POPULARITY
You think you know email deliverability? Think again. Jay Schwedelson teams up with Guy Hanson and Danielle Gallant for a rapid-fire, no-nonsense "kitchen sink" episode of Spamageddon, where they serve up 10 essential (and sometimes controversial) deliverability tips. From wild British vs. American word wars to why the Gmail Promotions tab is scarier than you think, this one's packed with sharp takes and real talk on surviving the modern inbox.Best Moments:(01:10) British vs. American word chaos—table this or talk about it now?(05:08) DMARC's “none” policy is a fraudster's dream, and it's about to become a problem for everyone.(06:23) Spam complaint rates—don't settle for the “generous” 0.3%, aim for 0.1% or lower.(07:30) Double opt-in: future mandate or marketer's nightmare?(09:41) Data hygiene starts at signup—think address validation, Captcha, and keeping bots out.(11:10) Delete those dormant subscribers or risk deliverability doom.(12:00) Use feedback loops to permanently ditch serial complainers.(13:19) Gmail is using AI to auto-insert promo annotations—take control before weird images show up.(15:12) AI summaries are coming for your emails—start thinking SEO and alt text, now.(16:40) Don't blast at the top of the hour if you want your emails to actually land.(17:39) Accessibility issues are everywhere—don't let your emails be part of the 90% problem.(18:24) New AI laws mean you need to update privacy and rethink your risk, pronto.(19:16) BIMI and logo verification—don't be the email sender with no face in the inbox.Guy and Danielle invite you to check out the Email After Hours podcast and explore deliverability tools and guidance from Validity.=================================================Check out our 100% FREE + VIRTUAL EVENTS! ->Guru Conference - The World's Largest Virtual EMAIL MARKETING Conference - Nov 6-7!Register here: www.GuruConference.com=================================================Check out Jay's YOUTUBE Channel: https://www.youtube.com/@schwedelsonCheck out Jay's TIKTOK: https://www.tiktok.com/@schwedelsonCheck Out Jay's INSTAGRAM: https://www.instagram.com/jayschwedelson/=================================================AND don't miss out on this awesome FREE upcoming Quick Hit!Marigold: Should I Switch Email Platforms? 5 Truths & Myths!6/24 11am – 12pm ET.Register HERE: https://www.linkedin.com/events/7325947932031991808/comments/=================================================MASSIVE thank you to our Sponsor, Marigold!!Email chaos across campuses, branches, or chapters? Emma by Marigold lets HQ keep control while local teams send on-brand, on-time messages with ease.Podcast & GURU listeners: 50 % off your first 3 months with an annual plan (new customers, 10 k-contact minimum, terms apply).Claim your offer now at jayschwedelson.com/emma
Small and medium-sized businesses (SMBs) are exhibiting a dangerous overconfidence in their cybersecurity readiness, with a significant gap between their perceived capabilities and actual security measures in place. A recent report reveals that while 71% of SMBs feel confident in managing major cybersecurity incidents, only 22% have an advanced cybersecurity posture. This disconnect presents a critical opportunity for IT service providers to step in with strategic, outcome-focused solutions that emphasize not just tools, but comprehensive cybersecurity strategies.The landscape of cybersecurity is evolving, with SMBs increasingly recognizing the importance of cyber resiliency. Reports indicate that 68% of small businesses and 89% of mid-market firms understand the need for quick recovery from incidents, yet many still lack formal security protocols. As the market for cybersecurity solutions is projected to grow significantly, reaching an estimated $70 billion by 2034, the demand for effective strategies is more pressing than ever. The rise of cloud-based security solutions and zero-trust architecture is indicative of this shift.Regulatory changes are also impacting the cybersecurity landscape, as the SEC withdraws proposed regulations that would have required investment firms to establish written cybersecurity policies. This deregulation creates a trust vacuum that IT providers can fill by offering managed compliance and risk mitigation services. The convergence of regulatory retreat and escalating cyber threats underscores the need for proactive security measures, as the responsibility for cybersecurity increasingly shifts to the market.Amid these challenges, advancements in email security, particularly through DMARC adoption, show promise in combating phishing attacks. However, the rapid proliferation of generative AI applications is creating new vulnerabilities, complicating the security landscape. IT service providers are urged to capitalize on foundational security measures while also addressing the emerging risks associated with AI. The evolving cybersecurity environment presents both challenges and opportunities for providers who can adapt and innovate in response to these shifting dynamics. Four things to know today 00:00 SMBs Overconfident, Underprepared: Cybersecurity Misalignment Fuels $70B Market Surge05:00 SEC Pullback Leaves Cyber Gaps as Ransomware and Zero Trust Shape 2025 Risk Landscape08:50 From DMARC to Shadow AI: Why Cybersecurity Now Requires Dual-Front Defense11:45 Bifurcation in IT Services: MSP-Centric Tools and Vertical Platforms Signal Strategic Divide This is the Business of Tech. Supported by: https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
警察庁はこの「意識しなくても被害に遭わない環境」を作る技術の一つとして DMARC に着目し、関係省庁とともに導入促進に取り組んでいる。
Copy That Converts - Entrepreneurs, Copywriting, Launch, Email Marketing, Conversion
It's the 100th episode of Copy That Converts and I'm celebrating by answering YOUR most pressing questions about email marketing and copywriting.
האשם הוא תמיד ה-DNSמהו DNS ולמה הוא חשוב כל כך לפעילות אימייל מרקטינג?מערכת שמות המתחם, ראשי תיבות Domain Name System (או DNS) היא מרכיב קריטי לתפקוד כל תשתית אינטרנט. לעיתים קרובות אולי בגלל היותו מרכיב טכני, ה-DNS ואופן ניהולו אינם מקבלים את תשומת הלב הראויה מצד מדוורים או בעלי אתרים.במסגרת תהליכי ליווי לקוחות אני נתקל בהמון בעיות סביב ה-DNS שבהקשר של אימייל מרקטינג ותפעול תקין של אימייל בכלל, ל- DNS תפקיד קריטי. הוא שומר בתוכו את כל ההגדרות הדרושות לזיהוי, ניתוב, אימות ואבטחת תעבורת האימיילים. כאשר אימייל נשלח, שרתי הדואר בצד המקבל פונים אל ה-DNS של הדומיין השולח ובודקים רשומות SPF, DKIM ו DMARC -כדי לבצע בדיקות ולהחליט אם לקבל את ההודעה, לסווג אותה כספאם, לדחות אותה בהתאם למדיניות DMARC ופרמטרים אחרים.בכל אימייל שנשלח ממערכת הדיוור או כל מערכת מדוורת בשם הדומיין, שרתי הדואר של הצד המקבל יבצעו פניות אל ה-DNS של הדומיין ויבדקו את הרשומות לאימות הדומיין SPF, DKIM, DMARC.
Damos un repaso a los conceptos de SFP, DKIM y DMARC para utilizar el correo electrónico de forma segura. Adems nos acompañan desde CYBERTIX Lorenzo Diaz de Apodaca, CEO y Eduardo Sáez, responsable de Servicios Gestionados. Con: Ray Mills y Carlos Valerdi. Dirige: Carlos Lillo. Gracias a Cyber gurú, Cybertix, Kaspersky, V-Valley y Cato Networks.
