It’s been a busy blogging month and we’ve all written about challenges and best practices. I found myself advocating that any company that does email marketing really must have a well-defined delivery strategy. Email is such vital part of how most companies communicate with customers and potential customers, and the delivery landscape continues to increase in complexity (see my post...
Do system administrators have too much power?
Yesterday, Laura brought a thread from last week to my attention, and the old-school ISP admin and mail geek in me felt the need to jump up and say something in response to Paul’s comment. My text here is all my own, and is based upon personal experience as well as those of my friends. That said, I’m not speaking on their behalf, either. 🙂 I found Paul’s use of the word ‘SysAdmin’ to be a...
Politics and Delivery
Last week I posted some deliverability advice for the DNC based on their acquisition of President Obama’s 2012 campaign database. Paul asked a question on that post that I think is worth some attention. I am fascinated by the ramifications of email deliverability for political donations. Are there sysadmins at the big ISPs who make human decisions on deliverability issues anymore? The power...
The FTC answers questions about CAN SPAM
The FTC posted answers to a number of questions about the CAN SPAM act. Email is an essential part of most companies’ marketing strategy. If you send commercial email – or have others send it for you – are you complying with the CAN-SPAM Act and the FTC’s CAN-SPAM Rule? FTC attorney Christopher Brown answers some of the CAN-SPAM questions businesses are asking. Nothing really surprising...
Ashley Madison Compromise
Last month Brian Krebs reported that the Ashley Madison database was compromised. Ashley Madison is a dating site that targets married folks who are looking to have affairs. Needless to say, there is a lot of risk for users if their data is found on the released data. Today what is supposedly the Ashley Madison data was released. The release of this data can have some significant impacts on the...
Pattern matching primates
Why do we see faces where there are none? Paradolia Why do we look at random noise and see patterns? Patternicity Why do we think we have discovered what’s causing filtering if we change one thing and email gets through? It’s all because we’re pattern matching primates, or as Michael Shermer puts it “people believe weird things because of our evolved need to believe...
Phishing costs company $46 million
Brian Krebs posted about a tech firm that lost $46M dollars due to fraud. The company reported in its SEC filings that the money was lost when someone impersonated an employee and directed the finance department to transfer money to outside accounts. This is becoming more common. In some cases, DMARC authentication may stop this kind of fraud. But DMARC has a lot of deployment challenges and can...
More Yahoo! Challenges
A lot of people are reporting they’re not getting confirmation emails when signing up for the new Y! FBL program. This is causing problems with folks attempting to transfer domains to the new FBL.
Will update when I hear anything.
Monitoring Your Mail Stream
One of the most important things for any mail sender to do is monitor their mail stream. There are a number of things that every mailer should pay attention to. Some are things to monitor during delivery, some are things to monitor after delivery. All of these things tell senders important information about how their mail is being received by their recipients and the ISPs. What to monitor during...
July 2015: The Month in Email
Once again, we reviewed some of the ways brands are trying (or might try) to improve engagement with customers. LinkedIn, who frequently top lists of unwanted-but-legitimate email, announced that they’ll be sending less mail. Josh wrote about giving subscribers options for both the type and frequency of messages, and about setting expectations for new subscribers. In each case, it’s about...