SlideShare a Scribd company logo
   B2B & Corporate Email Filters
    ◦ Microsoft
    ◦ Cloudmark
    ◦ Postini
    ◦ SpamAssassin
   Measuring Reputation
   List Hygiene
   Bounce Management
   IP & Domain Authentication
   Whitelisting & Feedback Loops
   Key Points to Remember
   Helpful Links
   Data Metrics
Microsoft Forefront for Exchange Server
9 levels of filtering (in order):
1. Connection Filtering

2. Sender Filtering

3. Recipient Filtering

4. Sender ID

5. Content Filtering

6. Sender Reputation

7. Attachment Filtering

8. Microsoft Forefront Protection (Antivirus package level)

9. Outlook Junk Email Filtering
   Cloudmark controls over 750,000 email boxes
   Some of the ISP's that rely on Cloudmark include:
        163.com
        Cablevision
        Comcast
        Shaw.com
        Swisscom
   Millions of users all over the world feed Cloudmark’s
    fingerprinting engine by voting on an email “spamminess”.
   Once identified as spam a fingerprint is created and stored to
    match future emails
   Small changes to an email will NOT be enough to slip by filters
   According to Cloudmark, spammers are becoming crafty and are
    starting to model delivery after regular senders by sending
    smaller batches and modulating their connection rates and
    lengths.
   Online based spam filtering application owned by
    Google with more than 26 million users.
   Global filter and User filter
   Has whitelist and blacklist
   Used by many B2B domains and corporations
   Device used to detect and block spam
   Big on blocking due to spam traps, user complaints
    (from their network), and content.
   The Barracuda Networks spam firewall use a digital
    Finger Print, built from the messages received by their
    spam trap network to classify spam regardless of the
    contents. Messages with the same images become easy
    to detect as all of these will have the same finger print
    and thus be easy to detect and filter. This is especially
    common in legitimate email traffic as the sender is not
    modifying the content or appearance of the image for
    each message (or group of messages), this is a common
    tactic used by spammers.
   Open source spam filter
   Right out of the box configuration for many
    domains.
   Can be customized with many different rule
    sets and “scores”
   Example:
    ◦ Word = Orange (5 points)
    ◦ Anything over 4 points, don’t allow into network
   Return Path SenderScore
    ◦ Score from 0-100 that measures your overall reputation.
      This data is pulled from many different sources.
    ◦ https://senderscore.org/
   Cisco SenderBase
    ◦ Online reputation by IP or domain.
    ◦ http://www.senderbase.org/senderbase_queries/rep_loo
      kup
   McAfee TrustedSource
    ◦ Reputation check for the McAfee network. Can check IP
      or domain.
    ◦ http://www.trustedsource.org/en/feedback/checking
   List hygiene
    ◦ Immediately remove invalid mailboxes
    ◦ Set up a soft bounce plan that works for your brand.
   List scrubbing
    ◦ Services that check for valid domains, emails, and
      possible known spam traps.
    ◦ May help cut out many of the bad email addresses and
      spam traps you would send to.
   Spam traps
    ◦ Spam Traps are real email addresses.
    ◦ Often ISPs will take over abandoned email addresses and
      turn those into spam traps. Set up and monitored by
      blacklists.
   A hard bounce is a permanent email delivery failure.
    Some reasons for a hard bounce would be sending to
    a mailbox that doesn’t exist (bad mailbox) or a
    domain that doesn’t exist (bad domain).
   A soft bounce is a temporary email delivery failure.
    Soft bounces can be caused by sending to a mailbox
    that’s full or having an ISP temporarily block emails
    being delivered from your IP due to reputation issues.
   Maintain a bounce rate of less than 10 percent, as
    recommended by most major ISPs.The lower the
    number of hard bounces you receive, the better your
    reputation.
   Don’t retry sending to “soft bounce” addresses too
    soon.
   Don’t retry sending to “soft bounce” addresses too
    often.
   SPF Compliant SenderID Record
    ◦ IP based authentication
    ◦ Email authentication methods used to prevent spam and spoofing by
      validating that the sending IP address is authorized to send mail for the
      sending domain. SPF checks are performed on the (sub)domain found in
      the Return-Path (Envelope From) email header, while Sender ID checks are
      performed on the From, Sender, Resent-From, and Resent-Sender email
      headers.
    ◦ v=spf1 ip4:209.19.23.12 -all