Damos un repaso a los conceptos de SPF, DKIM y DMARC para utilizar el correo electrónico de forma segura. Adems nos acompañan desde CYBERTIX Lorenzo Diaz de Apodaca, CEO y Eduardo Sáez, responsable de Servicios Gestionados. Con: Ray Mills y Carlos Valerdi. Dirige: Carlos Lillo. Gracias a Cyber gurú, Cybertix, Kaspersky, V-Valley y Cato Networks.
Gerasim Hovhannisyan, CEO of EasyDMARC, discusses the complexities and challenges of implementing DMARC (Domain-based Message Authentication, Reporting & Conformance) in the cybersecurity landscape. He shares his personal journey, which began after experiencing a significant financial loss due to an email phishing attack. This incident prompted him to explore email authentication protocols, leading to the creation of EasyDMARC, a platform designed to simplify the deployment of these protocols for organizations, particularly managed service providers (MSPs) and small businesses.Hovhannisyan highlights the common friction points faced by organizations when deploying DMARC solutions, particularly the fear of misconfiguration that could lead to legitimate emails being rejected. He notes that many organizations struggle with visibility and control over their email sending sources, which complicates the implementation process. EasyDMARC aims to alleviate these concerns by providing automation and clear visualizations, enabling MSPs to deploy email authentication more effectively and with greater confidence.The conversation also touches on the importance of email security for all businesses, regardless of size. Hovhannisyan argues that even micro businesses need to prioritize email authentication to protect their reputation and maintain secure communication. He emphasizes that while the effort to implement DMARC can be significant, leveraging the right vendor can streamline the process and make it manageable for smaller organizations.Finally, Hovhannisyan discusses the role of major cloud providers like Google, Microsoft, and Yahoo in the email security ecosystem. He believes that their enforcement of DMARC standards is crucial for creating a safer email environment. As regulations evolve and more organizations adopt email authentication practices, Hovhannisyan is optimistic about the future of email security and the ongoing efforts to simplify the implementation process for all businesses. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
なりすましメールを見破りやすくする DMARC は、金融機関をはじめとする民間企業のみならず、地方自治体においても導入が進んでいる。中でも群を抜いて対応率が高いのが北海道、およびその市町村だ。なんと 2024 年には道庁も含めた全 180 団体で DMARC 対応を完了している。一体どのようにして、これだけの自治体が対応を進めていったのだろうか。
株式会社TwoFiveと株式会社システナは5月8日、なりすましメール対策ソリューションの提供で連携すると発表した。システナはTwoFiveのクラウド型DMARC解析サービス「DMARC/25 Analyze」を活用し、なりすましメール対策を支援する。
An email from Google. A law enforcement warning. Everything looks legit—until it isn't. In this episode of Darnley's Cyber Cafe, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
駒澤大学は4月25日、情報セキュリティ強化に関する具体的実施項目を公表した。
Why does email marketing often feel like shouting into the void?
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known issue where the attacker re-uses a prior DKIM signature. This will work as long as the headers signed by the signature are unchanged. Recently, this attack has been successful against Google. https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/ SSL.com E-Mail Validation Bug SSL.com did not properly verify which domain a particular email address is authorized to receive certificates for. This could have been exploited against webmail providers. https://bugzilla.mozilla.org/show_bug.cgi?id=1961406
Launching a course? Don't let legal & technical details derail your success! This episode covers GDPR compliance, email deliverability, and accessibility – essential steps to protect your course and your students. Learn how to avoid headaches and build a sustainable, ethical business.Learn how to:Implement GDPR and ethical email etiquette: Obtain consent, provide opt-outs, and be transparent.Improve email deliverability: Authenticate emails, maintain clean lists, and avoid spam triggers.Ensure course accessibility: Provide captions, use proper color contrast, and design for keyboard navigation.Weekly Action Item:Choose one of the following to implement this week:Review your email opt-in process and privacy policy.Check your email authentication settings (DKIM, SPF, DMARC).Get started on Accessibility with the Accessibility Starter Kit at https://digitalcourse.pro/accessibility Show Resources: Check out all podcast episodes and full transcripts (www.digitalcoursecreatorguide.com/podcast)Follow me on Facebook (facebook.com/digitalcoursecreatorguide) and on Instagram (instagram.com/digitalcoursecreatorguide) for daily tips and ideasWork With Dr. Moira:Join Office Hours for support and mentoring to get your digital course done. (https://digitalcourse.pro/Office-Hours)Make sure that your content is accessible with The Accessibility Starter Kit for Online Creators micro course. (https://digitalcourse.pro/accessibility)Join me for our monthly workshop. April is all about creating your digital course outline in 90 minutes. (https://digitalcourse.pro/monthly-workshop)
Ataque de phishing usa la infraestructura de Google y engaña a millones con un correo falso que parece legítimoPor Félix Riaño @LocutorCoUn ataque de phishing altamente sofisticado está poniendo en riesgo la información personal de 3.000 millones de usuarios de Gmail.Google ha confirmado un ataque de phishing tan convincente que logró pasar todas sus verificaciones de seguridad, engañando incluso a usuarios expertos. El correo fraudulento simula una alerta oficial sobre una citación judicial y dirige a los usuarios a un portal falso alojado en sites.google.com. La trampa: capturar credenciales y robar el acceso a las cuentas. ¿Cómo es posible que incluso los expertos estén cayendo en este engaño?El mensaje parece legítimo… hasta en los detalles más técnicosNick Johnson, desarrollador y experto en Ethereum, recibió un correo que parecía oficial. Decía que Google había recibido una citación judicial para acceder a su cuenta. El remitente: no-reply@accounts.google.com. Todo parecía normal, incluso el dominio tenía sello de verificación DKIM, una firma digital que certifica la autenticidad del correo. Hasta aquí, todo encajaba. Pero al hacer clic, lo llevó a un sitio clonado, una copia perfecta de la página de inicio de sesión de Google. Todo alojado en sites.google.com, parte de la infraestructura legítima de Google. Así, los delincuentes cibernéticos lograron sortear todas las defensas automáticas del sistema.Este ataque no fue obra de aficionados. Usaron un kit de phishing comprado en foros clandestinos, por menos de 25 dólares. Estos kits permiten crear páginas falsas, copiar sitios web reales y enviar correos con apariencia creíble. Lo más grave: pasaron los filtros de autenticación de Google, incluyendo DKIM, SPF y DMARC. Además, el mensaje se ubicó en la misma conversación de otras alertas reales de seguridad. Por eso, incluso usuarios expertos como Johnson y otros desarrolladores fueron engañados. Si no tienes activada la autenticación en dos pasos o no usas passkeys, tus datos pueden quedar expuestos.Google reconoció la falla y aseguró que ya está desplegando protecciones para cerrar esta puerta de entrada. Además, recomendó a todos los usuarios activar la autenticación multifactor o, mejor aún, usar passkeys. Estas llaves de acceso están vinculadas a un dispositivo físico, por lo que no pueden ser robadas con solo un correo falso. En caso de que un hacker cambie tu contraseña y los métodos de recuperación, Google da un plazo de siete días para intentar recuperar la cuenta con el número o correo de recuperación antiguos, siempre que ya estuvieran registrados.Las técnicas de suplantación avanzaron tanto que incluso Troy Hunt, creador del sitio Have I Been Pwned, fue víctima de un correo similar. Este ataque demuestra cómo los ciberdelincuentes aprovechan subdominios legítimos como sites.google.com y vulnerabilidades antiguas que permiten ejecutar scripts y embebidos en páginas aparentemente confiables. Según NordVPN, más de 85.000 URLs falsas imitaron a Google en 2024. El negocio detrás del phishing también creció: los atacantes compran kits completos que incluyen plantillas de correos, páginas falsas y bases de datos de contactos, todo listo para ejecutar.Evita hacer clic en enlaces de correos sospechosos. Abre siempre las páginas desde el navegador y revisa bien el dominio.Flash Diario en Spotify
