SlideShare a Scribd company logo
1 of 65
Download to read offline
Keeping Your App's Email out of
the SPAM folder
Elmer Thomas
Hacker in Residence
@thinkingserious
“If your emails don’t make it to the Inbox,
you are talking to yourself. Not cool.”
- Email Sending Ninja, Elmer Thomas
I want you to stop talking to yourself.
Definitions & Assumptions
How SPAM Filters Work
The Key: Reputation
Securing Your Identity
Infrastructure
Content & Relevancy
Analytics
The SPAM Game!
Sender’s Outbox Recipient’s Inbox
Sender’s Outbox Recipient’s Inbox
Sender’s Mail Server (MTA)
The Internet
Recipient’s Mail Server
(MTA)
Anti-Spam Filter
TRANSACTIONAL
Confirmations
Alerts
Notifications
Receipts
Password Delivery
Account Verifications
Statements
Shipping Notifications
Reminders
Cancellations
Updates
Announcements
22% of Opt-in Email Missing from
Subscribers’ Inboxes!
Email Deliverability
=
Getting to the Inbox
User Interaction
Tracking
Heuristics, Statistics & Magic
Reputation
Discover the Keys to
Building Your Reputation
Relevant, Properly Formatted Email
Send the
right message
to the
right person
at the
right time
with the
right frequency
0
15
30
45
60
M T W Th F S Su
Emails Sent
Few Complaints
SPAM
Few Bounces
Pro Infrastructure
Don’t Get Blacklisted
https://www.senderscore.org/blacklistlookup
http://www.mxtoolbox.com/blacklists.aspx
http://www.dnsstuff.com/docs/ip4r/
Transactional Emails are Exempt from
CAN-SPAM
Learn How to Confirm Your Identity
Through Email Authentication
in 5 Steps
Audit your Computers
Sender Policy Framework (SPF)
SenderID
Domain Keys Identified Mail (DKIM)
Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx
SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-validation-verisimilitude
DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
Update Your DNS Records
Sign Outbound Email with DKIM
Test
Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html
Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.html
Sender Policy Framework: http://www.openspf.org/Tools
How To Setup a Professional Infrastructure
127.0.0.1
Secure Your Servers
postmaster and abuse
@yourdomain.com
Loops
Receive Your Emails
127.0.0.1
Learn About List Management
Never
Never
Never
NEVA!!!
Keep Clean
Double Opt-In
Hard Bounce = Go Away
Soft Bounce = Call Me Later
Content and Relevancy
Segment Wisely
Avoid Trigger Words & Phishing
Phrases
100 SPAM Trigger Words & Phrases to Avoid:
http://blog.mannixmarketing.com/2009/08/spam-trigger-words/
Short List of Common Phishing Phrases:
http://www.24hoursupport.com/index.php?option=com_content&task=view&id=192&Itemid=1
HTML + Text
SPAM Check
spamchecker.org
Text : Image Ratio
Too BIG
HTML, CSS and Images
validator.w3.org
Send the
right message
to the
right person
at the
right time
with the
right frequency
Build and Maintain Your Reputation
Check All of the Technical Checkboxes
Be Relevant
Monitor, Review and Improve
Analyze, Measure, Improve
Now you can stop talking to yourself.
Thanks!
To learn more, check out:
http://go.sendgrid.com/DeliverabilityGuide.html
or feel free to reach out:
elmer.thomas@sendgrid.com
@thinkingserious

More Related Content

Similar to Keeping Your App's Email out of the SPAM Folder

Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessSendio
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as SpamMoving Up Mobile
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackersseema Vishwakarma
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)marwaleed
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 

Similar to Keeping Your App's Email out of the SPAM Folder (20)

Web spam
Web spamWeb spam
Web spam
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
Email basics
Email basicsEmail basics
Email basics
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam!
Spam!Spam!
Spam!
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
How and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's BusinessHow and Why to Make Email Everyone's Business
How and Why to Make Email Everyone's Business
 
Direct Mail vs. SPAM
Direct Mail vs. SPAMDirect Mail vs. SPAM
Direct Mail vs. SPAM
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as Spam
 
Spam Traps 101
Spam Traps 101Spam Traps 101
Spam Traps 101
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
Spam (Security Awareness Session)
Spam (Security Awareness Session)Spam (Security Awareness Session)
Spam (Security Awareness Session)
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Keeping Your App's Email out of the SPAM Folder

