklists - Email Authentication - Feedback Loops 3 1.
    [Show full text]
  • Contents Software Description:
    Swift Email Processor v2.0 www.webemailverifier.com Support: www.webemailverifier.com/supportsuite/ Contents Software Description: ................................................................................................................................... 3 Program GUI Screenshots: ............................................................................................................................ 4 Program Features: ........................................................................................................................................ 9 Chapter 1: Installation and Settings Configuration ..................................................................................... 11 Configuration and Settings: .................................................................................................................... 12 Chapter 2: Using the Proxy Servers Module ............................................................................................... 31 Chapter 2.1: X-Originating-IP email header & Proxy Acceptable Usage Policy .......................................... 35 Chapter 3: Sending Messages using the Sender Module ........................................................................... 36 3.1: Unsubscribe link placements ........................................................................................................... 49 3.2: Installing and using the MySQL/MariaDB CRUD API script or application ...................................... 50 3.2.1 Installing MySQL API on Linux Server running
    [Show full text]
  • Public Sender Score System(S3) by Esps for Email Spam Mitigation with Score…
    Paper—Public Sender Score System(S3) by ESPs for Email Spam Mitigation with Score… Public Sender Score System(S3) by ESPs for Email Spam Mitigation with Score Management in Mobile Application https://doi.org/10.3991/ijim.v14i17.16609 Lucky Kannan (), Jebakumar R SRM Institute of Science and Technology, Chennai, India [email protected] Abstract—Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, there is no common way to regulate the practices of an email sender. This proposed system is to formulate a protocol common for all the ESPs or inbox providers and a centralized system that will easily find the spammers and block them. By this method, the Email Service Providers (ESPs) or Inbox Providers need not wait for the sender behaviour and then take actions on the sender or sender domain or sender IP address. Instead, they can get the sender history of reputation from blockchain where the ESPs or Inbox Provider provides a score based on the emails they have received from the sender. The ESPs can get the Public Sender Score(S3) from the mobile application or web application which provides the score management user interface and APIs. The email marketers can also monitor their score through the application. Keywords—Email, spam detection, sender score, reputation system, blockchain, mobile application, marketing email. 1 Introduction The email industry has been functioning steadily for very long and they needed minimal or no change over the past years.
    [Show full text]
  • A Practical Guide to Protect Your Inbox Reputation and Support Your Ongoing Email Deliverability Goals Deliverability Best Practice Guide - 2019
    A PRACTICAL GUIDE TO PROTECT YOUR INBOX REPUTATION AND SUPPORT YOUR ONGOING EMAIL DELIVERABILITY GOALS DELIVERABILITY BEST PRACTICE GUIDE - 2019 For professionals in email marketing, achieving great deliverability begins with a solid understanding of email best practices. And with today’s constantly changing environment, it’s nearly impossible to keep up with current trends. At the foundation of this understanding are practices that align with legal and regulatory compliance requirements that protect consumer rights. The lens we must look through is always the customer’s. Federal and Global laws are only a small part of safely managing inbox reputation, however, and all email marketing professionals must understand the importance of complying with a set of best practices meant to protect reputation and ensure strong, unrestricted email deliverability. In this whitepaper, eDataSource provides readers with an extensive introduction to these best practices. In the future, we’ll be releasing more in-depth coverage of sending best practices so don’t forget to sign up for our email newsletter to get the latest and greatest from our resident industry experts. 2 DELIVERABILITY BEST PRACTICE GUIDE - 2019 TABLE OF CONTENTS EMAIL MARKETING LAWS AND REGULATIONS THE CAN-SPAM ACT 5 Best Practices Go Far Beyond Legal Compliance The Basics When Does CAN-SPAM Apply? CANADA’S ANTI-SPAM LEGISLATION (CASL) 7 What Is Considered A CEM Implied vs. Expressed Consent Content and Record-Keeping Unsubscribes GENERAL DATA PROTECTION REGULATION (GDPR) 8 Consent Opt-Out
    [Show full text]
  • Deliverability-Declassified-1.Pdf
    DELIVERABILITY A Practical Guide to Protect Your Inbox Reputation and Support Your Ongoing Email Deliverability Goals Deliverability Declassified 1 For professionals in email marketing, achieving great deliverability begins with a solid understanding of email best practices. And with today’s constantly changing environment, it’s nearly impossible to keep up with current trends. At the foundation of this understanding are practices that align with legal and regulatory compliance requirements that protect consumer rights. The lens we must look through is always the customer’s. Federal and Global laws are only a small part of safely managing inbox reputation, however, and all email marketing professionals must understand the importance of complying with a set of best practices meant to protect reputation and ensure strong, unrestricted email deliverability. In this guide, SparkPost provides readers with an extensive introduction to these best practices. Once you’ve put these best practices into place, monitoring and measuring your deliverability will be crucial. An easy way to start is to visit sparkpost.com/deliveryindex, enter your mailing domain, and see a quick snapshot of your deliverability in 7 day increments. You’ll be able to check your inbox placement across all of the major inbox providers, as well as key areas impacting your inbox reputation (including blacklists, spam trap hits, and authentication elements). You can also check your competition’s sending domains to see how you measure up. It’s free to use, and a great way to understand your deliverability and identify possible ways to improve it. Deliverability Declassified 2 TABLE OF CONTENTS EMAIL MARKETING LAWS AND REGULATIONS........................................
    [Show full text]
  • Dissertation
    DISSERTATION Titel der Dissertation Efficient Feature Reduction and Classification Methods Applications in Drug Discovery and Email Categorization Verfasser Mag. Andreas Janecek angestrebter akademischer Grad Doktor der technischen Wissenschaften (Dr. techn.) Wien, im Dezember 2009 Studienkennzahl lt. Studienblatt: A 786 880 Dissertationsgebiet lt. Studienblatt: Informatik Betreuer: Priv.-Doz. Dr. Wilfried Gansterer 2 Contents 1 Introduction 11 1.1 Motivation and Problem Statement . 11 1.2 Synopsis . 12 1.3 Summary of Publications . 13 1.4 Notation . 14 1.5 Acknowledgements . 14 I Theoretical Background 15 2 Data Mining and Knowledge Discovery 17 2.1 Definition of Terminology . 18 2.2 Connection to Other Disciplines . 19 2.3 Data . 20 2.4 Models for the Knowledge Discovery Process . 21 2.4.1 Step 1 { Data Extraction . 23 2.4.2 Step 2 { Data Pre-processing . 24 2.4.3 Step 3 { Feature Reduction . 25 2.4.4 Step 4 { Data Mining . 26 2.4.5 Step 5 { Post-processing and Interpretation . 29 2.5 Relevant Literature . 31 3 Feature Reduction 33 3.1 Relevant Literature . 34 3.2 Feature Selection . 34 3.2.1 Filter Methods . 35 3.2.2 Wrapper Methods . 40 3.2.3 Embedded Approaches . 41 3.2.4 Comparison of Filter, Wrapper and Embedded Approaches . 42 3.3 Dimensionality Reduction . 43 3 4 CONTENTS 3.3.1 Low-rank Approximations . 43 3.3.2 Principal Component Analysis . 44 3.3.3 Singular Value Decomposition . 48 3.3.4 Nonnegative Matrix Factorization . 50 3.3.5 Algorithms for Computing NMF . 51 3.3.6 Other Dimensionality Reduction Techniques . 54 3.3.7 Comparison of Techniques .
    [Show full text]
  • Technical Volume 2: Cybersecurity Practices for Medium and Large Health Care Organizations
    Technical Volume 2: Cybersecurity Practices for Medium and Large Health Care Organizations Table of Contents Introduction ............................................................................................................................................... 3 Cybersecurity Practices at Medium-Sized Health Care Organizations ...................................................... 4 Cybersecurity Practices at Large Health Care Organizations .................................................................... 7 Document Guide: Cybersecurity Practices ................................................................................................ 9 Cybersecurity Practice #1: E-mail Protection Systems ............................................................................ 14 Cybersecurity Practice #2: Endpoint Protection Systems ....................................................................... 24 Cybersecurity Practice #3: Identity and Access Management ................................................................ 31 Cybersecurity Practice #4: Data Protection and Loss Prevention ........................................................... 42 Cybersecurity Practice #5: IT Asset Management ................................................................................... 52 Cybersecurity Practice #6: Network Management ................................................................................. 57 Cybersecurity Practice #7: Vulnerability Management ..........................................................................
    [Show full text]