Scoping the Scene: Why Site Surveys Matter in POTS Replacement, TELCLOUD POTS & Shots Podcast, Jacoby explains, that buildings lose electricity, emergency systems like elevators and fire alarms still rely on that dial tone to operate POTS & Shots Podcast Series “If you skip the site survey, you might be skipping success,” says Jake Jacoby, TELCLOUD. In the latest episode of POTS and Shots, Doug Green, publisher of Technology Reseller News, reconnects with Jake Jacoby of TELCLOUD to tackle one of the most overlooked—but critical—steps in POTS replacement: the site survey. “POTS lines traditionally delivered power,” Jacoby explains, noting that when buildings lose electricity, emergency systems like elevators and fire alarms still rely on that dial tone to operate. With modern replacements depending on cellular backhaul and battery backups, understanding a site's power setup and signal availability is essential before installation begins. Jacoby walks us through the must-check boxes:✔ Where is the DMARC?✔ Is there enough space and a backboard for mounting?✔ Is power always available—and not tied to something as simple as a light switch?✔ Is there cellular signal in that basement telco closet? These aren't small details. “This isn't a home phone. These are life safety lines,” Jacoby stresses. TELCLOUD ensures reliable implementation by offering trained reseller programs and certified third-party installers. As always, after the tech talk, the POTS and Shots series adds flavor with a tequila—or in this case—mezcal spotlight. Jacoby introduces Cuatrocientos Conejos, a smoky spirit rooted in Aztec mythology. “Every tequila is a mezcal, but not every mezcal is a tequila,” he says, explaining the nuanced difference based on agave type and production method. Stay tuned: the next episode will dive into future-proofing telecom and ensuring long-term sustainability of POTS line replacements. Learn more: www.telcloud.com
In this episode, Tyler and Brad discuss DMARC and how the latest version of the PCI framework requires phishing protection. You'll also learn about DMARC, DKIM, and SPF and how to elevate them to help protect your organization from attacks like Business Email Compromise (BEC).Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Spencer's Twitter: https://x.com/techspenceSpencer's LinkedIn: https://linkedin.com/in/SpencerAlessi Work with Us: https://securit360.com
Friend of the podcast and friend of Mailgun, Brian Westnedge of Red Sift stopped by to talk about how Mailgun and Red Sift want to make DMARC adoption easy as possible for Mailgun users and why DMARC authentication is needed in your email strategy. Peter Trinder from Mailgun joined us as well to let us know what went into this process and what to expect. Email's Not Dead is a podcast about how we communicate with each other and the broader world through modern technologies. Email isn't dead, but it could be if we don't change how we think about it. Hosts Jonathan Torres and Eric Trinidad dive into the email underworld and come back out with a distinctive look at the way developers and marketers send email.
We discuss why simply using platforms like HubSpot or MailChimp isn't enough anymore, the importance of authentication protocols like DKIM, SPF, and DMARC, and how Google and Yahoo's new rules impact email marketing. Plus, MV shares insights on why email is the glue for your business, the importance of testing and auditing your emails, and how to optimize automations without losing authenticity.If your emails aren't getting the engagement they should, this episode is a must-listen!What next?Want to improve your email deliverability and get out of the spam folder?
ソニーネットワークコミュニケーションズ株式会社は3月10日、DMARCポリシー・海外利用制限機能の設定変更について発表した。
「『正規メールは見てわかる』それがとても重要であると申し上げて、私の発表を終わらせていただきます」平塚氏の講演結びの言葉が胸に刺さって余韻が残った。すべからくセキュリティ対策とはユーザーの判断の手間を最小限にすることを目指すべきだ。
In this episode of Tate Talks, I sit down with Taylor Tabusa, co-founder of Palisade, a DMARC automation platform designed specifically for MSPs. We explore Taylor's unique journey from winemaking in Napa to launching an email security company and discuss why email authentication is now a must-have for MSPs. We also cover the broader challenges MSPs face today, from growth strategies to tool fatigue, and how vendors can better support the industry. Spam Resource Blog by Al Iverson – https://www.spamresource.comAbout TaylorConnect with Taylor on LinkedIn here and check out the Palisade website hereMusic - https://www.purple-planet.com
GMOあおぞらネット銀行株式会社は2月20日、同社から送信するメールのセキュリティ強化について発表した。
E-mail marketing has changed, and so must your approach if you want to reach your audience in 2025. I chatted with MV Braverman, founder of Inbox Welcome, to talk about e-mail deliverability—a topic often overlooked but absolutely essential. While we all obsess over catchy subject lines and beautiful designs, none of that matters if your e-mails never make it to the inbox. MV shared practical advice to help you understand deliverability and improve your results. Here are a few of the key takeaways: Authentication is Non-Negotiable To combat spam, providers like Google and Yahoo now require senders to authenticate their e-mails. Tools like SPF, DKIM, and DMARC ensure your e-mails are verified and trustworthy. But here's the catch: while platforms like MailChimp can help you authenticate campaign emails, that's only part of the puzzle. MV recommends a comprehensive setup covering all your email streams—like invoices, auto-responders, and proposals. Reporting Matters DMARC doesn't just verify your emails—it also provides detailed reports about where your emails are landing (inbox vs. spam) and how they're being perceived by providers like Microsoft. These insights are invaluable for spotting problems early. Focus on the Reader's Experience Your emails should be accessible, mobile-friendly, and readable in both light and dark modes. MV pointed out that ignoring dark mode—a preference for up to one-third of email users—can make your emails nearly impossible to read. Don't Rely Solely on Images While image-only emails may look appealing, they're a disaster for accessibility. Many readers (including me!) block images by default, and with AI tools summarizing content, text is more important than ever. Always include descriptive, clear text in your emails. What You Can Do: Review your email authentication settings across all platforms, not just your email marketing tool, to ensure full coverage. Download MV's DMARC guide to learn how to set up reporting and spot deliverability issues before they become major problems. Email marketing isn't just about what you say—it's about making sure people actually receive it.