   DKIM
    ◦   Builds your domain reputation.
    ◦   Creates a portable reputation
    ◦   Protects your brand against phishing and spoofing.
    ◦   DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
        s=gamma; h=mime-version:x-notifications:date:message-
        id:subject:from:to :content-type;
        bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=;
        b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6
        uRv5397Ti
        FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU
        8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
Provider / ISP Name   Offer Whitelisting   Offer Feedback Loop
AOL                   Yes                  Yes
BlueTie (Excite)      No                   Yes
Comcast               No                   Yes
Cox                   No                   Yes
Earthlink             No                   Yes
Fastmail              No                   Yes
Hotmail               No                   Yes
OpenSRS               No                   Yes
Rackspace             No                   Yes
RoadRunner            No                   Yes
Synacor               No                   Yes
United                Yes                  Yes
USA.net               No                   Yes
Verizon               Yes                  Yes
Yahoo                 Yes                  Yes
   Rate limits
    ◦ Many B2B domains have connection and rate limits to their
      network to slow down the amount of emails they receive.
    ◦ Key is to send as slow as possible as many of these domains
      do not publish rate limits.
   Content
    ◦ Even for B2B senders, content is key.
    ◦ Filters still look at content, including many B2B filters.
   Add To Address Book Statement
     Local whitelisting
   Monitor Mailboxes
    ◦ abuse@, privacy@ and postmaster@ email addresses and
      respond to serious inquiries.
   “The Insider”
    ◦ As I call them! Users who work at the domain you are
      contacting that can help get your sending information
      whitelisted.
   User Engagement - Recipient behavior is what the recipient
  does with the mail once it is delivered. If the recipient clicks on
  the abuse button or deletes the message without ever reading
  the message this will negatively impact future mailings.
  Opens/clicks and moving mail from the bulk folder to the inbox
  provide the best impact towards improving IP reputation
 IP Reputation – Monitoring IP reputation from various sources
  will provide an overall view of how you look to the rest of the
  Internet. This includes SenderScore, TrustedSource, SenderBase
  and others.
 Ramp up – For large clients we recommend ramping up
  volume until the full list is reached. Because of mailbots (mail
  zombies ) the ISPs are looking at sudden spikes of volume from
  new or existing IP addresses.
 Data Protection – Always make sure that your subscriber’s
  data is kept safe and secure.
Corporate Blacklists and Spam Filters
 Fortiguard Antispam from Fortinet -
  http://www.fortiguard.com/antispam/antispam.html
 Sophoslabs - http://www.sophos.com/security/ip-lookup
 Symantec Brightmail -
  http://www.symantec.com/business/security_response/landing/spam/index.jsp
 Cisco IronPort SenderBase - http://www.senderbase.org/
 Barracuda - http://www.barracudacentral.org/lookups/ip-reputation
 McAfee TrustedSource - http://www.trustedsource.org/
 Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi
Postmaster Links:
 Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster
 Gmail - https://mail.google.com/support/bin/answer.py?answer=81126
 Hotmail - https://postmaster.live.com/
 AOL - http://postmaster.info.aol.com/
Deliverability Links:
 Deliverability.com Blog – http://blog.deliverability.com
 Cloudmark Blog - http://blog.cloudmark.com/
 Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en
 Email Marketing Reports - http://www.email-marketing-
  reports.com/deliverability/
 ReturnPath Deliverability Blog -
  http://www.returnpath.net/blog/emaildeliverability/
 Real Magnet Blog - http://blog.realmagnet.com/
 Authentication & Spam Check Test -
  http://www.port25.com/corporate/corp_news_authenticator.html
   1 spam trap can cause your SenderScore to
    drop 20 points
   Yahoo accepts only 1 out of 8 emails
   47% of subscribers use the "spam" button to
    unsubscribe
   77% of marketers experience emails being
    diverted to the spam folder
   Many URL shorteners are on blacklists. Don’t
    use them!
B2B Email Deliverability - Getting to the Inbox

More Related Content

What's hot

Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessSmall Business Trends
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1Infusionsoft
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address HarvestingMichael Lamont
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCStephen Mitchell
 
Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production ProcessRandall Bennington
 
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideHow to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideJoan Mullally
 
How to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonHow to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonTiti Wangsa Damhore
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2guestde489f
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2Infusionsoft
 
NWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching PresentationNWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching Presentationstoosepp
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Increasing Your Response Rate
Increasing Your Response RateIncreasing Your Response Rate
Increasing Your Response RateEmail Delivered
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitchwerksmail
 
Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Anton Shulke
 

What's hot (20)

Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your Business
 
The Path to the Inbox Part 1
The Path to the Inbox Part 1The Path to the Inbox Part 1
The Path to the Inbox Part 1
 
Email Address Harvesting
Email Address HarvestingEmail Address Harvesting
Email Address Harvesting
 
ENTP Mail
ENTP MailENTP Mail
ENTP Mail
 
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARCYour Customers Need A Hero - Save Them From Internet Villains With DMARC
Your Customers Need A Hero - Save Them From Internet Villains With DMARC
 
Conde Nast Email Production Process
Conde Nast   Email Production ProcessConde Nast   Email Production Process
Conde Nast Email Production Process
 
Entp mail
Entp mailEntp mail
Entp mail
 
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start GuideHow to Use Aweber to Begin Email Marketing: A Quick-Start Guide
How to Use Aweber to Begin Email Marketing: A Quick-Start Guide
 
How to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with AmazonHow to get a job as a software development engineer with Amazon
How to get a job as a software development engineer with Amazon
 
79 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 201579 Ways to Make Money Online in 2015
79 Ways to Make Money Online in 2015
 
Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2Spammer Presentation Hope Sievert2
Spammer Presentation Hope Sievert2
 
Solving E-mail Problems
Solving E-mail ProblemsSolving E-mail Problems
Solving E-mail Problems
 
The Path to the Inbox Part 2
The Path to the Inbox Part 2The Path to the Inbox Part 2
The Path to the Inbox Part 2
 
NWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching PresentationNWIC: CMPS101 Web Searching Presentation
NWIC: CMPS101 Web Searching Presentation
 
werksmail
werksmailwerksmail
werksmail
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Increasing Your Response Rate
Increasing Your Response RateIncreasing Your Response Rate
Increasing Your Response Rate
 
Emma Presentation
Emma PresentationEmma Presentation
Emma Presentation
 
Werksmail pitch
Werksmail pitchWerksmail pitch
Werksmail pitch
 
Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd Creating email campaigns that convert by Courtney Todd
Creating email campaigns that convert by Courtney Todd
 

Similar to B2B Email Deliverability - Getting to the Inbox

Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARCContactlab
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works Pinpointe On-Demand
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofingMattChapman50
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityChris Arrendale
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email DeliverabilityGetResponse
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInFranck Martin
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentationThe_IPA
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLaboraDK
 
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...Amazon Web Services
 
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...Amazon Web Services
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedDryden Geary
 
B2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideMatthew Albert
 
Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022RecruitingDaily.com LLC
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionPeter Schmidt
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection SystemApollo_n
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Railsibelmonte
 

Similar to B2B Email Deliverability - Getting to the Inbox (20)

Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works How an Enterprise SPAM Filter Works
How an Enterprise SPAM Filter Works
 
A guide to email spoofing
A guide to email spoofingA guide to email spoofing
A guide to email spoofing
 
eTrigue - Mastering Email Deliverability
eTrigue - Mastering Email DeliverabilityeTrigue - Mastering Email Deliverability
eTrigue - Mastering Email Deliverability
 
Maximise Email Deliverability
Maximise Email DeliverabilityMaximise Email Deliverability
Maximise Email Deliverability
 
Sendgrid Deliverability Guide
Sendgrid Deliverability GuideSendgrid Deliverability Guide
Sendgrid Deliverability Guide
 
SMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedInSMTP over IPv6 at LinkedIn
SMTP over IPv6 at LinkedIn
 
"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation"Being creative with data" 25th November - Neteffekt presentation
"Being creative with data" 25th November - Neteffekt presentation
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
SVC103 The Whys and Hows of Integrating Amazon Simple Email Service into your...
 
