How email marketers can help end phishing


You probably know what phishing is–an attempt to impersonate a legitimate website in order to trick you into revealing account information through an email that asks you to log into your account. The post How email marketers can help end phishing appeared first on Biznology.

Data Security: Spotting a scam before disaster


Show everyone phishing emails look like, and to avoid opening suspicious emails. Run some mock phishing attacks of your own against your employees to see how well they are equipped to respond, and test the management team to see how well they’re enforcing the policies.

Spot 127

Stop putting account links in your emails


For years, we’ve been giving people advice to avoid clicking on links in phishing emails. So, why do we persist in telling people to avoid clicking on phishing emails? Internet Marketing Identity theft Login phish

Link 127

Watch out for this new I-9 scam

Content Standard

In this week's e-newsletter IT Security email email scam I-9 forms phishingWatch out for emails from U.S. Citizenship and Immigration Services (USCIS) asking about employees’ I-9 forms – they’re most likely a scam. A new email scam has been using a fake USCIS email address ( ) to request employee info, although the USCIS never requires copies of I-9 forms to be sent via email.

Spring Into Compliance – The Canadian Anti-Spam Law (CASL) is Around the Corner

Marketing Action

The bill intends to promote ecommerce by deterring spam, identity theft, phishing, spyware, viruses, botnets and misleading representations online. Are you sending marketing emails to prospects in Canada? You may need to alter your messaging in the next few months.

Spam 79

As Malware Affects Email Marketing Trends, Brands Have a Chance to Re-Envision Their Email ROI

Content Standard

Security threats, data breaches, and other sophisticated phishing and malware attacks have been making headlines on a near-constant basis for much of the past calendar year. Even before this latest wave of phishing scams, email click-through rates were in decline.

DMARC – What Is It and How Does It Affect My Email Marketing?

Marketing Action

This will help you track down anyone phishing your domain. DMARC will help protect the mail recipients as well as the email senders from being victims of phishing or spoofed email attacks. Senders are largely unaware what level of risk they have of being phished or spoofed.

3 B2B Video Examples to Inspire Your Next Marketing Masterpiece


Paychex uses this strategy well with their video on “what is phishing?” Brainstorming an amazing video story for a B2B brand can feel discouraging, especially if you’re intimidated by polished looking videos from other brands.

The 23 Best Free Google Chrome Extensions for Digital Marketers


Stops phishing attacks, shows user reviews, and warns you when you’re visiting websites with bad reputations. To enhance and automate marketing functions, businesses need to invest in online tools, integration, and training. No question.

Google 223

Free Internet and Your Content Marketing Strategy: What Could Go Wrong?

Content Standard

Strom noted that “everything and everyone can be exploited, phished, compromised, or subverted.” Europe has bold plans to lead the rest of us into the future. Last month, the European Commission announced plans to make public spaces Wi-Fi enabled across the continent.

How Twitter Bots Taught Me about Competitive Intelligence

Content Standard

In practice, I think it’s more likely due to a piece of wisdom I heard from our IT director once: “The day a grammarian gets angry and writes a phishing email, we’re all screwed.” The internet is an amazing place.

How to Design Emails to Reach the Inbox

Modern B2B Marketing

Phishing URL. by Dayna Rothman When you send out an email blast you hope and pray that it reaches your intended recipients.

SocialOomph offers essential Twitter tools


I can block them if they’re phishing on keywords and #hashtags that have nothing to do with what or who they are. I was going to write about several tools but I think I will break it down. This week, let’s look at what SocialOomph offers through its Pro account.

6 Types of Transactional Emails That Every Email Marketer Should Know

Modern B2B Marketing

Moreover, with the prevalence of phishing activities, adding a link or email where they can report unauthorized password requests strengthens your credibility.

Email 79

10 Reasons I Won’t Follow You on Twitter


This often leads to malware or phishing scams, and never to anything good. Before I start this rant, let me make it clear that I love gaining new followers on Twitter and I’m honored by (almost) every one—I’m grateful that you want to hear what I have to say!

American Privacy 2011 – Empowering the Consumer

Modern B2B Marketing

Anti-abuse groups are working fast to stop sophisticated and well financed cyber-gangs that are harvesting consumer data to arm their phishing attacks. by Josh Aberant Online privacy is changing in the US. Yes, it’s finally happening.