In this episode, we delve into the relevance and implementation of DMARC (Domain-based Message Authentication, Reporting & Conformance) in today's email security landscape. The discussion covers how major organizations like Google, Yahoo, and Microsoft have started enforcing DMARC policies to combat spam, especially for high-volume email senders. We also explore the importance of continuous monitoring and the potential pitfalls associated with implementing DMARC improperly, including real-world examples highlighting the consequences. Join us to learn about the nuances of DMARC, from setting it up to ensuring seamless communication across departments, and why it is crucial for your organization's email security strategy.Resources: https://easydmarc.com/blog/dmarc-pci-dss/ 00:00 Introduction to PCI and Podcast Focus01:52 The Rise of DMARC in 202404:06 DMARC Implementation Challenges09:17 Importance of Continuous Monitoring12:38 Vendor Changes and Their Impact18:30 Implementing DMARC: Tips and Pitfalls31:59 Conclusion and Final Thoughts
In this Thursday episode of the SMB Community Podcast, host James Kernan talks with Mike Anderson, Director of Global Channels for EZDMark. They discuss the importance of DMARC (Domain-based Message Authentication, Reporting & Conformance) in improving email deliverability and protecting domains from spoofing. Mike shares his journey from the car business to technology, and explains how EZDMark's user-friendly analytics platform aids MSPs in managing DMARC concerns and monetizing these services. They highlight the platform's risk assessment tool, which allows MSPs to generate quick, customized risk assessments to attract potential clients. The episode concludes with details on special promotions and the simplicity of onboarding with EZDMark. Chapter Markers: 00:00 Introduction to SMB Community Podcast 00:54 Meet Mike Anderson from EZDMark 01:58 Mike Anderson's Journey into Technology 03:08 Understanding EZDMark and DMARC 04:33 EZDMark's Unique Features and Benefits 06:34 The Power of EZDMark's Assessment Tool 10:31 Onboarding and Special Promotions 14:06 Final Thoughts and Conclusion New Book Release: I'm proud to announce the release of my new book, The Anthology of Cybersecurity Experts! This collection brings together 15 of the nation's top minds in cybersecurity, sharing real-world solutions to combat today's most pressing threats. Whether you're an MSP, IT leader, or simply passionate about protecting your data, this book is packed with expert advice to help you stay secure and ahead of the curve. Available now on Amazon! https://a.co/d/f2NKASI Sponsor Memo: Since 2006, Kernan Consulting has been through over 30 transactions in mergers & acquisitions - and just this past year, we have been involved in six (6). If you are interested in either buying, selling, or valuation information, please reach out. There is alot of activity and you can be a part of it. For more information, reach out at kernanconsulting.com
Welcome to this replay on The Cyber Threat Perspective! In this episode, Brad and Spencer dive into the mechanics and recent developments of email spoofing, shedding light on how attackers are bypassing advanced email protections.In this episode, we cover:The fundamentals of email spoofing and why it's a significant threat.Insight into the recent echo spoofing campaign exploiting Proofpoint's misconfiguration.The role of SPF, DKIM, and DMARC in combating email spoofing.How threat actors are using Microsoft 365 to bypass email protections.Mitigation strategies and the latest updates from Proofpoint and Microsoft to address these vulnerabilities.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
Intel's CEO departs but replacing him won't magically solve its serious problems, Zipcar wasn't prepared for an outage and handled it really badly, moving to an email provider that supports DMARC, and picking a NAS distribution. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Ask Me […]
Intel's CEO departs but replacing him won't magically solve its serious problems, Zipcar wasn't prepared for an outage and handled it really badly, moving to an email provider that supports DMARC, and picking a NAS distribution. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Ask Me... Read More
Episode Summary In this episode of OnBase, host Chris Moody talks with Anh Huynh about the evolving role of AI in cybersecurity, especially in email and collaboration systems. Anh shares his journey from early IT setups to today's advanced AI-based security measures, highlighting the shift from heuristics-based to AI-driven threat detection to combat sophisticated business email compromises (BEC). Anh explains how collaboration, communication, and integrating AI across security infrastructures are crucial in staying ahead of cyber threats. They also discuss the importance of emotional intelligence, balancing hybrid work environments, and tools that enhance security and quality of life, especially for remote work. About the guest Anh Huynh is the Director of Messaging Engineering and Head of Security Services at Applied Materials, where he has led teams in securing critical communication infrastructure for nearly five years. In this role, Anh focuses on cybersecurity measures within messaging and collaboration spaces, implementing advanced AI/ML detection processes, and enforcing security protocols like SPF, DMARC, and DKIM to address emerging cyber threats. He also oversees supply chain cybersecurity initiatives, IP protection, and data loss prevention, integrating solutions across platforms like Outlook, Exchange, and Office 365. With over 18 years of experience in global messaging, Anh combines technical expertise with a strategic approach to managing cybersecurity and team development, making him a valuable voice on the role of AI and layered security in modern enterprises.Anh also helps businesses enhance their cybersecurity strategy through his firm, ADH Consulting.Connect with Anh: Phone: 831-277-3525 | Threads: @anhdhuynh75 | Email: anhdhuynh@gmail.com | LinkedIn Key takeaways - AI in Cybersecurity: AI is crucial for detecting sophisticated threats like business email compromises, surpassing traditional methods. - Collaboration is Key: Effective cybersecurity needs strong collaboration and shared intelligence across teams. - Hybrid Work Balance: A balanced mix of in-office and remote work supports productivity and security adaptability. - Layered Security: A multi-layered defense, combining traditional and AI methods, enhances threat detection. - Actionable Insights: AI should provide clear, actionable insights to reduce manual work and improve security. - Emotional Intelligence: Leaders should cultivate emotional intelligence to manage hybrid teams better. - Tech and IoT Tools: Familiarity with various tech ecosystems and using IoT tools can improve personal and professional security. Quotes "The old process of heuristics-based security does not work today in the real world." -Anh HuynhRecommended Resource BooksEmotional Intelligence by Daniel Goleman: It explores how understanding and managing emotions can enhance personal and professional relationships Connect with Any Huynh | Follow us on LinkedIn | Website
