What are the benefits of email authentication?
Nowadays most businesses rely on email marketing to send their clients notifications, promotions, and updates. When using email marketing, you will need to implement different forms of email authentication to achieve better delivery rates. Email authentication helps by verifying that the emails are actually from you or your business. All major ISP’s like Hotmail, Gmail, AOL and Yahoo use email authentication to filter out suspected spam emails. Email authentication can
Do I have a spam list?
Spam is defined as the sending of unsolicited bulk email messages. As long as you have built a permission-based contact list, you should not have to worry that it is spam. The following are requirements of Benchmark Email that will help prevent spam complaints against your campaign(s): My list is permission-based This is affirming that every person on your contact list has given you permission to contact them via email.
Contact Lists March 28, 2019
Can I create a single image or image-only email?
We do not suggest using a single image or image-only email. The following problems may arise from sending image-only emails: Mail filters will usually block an image-only email as they are a prime tool of bulk spammers If the email is not automatically bounced, the spam filter will often dump it straight into the junk or spam folder Image-only emails can generate spam complaints, high bounce rates and low open
Delivery August 6, 2018
What is the CAN-SPAM Act?
The federal CAN-SPAM Act was signed into law in December 2003. It has defined the basic requirements for all marketing & bulk emails. The below terms are mandatory for all bulk & commercial emails: All bulk/marketing emails include an unsubscribe link All unsubscribe requests must be honored within 10 days. The identity of the sender and the location of the email's origin must be truthfully represented and available to the
Reports August 6, 2018
What are Spamtraps?
As per wikipedia, "Spamtraps are usually e-mail addresses that are created not for communication, but rather to lure spam. In order to prevent legitimate email from being invited, the e-mail address will typically only be published in a location hidden from view such that an automated e-mail address harvester (used by spammers) can find the email address, but no sender would be encouraged to send messages to the email
Delivery March 1, 2019