Spam Filter Basics: How to Keep Your Emails from Getting Blocked

Marketing Action

There are many methods for email authentication that a spam filter looks for in order to protect users from phishing scams – the kind of fake emails that could cost email recipients a lot of money and grief. It’s the holiday season, which means marketers are really busy.

Spam 56

You're Pregnant! Just Kidding. Here's the News You Missed This Week.


There were some fears that the emails were a result of phishing attempts, but in the end, Amazon confirmed to TechCrunch that the emails were the result of a technical glitch, going on to send apology emails to the customers that received them.

40+ B2B Marketing Statistics and Benchmarks to Inspire Performance Throughout 2015

KoMarketing Associates

Adware grew 136% to +400K apps on mobile devices, between 2013 and the first three quarters of 2014, giving attackers access to personal information like contacts, which can be used to launch phishing attacks.

10 Best Practices for Using Links in Emails

Modern B2B Marketing

This may look like phishing. Institutions are dedicating time and dollar resources to educate consumers about what a phishing email may look like. Avoid doing this in your emails, as recipients may perceive them as phishing emails and mark them as spam. I recently received a question from a Marketo customer about best use of links in emails. Essentially, the customer wanted to know how and when to put links in an email communication to a prospect.

Security Breaches in Healthcare: How To Protect Patient Data


Jay: A common one is clicking links in phishing emails. Just days ago one of the country’s largest healthcare systems announced it had become the victim of a cyber attack from China. Personal data, including social security numbers, from millions of patients was accessed as part of the attack.

31 Wicked Cool Benefits of Marketing Automation

Marketing Action

Without Marketing Automation, most email campaigns would have the same clickthrough rates as Nigerian phishing scams. Hallowmas. All Souls’ Day. All Hollows Day. All Saints’ Day. All Hallows Eve. Samhain. Hallowe’en.

38+ Cool Social Media and Web Tools and Reviews


Hotspot Shield also protects users from over 3 million malware threats, phishing sites, and spam. Innovation is alive and well in the development of cool free and low-cost web-based tools and apps.

Review 184

What to Do if Your Search Rankings Were Hurt by Google's Penguin Update


Don't create pages with malicious behavior, such as phishing or installing viruses, trojans, or other badware. Have ya heard? A new animal may be wreaking havoc on your ability to get found in search. But this time, it doesn't take the form of a black and white bear.

How do you sell SaaS software to enterprise businesses?


While startups are small teams where everyone can be trusted with more access, the principle in big organisations is usually to limit everything to the barest minimum each employee needs, so that if credentials get lost or phished (which is a bigger risk in larger organisations, just due to scale), less harm can be done.

Obey Facebook’s Rules of Engagement (Or Else)

Marketing Action

These standards touch upon subjects like violence, bullying, phishing, scamming, and harassment. Do you know what it’s like to have a major Facebook campaign for a major client go completely dark a mere three hours after a giant PR push?

Rules 77

Technologies for Email Deliverability

Modern B2B Marketing

These help to authenticate your messages with ISPs, letting them know your emails come from you and are not phishing or spoofing attempts. As a follow-up to my post about the importance of reputation in email marketing , I interviewed Spencer Kollas, director of delivery services at StrongMail , about the latest technology solutions to manage reputation and optimize deliverability.

What to Do When Your Twitter Account Gets Hacked


5) Beware of email phishing. It can happen to anyone. A stray click on a link, downloading a seemingly harmless file, or logging in to what you thought was a legitimate site you''ve used before can compromise your login information and grant hackers access to your Twitter account.

The 14 Coolest Beer Label Designs You've Ever Seen


Several years ago, the folks at Magic Hat teamed up with printmaker Jim Pollock -- the same Jim Pollock who became famous for creating many of Phish's most memorable concert posters. This post originally appeared on HubSpot's Agency Post.

Why Marketers Must Optimize Emails for HTML AND Plain Text [Infographic]


When HTML emails include click trackers, it's not uncommon for email clients to warn recipients against "potential privacy threats" or a potential "phishing attempt." When you send an email , a lot goes on behind the scenes.