What should you look for when choosing an email newsletter tool? What if you are considering moving? This episode shares some key features you want to review and evaluate as you put together your company's most valuable asset - your email list! Get the full links and show notes at https://CourseCreatorsHQ.com/218. LINKS MENTIONED Note: Some of these are affiliate links, and I earn a small commission when you use them. Thank you!Don't miss this incredible Kajabi Special EXTENDED only through November 15, 2024! You get 50% off for a YEAR, plus 10 weeks of live coaching with me, plus $2K of courses: 24 Hour Course Creator which I've never given away! plus Sales Page Secrets, Joint Venture Secrets and Effortless Email, and my step-by-step, click-by-click Kajabi Kickstart course. I've never seen or done a deal this good to get you set up for 2025! Be sure to pick your plan (I recommend Basic with 3 products or Growth with 15): https://CourseCreatorsHQ.com/Kajabi50off Or if you are visiting after the deadline - use this link to get a 30 Day Free Trial! https://coursecreatorshq.com/kajabi-signup Convert Kit / Kithttps://CourseCreatorsHQ.com/ConvertKit LeadPageshttps://LeadpagesOnline.com RELATED EPISODES E187: Funnels, Email & Better Messaging… Oh My! E176: 7 Key Reasons Email Marketing Isn't Working to Sell Your Online Course E090: 7 Big Email Mistakes Online Course Creators Make E052: Email Marketing – The 6 Cs for Online Course Creators E038: Email Marketing Secrets for Course Creators KEY TAKEAWAYS FOR ONLINE COURSE CREATORS Two types of email programs:Primary function is email: ConvertKit (now Kit), ActiveCampaign, Aweber, DripAn All-in-one-Tool that has email built in – plus runs your entire online business11 Things to Consider:Consider whether you will use an all-in-one-tool.Landing pages to create a funnel.Automation functionality: simple automation is to send a welcome message or complex.Ease of email creation. Automatic integration with your other tools. Check costs as your email size rises.Older tools have bolt-ons. Moving your list: do you have to re-confirm the addresses?Double optin functionality.Email deliverability – complicated process and gets even more complex as your list size grows (SPF, DKIM, DMARC are technical settings).Watch your numbers – especially click through rates. COME VISIT JULIE! Get on the email list AND get the FREE Ultimate Course Creators Planner - https://coursecreatorshq.com/2024PlannerPodcast Get this free course - Is My Course Idea Any Good? here -https://www.coursecreatorshq.com/ideaGoodPods Let's talk about this episode on GoodPods – https://CourseCreatorsHQ.com/goodpods (mobile only, download the app first) Website https://www.CourseCreatorsHQ.comYouTube https://coursecreatorshq.com/YouTubePodcast Facebook https://www.facebook.com/CourseCreatorsHQInstagram https://www.instagram.com/CourseCreatorsHQTwitter https://www.Twitter.com/CourseHQThreadshttps://www.threads.net/@coursecreatorshq Disclaimers https://coursecreatorshq.com/disclaimers/
In this episode, we're diving deep into email security with CIT's Director of Cybersecurity, Nate, & Security Engineer, Andrew, as they unravel the complexities & critical importance of DMARC (Domain-based Message Authentication, Reporting & Conformance). Rising threats in email security have prompted Nate and Andrew to explain why organizations need stronger email authentication measures now more than ever. Learn about the roles of SPF, DKIM, and DMARC in verifying sender authenticity, preserving email integrity, and defending against phishing attacks. They'll also share real-world examples, like the costly impacts of unmonitored DMARC policies and challenges in coordinating with third-party vendors. This is essential listening for anyone responsible for keeping email communications safe & secure. Learn more about Email security: https://www.cit-net.com/email-security-what-is-it/ Resources: https://www.darkreading.com/cybersecurity-operations/time-get-strict-dmarc https://www.darkreading.com/cyber-risk/most-us-political-campaigns-lack-dmarc-email-protection
In this episode of Mastering eCommerce Marketing, host Eitan Koter welcomes Nikita Vakhrushev, the Founder/CEO of ASPEKT, a digital agency specializing in email marketing for DTC brands. Nikita brings a wealth of experience in helping brands build stronger connections with their customers through targeted email and SMS campaigns.Eitan and Nikita get into some essential topics around email marketing today, covering how to get emails delivered, keep audiences engaged, and make email a dependable revenue driver. Nikita shares his approach to deliverability, walking through what it takes to get emails into inboxes — from SPF records and DMARC setup to domain warmups. They also talk about the challenge of keeping email lists active year-round to make sure brands are top of mind when key shopping times like Black Friday roll around.Nikita also explains his approach to finding the right balance between promotional and value-driven content in email campaigns, plus the importance of A/B testing to see what resonates with audiences. He shares how SMS can complement email marketing, especially for products with lower price points where a quick, simple message drives conversions.For brands looking to grow their email list, Nikita suggests a mix of strategies, from website pop-ups to lead generation through social channels. Finally, Nikita talks about how AI tools like ChatGPT help his team generate fresh ideas and create content that engages customers effectively.Whether you're a seasoned marketer or just looking to get more out of email, Nikita's practical approach to email and SMS offers some solid takeaways for today's fast-paced eCommerce world.Website: https://www.vimmi.net Email us: info@vimmi.net Podcast website: https://vimmi.net/mastering-ecommerce-marketing/ Talk to us on Social:LinkedIn Eitan Koter: https://www.linkedin.com/in/eitankoter/ LinkedIn Vimmi: https://il.linkedin.com/company/vimmi YouTube: https://www.youtube.com/@VimmiCommunications Guest: Nikita Vakhrushev, the Founder/CEO of ASPEKTLinkedIn:
נפתחו אפשרויות חדשות למדוורים להציג לוגו ב-inbox של נמענים ב-2021 הושק תקן BIMI המאפשר למותגים להציג את הלוגו המאומת שלהם לצד שם השולח בתיבת האימייל בספקיות אימייל שונות, מה שמעצים את הנוכחות הויזואלית ואת האמינות של המותג בעיני הנמענים. עם זאת, יישום BIMI אינו פשוט וכרוך במספר תהליכים טכנולוגיים ובירוקרטיים מורכבים.התֶקן דורש מהמדוורים לעבור תהליך אימות דומיינים, באמצעות DKIM ורצוי גם באמצעות SPF. כמו כן נדרש להגדיר רשומת DMARC תקינה הכוללת אפשרות לקבל דוחות DMARC ולנתח אותם. המותג צריך לעבור “מסע DMARC” - תהליך הדרגתי שמתחיל בקבלת דוחות ותיקון ליקויים, ומסתיים בהגעה למצב DMARC באכיפה מלאה. למרות המורכבות, היתרונות של BIMI בהגברת האמון והזיהוי של הלקוחות עשויים להצדיק את ההשקעה עבור מותגים רבים.בסוף התהליך כשהדומיין במצב אכיפה, מתקיימת הגנה על הדומיין והמותג מפני spoofing (ניסיונות התחזות). המדיניות (policy) מנחה את הצד המקבל (ספקיות אימייל כגון Gmail ואחרים) כיצד לנהוג במקרה של בעיה באימות (authentication) או בהתאמה (alignment) של SPF ו/או DKIM: לשים את האימיילים בהסגר (במצב quarantine), או לדחות אותם (במצב reject). כתוצאה מכך נמענים לא יקבלו את אותם אימיילים מתחזים וכך מתקיימת הגנה על הדומיין מפני התחזות.על מנת להציג BIMI לוגו בספקיות אימייל מובילות כגון Gmail, המותג נדרש לרשום סימן מסחרי על הלוגו שיוצג ב-inbox באחת מהמדינות שנתמכות על ידי קבוצת BIMI (מחוץ לישראל), לשמור את הלוגו במפרט ספציפי עבור BIMI לוגו, להגדיר רשומות ב-DNS, לאחסן את הלוגו המיוחד (למשל באתר) ולקבל מגורם מאשר (לשכת שירות) תעודת VMC (Verified Mark Certificate).בשנתיים האחרונות קצב האימוץ עולה בהתמדה ועומד כיום על כ-500 לוגואים מאומתים חדשים המצטרפים בכל חודש מקרב 10,000 האתרים המובילים. אוקטובר 2024 - חידושים בהצגת לוגו בג'ימייל ואפל:ג'ימייל הכריזה זה עתה על אפשרות להצגת לוגו BIMI באמצעות תעודה שנקראת CMC שאינה דורשת מהמותג להיות בעל סימן מסחרי רשום על הלוגו . גם אפל יצאה זה עתה עם אפשרות חדשה להציג לוגו (שאינו BIMI) בתיבת המייל Apple Mail באמצעות שירות Business Connect.על כל החידושים אני מרחיב בפודקאסט ובמאמר
