How email marketers can help end phishing


You probably know what phishing is–an attempt to impersonate a legitimate website in order to trick you into revealing account information through an email that asks you to log into your account. The post How email marketers can help end phishing appeared first on Biznology.

Data Security: Spotting a scam before disaster


Show everyone phishing emails look like, and to avoid opening suspicious emails. Run some mock phishing attacks of your own against your employees to see how well they are equipped to respond, and test the management team to see how well they’re enforcing the policies.

Spot 41

Spring Into Compliance – The Canadian Anti-Spam Law (CASL) is Around the Corner

Marketing Action

The bill intends to promote ecommerce by deterring spam, identity theft, phishing, spyware, viruses, botnets and misleading representations online. Are you sending marketing emails to prospects in Canada? You may need to alter your messaging in the next few months.

Watch out for this new I-9 scam

Content Standard

In this week's e-newsletter IT Security email email scam I-9 forms phishingWatch out for emails from U.S. Citizenship and Immigration Services (USCIS) asking about employees’ I-9 forms – they’re most likely a scam. A new email scam has been using a fake USCIS email address ( ) to request employee info, although the USCIS never requires copies of I-9 forms to be sent via email.

Stop putting account links in your emails


For years, we’ve been giving people advice to avoid clicking on links in phishing emails. So, why do we persist in telling people to avoid clicking on phishing emails? Internet Marketing Identity theft Login phish


The Act-On Email Deliverability Glossary, Part 2


Phishing. Very similar to phishing. This glossary defines the most common terms that the email marketer should be familiar with, in order to manage the many components of deliverability. We ran Part 1 of the Deliverability Glossary last week; you can catch up with it here. Definition.

Protect Yourself & Your Clients from Identity & Data Theft


These include but are not limited to: Phishing. Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., The SnapChat breach was a phishing incident. Pssst … want to buy 25 million email addresses and passwords?

DMARC – What Is It and How Does It Affect My Email Marketing?

Marketing Action

This will help you track down anyone phishing your domain. DMARC will help protect the mail recipients as well as the email senders from being victims of phishing or spoofed email attacks. Senders are largely unaware what level of risk they have of being phished or spoofed.

The Act-On Email Deliverability Glossary, Part 1


spoofing or phishing.). “Deliverability” is the term used to describe the success rate for delivering email into subscribers’ inboxes.

Why did my e-mail campaign get such a low response?


Phishing attacks often come under the guise of a message from customer service, asking the recipient to log into their account after clicking on a link in the message. Your customers might mistake your e-mail foir a phishing attempt, which is just what happened to my wife.

6 Types of Transactional Emails That Every Email Marketer Should Know

Modern B2B Marketing

Moreover, with the prevalence of phishing activities, adding a link or email where they can report unauthorized password requests strengthens your credibility.

Free Internet and Your Content Marketing Strategy: What Could Go Wrong?

Content Standard

Strom noted that “everything and everyone can be exploited, phished, compromised, or subverted.” Europe has bold plans to lead the rest of us into the future. Last month, the European Commission announced plans to make public spaces Wi-Fi enabled across the continent.

Spam Filter Basics: How to Keep Your Emails from Getting Blocked

Marketing Action

There are many methods for email authentication that a spam filter looks for in order to protect users from phishing scams – the kind of fake emails that could cost email recipients a lot of money and grief. It’s the holiday season, which means marketers are really busy.

Spam 38

How Twitter Bots Taught Me about Competitive Intelligence

Content Standard

In practice, I think it’s more likely due to a piece of wisdom I heard from our IT director once: “The day a grammarian gets angry and writes a phishing email, we’re all screwed.” The internet is an amazing place.

How to Protect Your Email List Health and Deliverability


They’re usually trigger happy to report emails as spam or phishing, so you might want to be especially careful with the emails you send to them. Unhealthy sending practices have a great impact on the performance and deliverability of your email campaign.

40+ B2B Marketing Statistics and Benchmarks to Inspire Performance Throughout 2015

KoMarketing Associates

Adware grew 136% to +400K apps on mobile devices, between 2013 and the first three quarters of 2014, giving attackers access to personal information like contacts, which can be used to launch phishing attacks.

31 Wicked Cool Benefits of Marketing Automation

Marketing Action

Without Marketing Automation, most email campaigns would have the same clickthrough rates as Nigerian phishing scams. Hallowmas. All Souls’ Day. All Hollows Day. All Saints’ Day. All Hallows Eve. Samhain. Hallowe’en.

How to Design Emails to Reach the Inbox

Modern B2B Marketing

Phishing URL. by Dayna Rothman When you send out an email blast you hope and pray that it reaches your intended recipients.

