What is My IP Reputation? [3 Ways to Improve]

What is My IP Reputation? [3 Ways to Improve]

...have noticed a decrease in your email engagement and deliverability, it may be time to start thinking about your IP reputation....

5 Reasons Why Your Email Goes to Spam Instead of the Inbox

5 Reasons Why Your Email Goes to Spam Instead of the Inbox

...email keeps getting stuck in the spam folder? We've compiled a list of the top 5 reasons your emails goes to the spam folder instead of the inbox......

21 SMTP Response Codes That You Need To Know

21 SMTP Response Codes That You Need To Know

Use these 21 Common SMTP Response Codes to determine why an email bounced, or why you’re receiving an SMTP error when sending email......

The Complete Guide to Email Authentication, Part 8

This is part 8 of an 8 part series on Email Authentication, to go to part one click here. Conclusion As spam and online threats continue to plague user inboxes, Internet and email providers will continue to aggressively take steps to protect their users by implementing the latest technologies and standards available. Email authentication is part […]...

What Affects Email Deliverability [Top 3 Best Practices]

What Affects Email Deliverability [Top 3 Best Practices]

Let's dive a little deeper into what affects your email deliverability and how you can maximize the potential of your email sending...

The Complete Guide to Email Authentication, Part 7

This is part 7 of an 8 part series on Email Authentication, to go to part one click here. ISP Adoption of Email Authentication As stated earlier, there has been no general adoption of one specific email authentication standard by the ISP and receiving communities. Additionally, ISPs generally have not been forthcoming about what authentication methods […]...

Effective Transactional Email Design: The Anatomy of a Receipt Email

Effective Transactional Email Design: The Anatomy of a Receipt Email

What does an effective transactional email design look like? In this post, you'll learn how to create an an effective transactional receipt email that......

The Complete Guide to Email Authentication, Part 6

This is part 6 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys Identifed Mail (DKIM) DomainKeys Identified Mail (DKIM) is the successor to Yahoo DomainKeys. Being very similar in functionality to DomainKeys, DKIM has additionally adopted aspects from Cisco’s Identified Internet Mail standard (IIM), and the result […]...

The Complete Guide to Email Authentication, Part 5

This is part 5 of an 8 part series on Email Authentication, to go to part one click here. DomainKeys DomainKeys is a domain-level authentication standard that uses public/private key encryption, DNS, and multiple policies to prove the legitimacy and contents of an email message. It verifies the domain used in the “from” or “sender” header. […]...