This episode delves into the ongoing remote work debate, particularly focusing on Amazon's recent mandate requiring employees to return to the office five days a week starting in 2025. This decision has sparked significant backlash, with a Newsweek study indicating that a majority of remote workers would consider resigning if forced back into the office. The dissatisfaction is echoed in a poll revealing that 91% of Amazon employees are unhappy with the policy, and many express concerns about its impact on work-life balance and flexibility.The episode also highlights the evolving landscape of managed service providers (MSPs) and help desk operations, showcasing new technological advancements. Moovilla's integration with Autotask PSA aims to enhance project management for MSPs, while PIA introduces features to streamline ticket handling. Additionally, Cohesity's new visual data exploration capability addresses the challenges of unstructured data, and Cisco unveils AI-powered innovations for its Webex Contact Center, promising to improve customer satisfaction and operational efficiency.Host Dave Sobel further discusses the surge in email security adoption, particularly the implementation of DMARC (Domain-Based Message Authentication Reporting and Conformance). Despite nearly 6.8 million domains utilizing email sender authentication, many businesses remain hesitant to enforce stricter policies. The episode raises concerns about the effectiveness of email authentication and the slow pace of adoption, particularly in industries like non-profits, where DMARC usage is notably low.Finally, the episode touches on the competitive dynamics in the AI market, particularly the strained partnership between OpenAI and Microsoft amid financial pressures. Sobel reflects on Intel's struggles to keep pace with the booming AI sector, contrasting its market value with that of NVIDIA. The discussion concludes with a sobering look at the challenges faced by law enforcement in combating cybercrime, emphasizing the growing sophistication of cyber gangs and the need for a reevaluation of security strategies in the tech industry. Four things to know today 00:00 Remote Work Debate Intensifies: Amazon Faces Pushback on Office Mandate, While Surveys Highlight Hybrid Work's Benefits03:49 AI Transformations in Helpdesk and MSP Operations: Cisco, Fixify, and Cohesity Roll Out New Capabilities for Smarter Workflows07:12 Email Security Adoption Surges as DMARC Implementation Increases, Yet Full Enforcement Remains Distant08:56 Will AI Deliver Financial Returns? Examining Profit Challenges in Big Tech's AI Race Supported by: https://mspradio.com/engage/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues. Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training. Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape. Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode: Extreme Privacy by Michael Bazzell Connect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues. Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training. Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape.Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode:Extreme Privacy by Michael BazzellConnect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
In this episode, Jonathan Steele, a Chicago-based divorce attorney and partner at Behrman LLP, shares crucial insights on cybersecurity tailored for law firms. The discussion covers prevalent digital threats like phishing attacks, business email compromises, and domain security issues. Jonathan stresses the importance of identifying suspicious emails, employing preventive measures such as DMARC, DKIM, and SPF records, and the vital role of modern techniques like pen testing. The conversation highlights the generational challenges in adopting security practices such as zero trust and multi-factor authentication, emphasizing the need for constant vigilance, updated security systems, and proper training. Practical advice on protecting sensitive client data and personal information from identity theft and data brokers is offered, alongside a recommendation for Michael Basil's 'Extreme Privacy' book. This episode provides a well-rounded approach to maintaining robust cybersecurity in the evolving digital landscape. Jonathan gives listeners actionable tips on: 00:00 Intro 01:50 Common Cyber Threats to Law Firms 02:59 Recognizing and Handling Phishing Attempts 08:18 Email Security and Domain Protection 12:47 Updating IT Practices for Modern Security 14:07 Challenges with Legacy IT Systems 17:34 Legal Implications of Cybersecurity 18:15 Personal vs. Business Cybersecurity 19:04 Reputation and Legal Risks 21:25 Evolving Threat Landscape 23:34 Book Recommendation 29:58 Ongoing Cybersecurity Practices 31:17 Final Takeaways and Conclusion Resources mentioned in this episode: Extreme Privacy by Michael Bazzell Connect with Jonathan here: Instagram Twitter LinkedIn Facebook https://steelefamlaw.com Connect with me Instagram Pinterest Facebook Twitter Karin on Twitter Karin on LinkedIn Conroy Creative Counsel on Facebook https://conroycreativecounsel.com
**Cold Open (AMAZON GIFT CARD CHALLENGE TO LISTENERS / Headlines without Context)****Skip the Cold Open at 19:50**We've had to dive down the email rabbit hole. Exploring SPF, DKIM, DMARC, and SMTP solutions.Why?Because our job is to deliver leads to our clients. When someone fills out a form on our client's site, in order for us to properly get credit for that lead, the client needs to be alerted immediately.However, as 2024 comes to a close, the website and digital marketing space has been plagued by email deliverability issues, which include websites sending lead form submissions.We reflect on what kind of agency we set out to be and how our continued pursuit of being that hands-off agency has led us down the path of becoming technical email deliverability experts.----------------------------------Our recommended agency tools:everbrospodcast.com/recommended-tools/----------------------------------⭐⭐⭐⭐⭐As always, if you enjoyed this episode or this podcast in general and want to leave us a review or rating, head over to Apple and let us know what you like! It helps us get found and motivates us to keep producing this free content.----------------------------------Want to connect with us? Reach out to us on the everbrospodcast.com website, follow us on YouTube, or connect with us on socials:YouTube: @agencyuTwitter/X: @theagency_uLinkedIn: linkedin.com/company/agencyuFacebook: facebook.com/theagencyuInstagram: @theagencyuReddit: u/JakeHundleyTikTok: @agency.u
In the season finale of Email's Not Dead, hosts Eric and Jonathan recap the key insights from Season 5 and look ahead to the future of email. They revisit important discussions on DMARC implementation, Google and Yahoo's new sender requirements, and email marketing best practices. The hosts emphasize the importance of proactive email authentication and list hygiene while previewing upcoming industry changes. They also tease the upcoming Email Camp event, where they'll dive deeper into these topics with industry experts. This episode serves as both a reflection on recent developments in the email world and a glimpse into what's next for email professionals. Email's Not Dead is a podcast about how we communicate with each other and the broader world through modern technologies. Email isn't dead, but it could be if we don't change how we think about it. Hosts Jonathan Torres and Eric Trinidad dive into the email underworld and come back out with a distinctive look at the way developers and marketers send email.