Editor's Notes

  1. ## Keep Your App's Email Out of the SPAM Folder Drawing from his experience at SendGrid, which has delivered over 114 billion emails on behalf of over 130,000 customers, Elmer will teach you the factors that determine whether your email will hit the inbox and the practical steps you can take today to avoid the SPAM folder and ensure that your customers receive the communications they expect. ## Bio: Elmer Thomas Elmer is formally trained as a Computer & Electrical Engineer with a B.S. in Computer Engineering and a Masters in Electrical Engineering (Focus was on Control Systems, specifically with GPS navigation systems) at the Univeristy of California, Riverside. Afterwards, he added a few mentors, then some sales and marketing skills to his repertoire and co-founded several companies, including AboveTheLimit.com , ThemBid.com and L ogoBids.com . He then began at SendGrid as a Web Development Manager (along with the many hats early SendGrid'ers wore), then moved to a Product Development role. Currently, Elmer is SendGrid's Hacker in Residence. His mission is to help SendGrid live up to its slogan: "Email Delivery. Simplified" by improving the lives of developers, both internally and externally. He is known in social media circles as ThinkingSerious.
  2. Summary Treat this topics as a checklist to follow.
  3. How Email Appears to Work
  4. How Email Actually Works
  5. What kind of emails are we talking about?
  6. Source: Email_Intelligence_Report_-_Placement_Benchmarks_1H_2013.pdf Next is video summary
  7. So what is email deliverability anyway? It’s getting to the inbox vs. junk/bulk/missing
  8. Most Important fact: Delivery is never guaranteed
  9. What happens when these emails don’t get delivered? It’s pretty much the end of the world. - no purchase confirmations - no shipping information - no password resets - lost revenue - never get to meet that special someone at your favorite dating site Image Source: http://hubcityblues.wordpress.com
  10. What happens when these emails get delivered? Unicorns and rainbows, of course. (and sometimes cupcakes and lollipops) :) - establish trust - better conversions Image Source: http://maxtheunicorn.blogspot.com
  11. Let’s talk about how SPAM filters work. Understanding what stands between you and the inbox is key. Image Source: http://sendgrid.com/blog/10-tips-to-keep-email-out-of-the-spam-folder
  12. Some measure and track user interaction (messages that aren't read, or aren't opened and clicked on, are more likely to be sent to the Junk folder) Image Source: http://www.umnet.com
  13. Some use heuristics (rules, often with regular expressions, to search for spammy content), message structure (does this look like a Newsletter we've seen before?), message fingerprinting (look up fingerprint to see if it matches know spam) and/or statistical methods (Bayesian filter: Does this message contain words similar to known spam or known clean messages?)
  14. Some use human user feedback and community voting ("This is spam" button in mail client or webmail app.)
  15. Some look at sender reputation (based on sending IP or domain) Image Source: http://myfirstfarce.blogspot.com
  16. ...but there's no silver bullet. Spammers adapt. Filters adapt. Some innocent messages get caught in the crossfire (false positives). Image Source: http://sbrownehr.com
  17. Building Your Reputation Why? Because it's a key factor that determines if you hit the Inbox Image Source: http://herocomplex.latimes.com
  18. The formula Send Relevant, Properly Formatted Email. If they asked to be alerted, send an alert. I will go into detail during the Content & Relevancy portion
  19. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  20. Consistent Volume Predictable
  21. Very Few Complaints Re-iterate the relevancy formula Image Source: http://www.goodfinancialcents.com
  22. Avoid SPAM Traps Image Source: http://instanttrap.com /
  23. Low Bounce Rates Image Source: http://www.cybersalt.org/
  24. Professionally Configured Infrastructure Source: http://www.motifake.com
  25. No Blacklist Appearance See List Management section for help keeping off of black lists Blacklist checking resources: https://www.senderscore.org/blacklistlookup http://www.mxtoolbox.com/blacklists.aspx h ttp://www.dnsstuff.com/docs/ip4r/ Image Source: http://www.deliverability.com
  26. Comply with CAN-SPAM or face penalties up to $16,000 Reference: www.ftc.gov—bus61.shtm Note: If your email contains only transactional emails or relationship content, then you are exempt from these rules; however, you must still not include false or misleading routing information.
  27. Check your Sender Score here: https://www.senderscore.org Email Deliverability Checker: https://chrome.google.com/w ebstore/detail/mbfenkanhbafpdmlmhiicehikmfccebb
  28. Step 1: Identify all machines that send mail for your company and determine the IPs and sending domains used. Source Image: http://www.limonwhitaker.com