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
From 0 to 100M+ Emails Per Day: Sending Email with Amazon SES (SVC301) | AWS ...
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
B2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's GuideB2C Deliverability in 2018: A Hitchhiker's Guide
B2C Deliverability in 2018: A Hitchhiker's Guide
 
Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022Email Deliverability: What You Need to Know in 2022
Email Deliverability: What You Need to Know in 2022
 
How to deploy Exchange Online Protection
How to deploy Exchange Online ProtectionHow to deploy Exchange Online Protection
How to deploy Exchange Online Protection
 
An Effective Spam Protection System
An Effective Spam Protection SystemAn Effective Spam Protection System
An Effective Spam Protection System
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
 

More from B2BCamp

B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp
 
B2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp
 
B2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp
 
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...B2BCamp
 
B2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp
 
Cadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessCadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessB2BCamp
 
Using what youve got
Using what youve gotUsing what youve got
Using what youve gotB2BCamp
 
5 minutes of power
5 minutes of power5 minutes of power
5 minutes of powerB2BCamp
 
Social gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemSocial gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemB2BCamp
 
Metrics driven sales prospecting
Metrics driven sales prospectingMetrics driven sales prospecting
Metrics driven sales prospectingB2BCamp
 
Have Leads Forever
Have Leads ForeverHave Leads Forever
Have Leads ForeverB2BCamp
 
Objection handling 201
Objection handling 201Objection handling 201
Objection handling 201B2BCamp
 
Story of a tomato
Story of a tomatoStory of a tomato
Story of a tomatoB2BCamp
 
In App Engagement
In App EngagementIn App Engagement
In App EngagementB2BCamp
 
Seduce your prospect with stories
Seduce your prospect with storiesSeduce your prospect with stories
Seduce your prospect with storiesB2BCamp
 
7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketingB2BCamp
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!B2BCamp
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snoopingB2BCamp
 
Using curation in content marketing to drive traffic
Using curation in content marketing to drive trafficUsing curation in content marketing to drive traffic
Using curation in content marketing to drive trafficB2BCamp
 
Using Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingUsing Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingB2BCamp
 

More from B2BCamp (20)

B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based MarketingB2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
B2BCamp Session (Part 1): Account Based Selling Meets Accont Based Marketing
 
B2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First SyndromeB2BCamp: ANNUITAS Technology First Syndrome
B2BCamp: ANNUITAS Technology First Syndrome
 
B2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B salesB2BCamp Session: Why Personality is an underused asset in B2B sales
B2BCamp Session: Why Personality is an underused asset in B2B sales
 
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
The Five Highest Performing Marketing Tactics SalesLoft Performed in Our Year...
 
B2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimizationB2BCamp- BigDrum, b2b search marketing & conversion optimization
B2BCamp- BigDrum, b2b search marketing & conversion optimization
 
Cadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development ProcessCadence, Create Scalable and Sustainable Sales Development Process
Cadence, Create Scalable and Sustainable Sales Development Process
 
Using what youve got
Using what youve gotUsing what youve got
Using what youve got
 
5 minutes of power
5 minutes of power5 minutes of power
5 minutes of power
 
Social gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problemSocial gastronomy define the buyer adoption problem
Social gastronomy define the buyer adoption problem
 
Metrics driven sales prospecting
Metrics driven sales prospectingMetrics driven sales prospecting
Metrics driven sales prospecting
 
Have Leads Forever
Have Leads ForeverHave Leads Forever
Have Leads Forever
 
Objection handling 201
Objection handling 201Objection handling 201
Objection handling 201
 
Story of a tomato
Story of a tomatoStory of a tomato
Story of a tomato
 
In App Engagement
In App EngagementIn App Engagement
In App Engagement
 
Seduce your prospect with stories
Seduce your prospect with storiesSeduce your prospect with stories
Seduce your prospect with stories
 
7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing7 entrepreneurial lessons for sales and marketing
7 entrepreneurial lessons for sales and marketing
 
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
10.5 Advanced Tips for Demand Generation, Stuff I Promise You Don't Know!
 