In this episode of the Security Swarm Podcast, host Andy and his guest Michael Posey discuss the email authentication protocols of SPF, DKIM, and DMARC. They explain what these protocols are, how they work, and why they are important for protecting against email spoofing and impersonation attacks. Michael shares his insights from working with MSPs and the channel, noting that while these protocols are not overly complex, they are often overlooked or misunderstood by IT professionals. The hosts dive into the specifics of each protocol - SPF defines which mail servers are allowed to send email for a domain, DKIM adds a cryptographic signature to validate the message's origin and integrity, and DMARC ties the two together to specify how receivers should handle authentication failures. The discussion covers the benefits of these protocols in improving email security and reputation, as well as the importance of adopting them industry-wide to reduce impersonation tactics used by threat actors. The hosts also touch on the history of cryptography and the need to layer security controls rather than relying on any single solution. Overall, this episode provides a comprehensive overview of these essential email authentication standards. Key Takeaways: SPF allows domain owners to specify which mail servers are authorized to send email on behalf of their domain. This helps prevent domain spoofing. DKIM Uses cryptographic digital signatures to verify that an email message was sent by the owner of a given domain and has not been tampered with in transit. This adds an extra layer of authentication. DMARC Brings SPF and DKIM together, allowing domain owners to specify how the receiving mail server should handle messages that fail authentication checks (e.g. quarantine, reject). This provides a standardized policy for handling unauthenticated emails. The adoption of these email authentication protocols is increasing, with SPF now used by over 90% of domains. As more organizations implement these standards, it becomes harder for threat actors to successfully impersonate domains through email. While these protocols are valuable tools, they should not be relied upon as the sole security measure. They are one layer in a comprehensive email security strategy that also includes user education, spam filtering, and other security controls. Timestamps: (05:50) SPF (Sender Policy Framework) (11:23) DKIM (DomainKeys Identified Mail) (16:11) How DMARC brings SPF and DKIM together (21:32) Key Protocols for Security and Compliance (24:11) Defense in Depth Episode Resources: DMARC Pro Tips What is SPF? What is DKIM?
In this episode, email deliverability expert Benny Rubin shares insights on effective cold emailing and avoiding the spam folder. He discusses his background in music and how he transitioned to becoming a B2B marketer. Rubin explains the importance of email marketing in enhancing the customer journey and gives examples of successful email campaigns that improved customer loyalty and conversions. He also highlights the potential for DTC brands to tap into the B2B market and the unique sales opportunities it presents. In this conversation, Arlen Robinson and Benny Rubin discuss strategies for effective cold email marketing. They emphasize the importance of finding the right audience and creating a warm introduction by mentioning previous clients or affinity groups. They also highlight the critical aspects of email deliverability, such as setting up SPF, DMARC, and DKIM records. Additionally, they advise startup businesses to consider multiple lead generation channels and not over-index on one specific channel. In terms of personal interests, Benny shares that he plays the violin and has a soft spot for the band Megadeth. Key Episode Takeaways: Email marketing is a powerful tool that can enhance the customer journey and improve customer loyalty and conversions. Cold emailing can be an effective strategy for reaching out to potential B2B customers and securing large-scale orders. Email is a reliable and cost-effective channel for communication, making it a valuable asset for businesses. DTC brands should consider exploring the B2B market and leveraging email marketing to tap into new sales opportunities. Email is still widely used and checked regularly by consumers, making it a valuable channel for marketing and communication. Find the right audience for your cold email campaign by targeting individuals in specific affinity groups or mentioning previous clients in the same industry. Ensure good email deliverability by setting up SPF, DMARC, and DKIM records and considering the use of subdomains. Don't over-index on one lead generation channel; consider multiple channels to diversify your sources of leads. Personalize your cold emails by mentioning previous clients or affinity groups to create a warm introduction. In addition to email marketing, explore other lead generation channels such as affiliate programs or text messaging. If you feel Benny and his team at Senders can help you, you may visit: https://www.senders.co For show transcript and past guests, please visit https://www.ecommercemarketingpodcast.com Or on YouTube at: https://www.youtube.com/channel/UC3PgT0NOGzpdPGQtBK0XLIQ Follow Arlen: Twitter: https://twitter.com/askarlen Facebook: https://www.facebook.com/arlen.robinson.7 Instagram: https://www.instagram.com/arlenyohance/ LinkedIn: https://www.linkedin.com/in/arlenrobinson/ Past guests on the ecommerce marketing podcast include Neil Patel, Nemo Chu, Luke Lintz, Luke Carthy, Amber Armstrong, Kris Ruby and many more. Thanks for listening. Be sure to subscribe and leave a review.
Joe discusses the problem with automatically forwarding mail in the era of DMARC and walks through an explanation from Kerio: - You have a hosted Kerio email account, with a domain of clientname.com - You have a forwarding rule configured to forward all email addressed to name@clientname.com to clientaddress@gmail.com - Gmail enforces a DMARC policy - Gmail sees the forwarded email as if they were coming from the original sender, e.g.: Facebook, PayPal, etc. etc. - But the emails are NOT coming from the mailservers of those senders (e.g. mail.facebook.com, mail.paypal.com – fake examples), they are actually coming from the Kerio mail server (mail.itekmail.com) - This triggers a failure of compliance with DMARC, since the sending mail server doesn't match the sending address. - Unfortunately there isn't much we can do about this, other than use the main account (name@clientname.com), setting it up on a mail client of your choice, to avoid this problem. - Joe and Jerry discuss Eero, and Joe explains the challenge of configuring an alternate subnet: - Eero ad automatically assigned 192.168.7.1 subnet - AV guy had static IPs manually assigned to two IR controllers - had to use Advanced settings to hangs subnet to 10.0.0.0 (10.0.1.0 not an option; annoying because that's a common Apple one so this must be a common issue) - tried to adjust starting IP to 10.0.0.1, subnet to 255.255.0.0, and ending IP to 10.0.1.254; didn't work - after updating, allowed me to select 10.0.0.0 range and change it to 10.0.1.0 range, which worked
In today's episode, where we're diving into the essentials of connecting your email sending domains in HubSpot! We'll walk you through the process step by step, starting from the HubSpot homepage and navigating straight to the email sending domains settings.We'll talk about why verifying your domain is a must (hint: it keeps your emails out of spam folders) and how to add the necessary DNS records for verification. Plus, we'll cover the ins and outs of setting up DKIM, SPF, and DMARC records—no tech degree required.By the end of this episode, you'll be equipped with everything you need to have an authenticated email sending domain in HubSpot, making your emails more reliable and effective. Tune in and let's get your emails landing where they should—right in your audience's inboxes!
Nikita Vakhrushev has spent the last 7 years immersed in the digital marketing world. After starting his own ecom brand and quickly pivoting into the agency model, he found his place in ecommerce advertising services. After amassing all the marketing skills needed to scale brands, he found great success in email and SMS marketing, which is what he specializes in today! Now after working with over 100+ DTC brands, having the knowledge behind all marketing channels, but sticking with email as his bread and butter, Nikita has a unique perspective on how to get the most out of a brand's retention channels.In This Conversation We Discuss: [00:41] Intro[01:12] Transitioning from retail to agency building[02:49] Transforming solutions into paid expertise[03:27] Learning vs paying to get things done[04:26] Implementing DKIM & DMARC for email security[06:01] Maintaining deliverability with record updates[06:51] Steep learning curves in email configuration[08:04] Navigating DNS zone editor for email verification[09:47] Understanding dynamic and static domain settings[10:51] Navigating edge cases in complex DNS setups[11:46] Creating DMARC records for Shopify and Klaviyo[13:15] Adding DMARC & DKIM to improve email reach[15:07] Suppressing email addresses for better deliverability[17:54] Remove unengaged emails for domain reputation[19:11] Implementing effective list cleaning strategies[20:10] Focusing on email & SMS services across platforms[21:30] Signs you need to seek email marketing help[22:43] ASPEKT: Free audit for your email strategy[23:42] Keep track of your email open rates consistentlyResources:Subscribe to Honest Ecommerce on YoutubeEmail marketing agency for Ecom and DTC brands aspektagency.com/Secure your domain dmarcian.com/ Follow Nikita Vakhrushev linkedin.com/in/nikita-v/If you're enjoying the show, we'd love it if you left Honest Ecommerce a review on Apple Podcasts. It makes a huge impact on the success of the podcast, and we love reading every one of your reviews!