  29. Step 2: Create your authentication records Sender ID: http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx SPF: http://docs.sendgrid.com/docs/email-deliverability/spf-records-voila-vali dation-verisimilitude DKIM: http://docs.sendgrid.com/documentation/apps/domain-keys
  30. Step 3: Publish your authentication records via your DNS records
  31. Step 4: Setup your mail server to sign outbound email with DKIM Reference: http://www.sendmail.com/sm/wp/dkim
  32. Step 5: Test by publishing in "test" mode. Policy Record Tester: http://domainkeys.sourceforge.net/policycheck.html Selector Record Tester: http://domainkeys.sourceforge.net/selectorcheck.ht ml Sender Policy Framework: http://www.openspf.org/T ools Keep an eye on DMARC: http://sendgrid.com/blog/what-is-dmarc-and-why-sh ould-you-care/ Image Source : http://www.geeky-gadgets.com
  33. Make sure your Infrastructure is Sound
  34. Get a dedicated IP address. Use separate IPs for your transactional and marketing emails.
  35. Secured servers
  36. Setup and monitor "postmaster" and "abuse" mailboxes
  37. Signed up for ISP Feedback Loops Resource: http://blog.whitesites.com/ISP-Feedback-Loop-list__634207841076562500_blog.htm Image Source: http://microadvert.net
  38. Is your sending domain able to receive mail? Don’t use [email_address]
  39. Warm up your IPs and do not switch IPs to resolve deliverability problems
  40. List Management
  41. Don't rent or buy email lists, ever!
  42. Keep your lists clean Image Source: http://en.wikipedia.org
  43. Use an industry standard opt-in process. The best is confirmed opt-in (aka double opt-in) where you send the subscriber a verification email that requires confirmation (click link) before you add them to your list.  Senders should store proof of their subscribers' confirmed opt-in status. (New Canadian anti-spam law requires senders to show proof of subscriber opt-in if a case comes to court.)
  44. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  45. Engage! What kind of data are ISPs using to determine engagement? Beyond opens and clicks to your specific message, ISPs are use TiNS data (“This is not spam), panel data, trusted reporter data and inactive accounts as measures of engagement. TiNs data is gathered from users actively clicking a button that says “This is Not Spam.” This shows that users really want your email and will help improve your reputation metrics over time. Panel data is a panel of users that determine whether email messages have been correctly marked as spam based on specific criteria specified by the email providers. Trusted reporter data is culled from accounts that have proven to be real users who display normal behavior when interacting with their email messages. To avoid issues overall, employ strong permissioning practices. Inactive accounts are mailboxes that do not have regularly activity. To avoid mailing to inactive accounts, segment out inactives every six months and alter your email strategy in consideration of their lack of response. As a sender, you are not privy to these metrics, but knowing that some ISPs are using this data to determine inbox placement helps you prioritize your goals when it comes to list hygiene, messaging and your overall email strategy. Use SendGrid's Event API to gather real-time engagement metrics so they can segment their list better
  46. Soft vs. Hard Bounce Tracking Remove hard bounces immediately and closely monitor soft bounces.
  47. Make it easy to unsubscribe so they don't hit the "This is SPAM" button Image Source: http://www.damiansaunders.net
  48. Segment by demographics, interests and purchase behavior to increase relevancy and value Image Source: http://www.huffingtonpost.com
  49. 100 SPAM Trigger Words & Phrases to Avoid: http://blog.mannixmarketing.com/2009/08/spam-trigger-words/ Short List of Common Phishing Phrases: http://www.24hoursupport.com/index.php?option=com_content&t ask=view&id=192&Itemid=1
  50. Include a text version if sending HTML Emails
  51. Maintain a good text to image ratio. Don't send any image-only emails. For every graphic include 2 lines of text. Optimize your images.
  52. Use the ALT tag & store images on a web server. Don't use CSS. Double check your message's HTML content code: validator.w3.org
  53. Most of the time, when someone marks your message as spam, It wasn't the right message (relevance) Or it wasn't sent to the right person (confirmed opt-in list or purchased list or stale list?) Or it wasn't sent at the right time (obtained the email address years ago while working for a different company selling a different product) Or it wasn't sent with the right frequency (recipients get "email fatigue" if you send too often (use a preference center), or may forget about you if you don't send often enough.)
  54. Key Takeaways
  55. http://blog.sendgrid.com/email-deliverability-metrics-7-metrics-watch-prevent-delivery-failures/
  56. Please remember though, sometimes other forms of communications can be superior to email ;)
  57. Either play the name that SPAM game, or the create the worlds worst SPAM message game, depending on the audience.