Security Breaches in Healthcare: How To Protect Patient Data


Jay: A common one is clicking links in phishing emails. Just days ago one of the country’s largest healthcare systems announced it had become the victim of a cyber attack from China. Personal data, including social security numbers, from millions of patients was accessed as part of the attack.

38+ Cool Social Media and Web Tools and Reviews


Hotspot Shield also protects users from over 3 million malware threats, phishing sites, and spam. Innovation is alive and well in the development of cool free and low-cost web-based tools and apps.

Review 113

The 23 Best Free Google Chrome Extensions for Digital Marketers


Stops phishing attacks, shows user reviews, and warns you when you’re visiting websites with bad reputations. To enhance and automate marketing functions, businesses need to invest in online tools, integration, and training. No question.

SocialOomph offers essential Twitter tools


I can block them if they’re phishing on keywords and #hashtags that have nothing to do with what or who they are. I was going to write about several tools but I think I will break it down. This week, let’s look at what SocialOomph offers through its Pro account.

How marketers help phishers succeed


Phishing is a real danger. I can only imagine that they just aren’t thinking about phishing attacks. But as long as companies continue to send out legitimate emails that look exactly the same as phishing attempts, people are going to be understandably confused.

The 14 Coolest Beer Label Designs You've Ever Seen


Several years ago, the folks at Magic Hat teamed up with printmaker Jim Pollock -- the same Jim Pollock who became famous for creating many of Phish's most memorable concert posters. This post originally appeared on HubSpot's Agency Post.

How do you sell SaaS software to enterprise businesses?


While startups are small teams where everyone can be trusted with more access, the principle in big organisations is usually to limit everything to the barest minimum each employee needs, so that if credentials get lost or phished (which is a bigger risk in larger organisations, just due to scale), less harm can be done.

What to Do When Your Twitter Account Gets Hacked


5) Beware of email phishing. It can happen to anyone. A stray click on a link, downloading a seemingly harmless file, or logging in to what you thought was a legitimate site you''ve used before can compromise your login information and grant hackers access to your Twitter account.

Obey Facebook’s Rules of Engagement (Or Else)

Marketing Action

These standards touch upon subjects like violence, bullying, phishing, scamming, and harassment. Do you know what it’s like to have a major Facebook campaign for a major client go completely dark a mere three hours after a giant PR push?

Rules 32

What to Do if Your Search Rankings Were Hurt by Google's Penguin Update


Don't create pages with malicious behavior, such as phishing or installing viruses, trojans, or other badware. Have ya heard? A new animal may be wreaking havoc on your ability to get found in search. But this time, it doesn't take the form of a black and white bear.

You're Pregnant! Just Kidding. Here's the News You Missed This Week.


There were some fears that the emails were a result of phishing attempts, but in the end, Amazon confirmed to TechCrunch that the emails were the result of a technical glitch, going on to send apology emails to the customers that received them.

10 Reasons I Won’t Follow You on Twitter


This often leads to malware or phishing scams, and never to anything good. Before I start this rant, let me make it clear that I love gaining new followers on Twitter and I’m honored by (almost) every one—I’m grateful that you want to hear what I have to say!

Why Marketers Must Optimize Emails for HTML AND Plain Text [Infographic]


When HTML emails include click trackers, it's not uncommon for email clients to warn recipients against "potential privacy threats" or a potential "phishing attempt." When you send an email , a lot goes on behind the scenes.

American Privacy 2011 – Empowering the Consumer

Modern B2B Marketing

Anti-abuse groups are working fast to stop sophisticated and well financed cyber-gangs that are harvesting consumer data to arm their phishing attacks. by Josh Aberant Online privacy is changing in the US. Yes, it’s finally happening.

Technologies for Email Deliverability

Modern B2B Marketing

These help to authenticate your messages with ISPs, letting them know your emails come from you and are not phishing or spoofing attempts. As a follow-up to my post about the importance of reputation in email marketing , I interviewed Spencer Kollas, director of delivery services at StrongMail , about the latest technology solutions to manage reputation and optimize deliverability.

10 Best Practices for Using Links in Emails

Modern B2B Marketing

This may look like phishing. Institutions are dedicating time and dollar resources to educate consumers about what a phishing email may look like. Avoid doing this in your emails, as recipients may perceive them as phishing emails and mark them as spam. I recently received a question from a Marketo customer about best use of links in emails. Essentially, the customer wanted to know how and when to put links in an email communication to a prospect.

Google’s New Gmail Security Feature


During a study, it was found that 94 % of messages sent to a Gmail address can be authenticated, making it harder for phishing attempts to be successful. Privacy is the term of the century.