In this episode of Email After Hours, we're officially demystifying the DMARC record. DMARC is critical for brands looking to protect their domains from spoofing and phishing attacks. Plus, it's now required by major mailbox providers like Gmail and Yahoo.
Imagine spending countless hours crafting the perfect email campaign, only to have it land in your subscribers' spam folders. It's a marketer's worst nightmare, and it's about to become a reality for those who don't take action. In this episode, Big Jason Henderson, the director of deliverability for Digital Marketer, shares crucial insights on the upcoming changes in email deliverability that will take effect in February 2024.Big Jason emphasizes the importance of authenticating all your email sources, including your ESP, membership site, shopping cart, and help desk. Failing to do so could result in your emails being blacklisted or sent straight to the spam folder. He also shares three free services that can help you monitor your DMARC reports and identify any unauthorized email senders using your domain.Don't let these email deliverability changes catch you off guard. Tune in to this episode to learn how to keep your emails landing in your subscribers' inboxes and avoid the dreaded spam folder.Key Takeaways:00:38 What's changing in email deliverability01:50 Why email providers are getting serious about spam02:38 Examples of DNS authentication and common mistakes05:06 SPF and DKIM Explained07:45 Consequences of not meeting the new email deliverability requirements09:43 Practical Steps for Authentication12:15 How to authenticate your DNS records step-by-step15:55 Why you need to authenticate every platform separately18:44 The new complaint rate ceiling and how to stay compliant20:04 Understanding Google Postmaster Tools and IP reputation21:20 Managing email lists and engagement23:39 Cleaning your email list25:29 Finding the sweet spot for engagement28:37 Where to find help for email compliance29:39 Handling hard and soft bounces32:54 Recap and final tipsConnect with Big Jason Henderson Linkedin - https://www.linkedin.com/in/bigjason/ Website - https://emailinboxwarrior.com/ Be sure to subscribe to the podcast at: https://www.digitalmarketer.com/podcast/Facebook: https://www.facebook.com/digitalmarketerInstagram: https://www.instagram.com/digitalmarketer/LinkedIn: https://www.linkedin.com/company/digital-marketer/This Month's Sponsors:Conversion Fanatics - Conversion Rate Optimization AgencyGet 50% Off Monthly Blog Writing Service - BKA Content More Resources from Scalable[Free Guide & Assessment] 7 Levels of ScaleFREE EPIC Challenge More Shows You'll LovePerpetual Traffic - The #1 podcast for learning paid traffic and improving your conversions!Business...
If you hate email as much as most entreprenuers do, this episode is for you. Email marketing is a must for any small buiness. But connecting with customers in their inbox can be challenging, and time consuming. Liz Wilcox says it doesn't have to be! Join Jim on this deep dive with Liz on the subject everyone loves to hate: Email Marketing? What does it mean, how do you use it to your advantage, and where do you begin? You'll learn how to write a good subject line, and how that is NOT the most important thing to get people to open your email. Discover the different types of email, when to send them, and what they should say. You'll hear some recommended email management platforms, and learn how to determine which one might be best for you. Liz also explains Automations, and how to best use them, or not. You'll understand what DMARC, DKIM and SPF authentications are, and why they're important. Finally, Liz shares her experience on the TV show survivor, and some survival tips that translate to your business and marketing efforts. GUEST BIO The Fresh Princess of Email Marketing, Liz Wilcox is an Email Strategist and Keynote Speaker showing small businesses how to build online relationships, package up their “magic” and turn it into emails that people want to read and, most importantly, purchase from. Connect with Liz: https://lizwilcox.com/ https://www.facebook.com/groups/emailmarketingwithliz https://www.instagram.com/thelizwilcox/ RESOURCES MENTIONED Mailchimp: https://mailchimp.com/ ConvertKit: https://convertkit.com/ ActiveCampaign: https://www.activecampaign.com/ Grit, by Angela Duckworth https://amzn.to/49fBiCc RVE Community Group https://www.facebook.com/groups/therventrepreneurcommunity/posts/460410370968196/ RVE Podcast Episode #164 https://podcasters.spotify.com/pod/show/rve/episodes/RVE-164-How-to-Stand-Out-and-Get-Noticed-with-Ed-and-Liz-Wilcox-ea378t The Virtual Campground https://thevirtualcampground.com/ ~~~~~~~~~~~~~~~~~~~~~THE RV ENTREPRENEURhttps://therventrepreneur.com~~~~~~~~~~~~~~~~~~~~~ Join the RVE community on Facebook!https://www.facebook.com/groups/therventrepreneurcommunity Connect with RVE on all your favorite socialshttps://therventrepreneur.com/connect Got questions or comments for our hosts? Leave us a voice message! https://therventrepreneur.com/voicemail (NOTE: Audio submitted may be published on the podcast unless specifically requested otherwise.) Got a great story or tips to share with RVE Listeners? Complete our Guest Intake Form:https://therventrepreneur.com/guestform ~~~~~~~~~~~~~~~~~~~~~The RV Entrepreneur is presented by RV Life – Tools that Make Camping Simplehttps://rvlife.com You May Also Like: The RV Life Podcasthttps://podcast.rvlife.com/~~~~~~~~~~~~~~~~~~~~~ --- Send in a voice message: https://podcasters.spotify.com/pod/show/rve/message
Wes and Scott explore the web standards and email authentication methods that keep your email from going to spam; DMARC, SPF and DKIM. If you send email via a custom domain name, you need to listen to this! Show Notes 00:00 Welcome to Syntax! 01:06 Brought to you by Sentry.io. 02:08 What exactly are SPF, DKIM, and DMARC? 02:53 Different ways that you may want to send email. 03:23 Transactional emails. Resend, email for developers 05:07 Email marketing. 05:47 Anything else that sends email on your behalf. 07:13 SPF (Sender Policy Framework). Postmark defines SPF Postmark SPF in 5 Minutes 08:34 You can only have one SPF record. 10:18 DKIM (DomainKeys Identified Mail). Postmark defines DKIM 13:39 DMARC (Domain-based Message Authentication, Reporting, and Conformance). Convertkit 16:38 RUA Reporting. 18:03 How to set up reporting. 21:08 Does emails marked as spam hurt the IP that sends them? 22:18 Other things to consider. Special thanks to David Flanagan for the help on this! @rawkode Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott:X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads