April 2015: The Month in Email

We started the month with some conversations about best practices, both generally looking at the sort of best practices people follow (or don’t) as well as some specific practices we wanted to look at in more depth. Three for this month:

  • Be gracious with opt-out requests. Email marketing is hard. Even when it’s successful, response rates can be very low. It is surely frustrating to hear from people who don’t want your email, but it can help you refine your marketing program.

  • Put bounce policies in place before your important email bounces. If you’re sending legitimate, requested, and wanted email (which of course you are, right?), it’s important to think about the implications of delivery failure not only on your business but on your customers’ lives.

  • Examine the real value of an old list. Just because you can buy addresses doesn’t mean you should. Here are some things to think about if you’re considering it.

We also noted that even with the very best practices, mistakes happen and trusted senders can recover from them.

At the intersection of best practices and industry news, we looked at the political realm and where politics, fraud, and spam overlap. We also talked about how important it is to make sure our politicians understand internet and email technologies.

In other industry news, Josh continued the exploration he started last month of Salesforce’s DKIM implementation and created a tutorial on how to use it. He also outlined the authentication changes Microsoft has made as part of their Office365/Exchange Online Protection over IPv6 implementation. Steve briefly clarified the different methods for email authentication and email repudiation, and I wrote a bit about email verification services.

I also mentioned that AOL hasn’t come up for me with clients lately, but several of our readers commented that they are still having active AOL-related discussions with their customers. I also wrote about the compromised employee account at Sendgrid, and the security implications for the email industry. I’m sure we’ll be hearing more about this sort of thing going forward.

Related Posts

March 2015: The month in email

Happy March! We started the month with some more movement around CASL enforcement from our spam-fighting friends to the north. We noted a $1.1 million fine levied against Compu-Finder for CASL violations, as well as a $48,000 fine to Plentyoffish Media for failing to provide unsubscribe links. We noted a few interesting things: the fines are not being imposed at the maximum limits, violations are not just on B2C marketing, but also on B2B senders, and finally, that it really just makes sense — both from a delivery perspective and a financial perspective — to comply with the very reasonable best practices outlined in CASL.

Read More

September 2014: The Month in Email

September was another busy month for us, but Steve stepped up and wrote a number of really interesting posts on email history, cryptography, and current technical issues in the email landscape.
We started the month with a look at the various RFCs that served as the technical specifications for developing message transfer protocols in the 1970s. It’s really fascinating to look at the evolution of these tools we use every day 40 years later. We followed up with a second post on the origins of network email, which is a great primer (or refresher) on the early days of email.
Steve’s four-part series on cryptography and email started with an in-depth look at how the industry is evolving with respect to encryption and privacy issues. He then introduced us to Alice and Bob (or reintroduced those of us who have been following the adventures of the first couple of cryptography), and described symmetric-key and public-key encryption. His next post described message signing, and how DKIM is used to manage this. He finished up the series with a post on PGP keys.
In industry news: Spamcop is shutting down its email service. There shouldn’t be any major impact on senders, but the post has some specific notes on DMARC implications. We also noted an interesting mail routing suggestion on Twitter, and wrote a post on using Mail.app for this.
In other DMARC news, we wrote about DMARC and report size limits, which might be useful information, depending on your configuration. We also launched a new DMARC tool to help senders understand who is publishing DMARC. Let us know what you think and if you’re finding it useful.
We couldn’t let a month go by without mentioning filters. We looked at a sector we don’t usually discuss, corporate filtering, and went in-depth on a much-misunderstood topic, content filtering.
Finally, Laura offered a webinar on a favorite topic, deliverability, in conjunction with the AMA and Message Systems. If you missed it, you can watch the recorded version here, or just take a peek at some of the reaction via Twitter.

Read More

February 2015 – The month in email

This was a short and busy month at WttW!

We attended another great M3AAWG conference, and had our usual share of interesting discussions, networking, and cocktails. I recapped our adventures here, and shared a photo of the people who keep your email safe while wearing kilts as well. We also commended Jayne Hitchcock on winning the Mary Litynski award for her work fighting abuse and cyberstalking.

Read More