Strategic snooping
Strategic snoopingStrategic snooping
Strategic snooping
 
Using curation in content marketing to drive traffic
Using curation in content marketing to drive trafficUsing curation in content marketing to drive traffic
Using curation in content marketing to drive traffic
 
Using Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media MarketingUsing Metrics to Monitor and Manage Your Social Media Marketing
Using Metrics to Monitor and Manage Your Social Media Marketing
 

Recently uploaded

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 

Recently uploaded (20)

Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

B2B Email Deliverability - Getting to the Inbox

  • 1.
  • 2. B2B & Corporate Email Filters ◦ Microsoft ◦ Cloudmark ◦ Postini ◦ SpamAssassin  Measuring Reputation  List Hygiene  Bounce Management  IP & Domain Authentication  Whitelisting & Feedback Loops  Key Points to Remember  Helpful Links  Data Metrics
  • 3. Microsoft Forefront for Exchange Server 9 levels of filtering (in order): 1. Connection Filtering 2. Sender Filtering 3. Recipient Filtering 4. Sender ID 5. Content Filtering 6. Sender Reputation 7. Attachment Filtering 8. Microsoft Forefront Protection (Antivirus package level) 9. Outlook Junk Email Filtering
  • 4. Cloudmark controls over 750,000 email boxes  Some of the ISP's that rely on Cloudmark include:  163.com  Cablevision  Comcast  Shaw.com  Swisscom  Millions of users all over the world feed Cloudmark’s fingerprinting engine by voting on an email “spamminess”.  Once identified as spam a fingerprint is created and stored to match future emails  Small changes to an email will NOT be enough to slip by filters  According to Cloudmark, spammers are becoming crafty and are starting to model delivery after regular senders by sending smaller batches and modulating their connection rates and lengths.
  • 5. Online based spam filtering application owned by Google with more than 26 million users.  Global filter and User filter  Has whitelist and blacklist  Used by many B2B domains and corporations
  • 6. Device used to detect and block spam  Big on blocking due to spam traps, user complaints (from their network), and content.  The Barracuda Networks spam firewall use a digital Finger Print, built from the messages received by their spam trap network to classify spam regardless of the contents. Messages with the same images become easy to detect as all of these will have the same finger print and thus be easy to detect and filter. This is especially common in legitimate email traffic as the sender is not modifying the content or appearance of the image for each message (or group of messages), this is a common tactic used by spammers.
  • 7. Open source spam filter  Right out of the box configuration for many domains.  Can be customized with many different rule sets and “scores”  Example: ◦ Word = Orange (5 points) ◦ Anything over 4 points, don’t allow into network
  • 8. Return Path SenderScore ◦ Score from 0-100 that measures your overall reputation. This data is pulled from many different sources. ◦ https://senderscore.org/  Cisco SenderBase ◦ Online reputation by IP or domain. ◦ http://www.senderbase.org/senderbase_queries/rep_loo kup  McAfee TrustedSource ◦ Reputation check for the McAfee network. Can check IP or domain. ◦ http://www.trustedsource.org/en/feedback/checking
  • 9. List hygiene ◦ Immediately remove invalid mailboxes ◦ Set up a soft bounce plan that works for your brand.  List scrubbing ◦ Services that check for valid domains, emails, and possible known spam traps. ◦ May help cut out many of the bad email addresses and spam traps you would send to.  Spam traps ◦ Spam Traps are real email addresses. ◦ Often ISPs will take over abandoned email addresses and turn those into spam traps. Set up and monitored by blacklists.
  • 10.
  • 11.
  • 12. A hard bounce is a permanent email delivery failure. Some reasons for a hard bounce would be sending to a mailbox that doesn’t exist (bad mailbox) or a domain that doesn’t exist (bad domain).  A soft bounce is a temporary email delivery failure. Soft bounces can be caused by sending to a mailbox that’s full or having an ISP temporarily block emails being delivered from your IP due to reputation issues.  Maintain a bounce rate of less than 10 percent, as recommended by most major ISPs.The lower the number of hard bounces you receive, the better your reputation.  Don’t retry sending to “soft bounce” addresses too soon.  Don’t retry sending to “soft bounce” addresses too often.
  • 13. SPF Compliant SenderID Record ◦ IP based authentication ◦ Email authentication methods used to prevent spam and spoofing by validating that the sending IP address is authorized to send mail for the sending domain. SPF checks are performed on the (sub)domain found in the Return-Path (Envelope From) email header, while Sender ID checks are performed on the From, Sender, Resent-From, and Resent-Sender email headers. ◦ v=spf1 ip4:209.19.23.12 -all  DKIM ◦ Builds your domain reputation. ◦ Creates a portable reputation ◦ Protects your brand against phishing and spoofing. ◦ DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=gamma; h=mime-version:x-notifications:date:message- id:subject:from:to :content-type; bh=kV8k7QXhM6nPbY7LCyVktE57+gZQVtUnDef2dnvDgmk=; b=NvEKD8r8DBlkdAJ0PTFK1wSzzANB3xCZfE7HMBMloJvbn2viM8VQ7OaG6 uRv5397Ti FMqlRut+qZrosjSgljl6eZU6oJj/HMqIuwlqP8RXzvZ6HDWfxx2ujRayJd/1q+xU 8S9P tSGjuCh1B8C3z31hpbvORNRUIsdYLBX7M8f6A=
  • 14. Provider / ISP Name Offer Whitelisting Offer Feedback Loop AOL Yes Yes BlueTie (Excite) No Yes Comcast No Yes Cox No Yes Earthlink No Yes Fastmail No Yes Hotmail No Yes OpenSRS No Yes Rackspace No Yes RoadRunner No Yes Synacor No Yes United Yes Yes USA.net No Yes Verizon Yes Yes Yahoo Yes Yes
  • 15. Rate limits ◦ Many B2B domains have connection and rate limits to their network to slow down the amount of emails they receive. ◦ Key is to send as slow as possible as many of these domains do not publish rate limits.  Content ◦ Even for B2B senders, content is key. ◦ Filters still look at content, including many B2B filters.  Add To Address Book Statement  Local whitelisting  Monitor Mailboxes ◦ abuse@, privacy@ and postmaster@ email addresses and respond to serious inquiries.  “The Insider” ◦ As I call them! Users who work at the domain you are contacting that can help get your sending information whitelisted.
  • 16. User Engagement - Recipient behavior is what the recipient does with the mail once it is delivered. If the recipient clicks on the abuse button or deletes the message without ever reading the message this will negatively impact future mailings. Opens/clicks and moving mail from the bulk folder to the inbox provide the best impact towards improving IP reputation  IP Reputation – Monitoring IP reputation from various sources will provide an overall view of how you look to the rest of the Internet. This includes SenderScore, TrustedSource, SenderBase and others.  Ramp up – For large clients we recommend ramping up volume until the full list is reached. Because of mailbots (mail zombies ) the ISPs are looking at sudden spikes of volume from new or existing IP addresses.  Data Protection – Always make sure that your subscriber’s data is kept safe and secure.
  • 17. Corporate Blacklists and Spam Filters  Fortiguard Antispam from Fortinet - http://www.fortiguard.com/antispam/antispam.html  Sophoslabs - http://www.sophos.com/security/ip-lookup  Symantec Brightmail - http://www.symantec.com/business/security_response/landing/spam/index.jsp  Cisco IronPort SenderBase - http://www.senderbase.org/  Barracuda - http://www.barracudacentral.org/lookups/ip-reputation  McAfee TrustedSource - http://www.trustedsource.org/  Proofpoint - https://support.proofpoint.com/rbl-lookup.cgi Postmaster Links:  Yahoo - http://help.yahoo.com/l/us/yahoo/mail/postmaster  Gmail - https://mail.google.com/support/bin/answer.py?answer=81126  Hotmail - https://postmaster.live.com/  AOL - http://postmaster.info.aol.com/ Deliverability Links:  Deliverability.com Blog – http://blog.deliverability.com  Cloudmark Blog - http://blog.cloudmark.com/  Gmail Status Dashboard - http://www.google.com/appsstatus#hl=en  Email Marketing Reports - http://www.email-marketing- reports.com/deliverability/  ReturnPath Deliverability Blog - http://www.returnpath.net/blog/emaildeliverability/  Real Magnet Blog - http://blog.realmagnet.com/  Authentication & Spam Check Test - http://www.port25.com/corporate/corp_news_authenticator.html
  • 18.
  • 19. 1 spam trap can cause your SenderScore to drop 20 points  Yahoo accepts only 1 out of 8 emails  47% of subscribers use the "spam" button to unsubscribe  77% of marketers experience emails being diverted to the spam folder  Many URL shorteners are on blacklists. Don’t use them!