Best practices
-
Email Essentials Course
We recommend completing this activity in full screen mode with Google Chrome or Mozilla Firefox. Press the play button and then select the full-screen icon in the lower right corner to go full screen. If you have further questions regarding th...
-
Email Essentials: Series (video)
Learn the fundamentals of email through this video series that presents the following topics: Delivered vs. Inbox Placement Rate Sender Reputation List Hygiene Subscriber Engagement
-
Email Authentication Course
We recommend completing this activity in full screen mode and from Google Chrome or Mozilla Firefox. Press the play button and then select the full-screen icon in the lower right corner to go full screen. If you have further questions regardin...
-
What are best practices?
Best practices refers to commercial or professional procedures that are accepted or prescribed as being correct or most effective. Use in email marketingHow you follow best practices affects the subscriber experience and how they interact with you...
-
Sending Best Practices (PDF)
Top factors that impact sending reputation and deliverability Complaints: Ensure all IP addresses and domains are signed up with all available complaint feedback loops. Suppress complainers from your email list. Unknown Users: Suppress unknown us...
-
Ask the Experts Webinar Series 2020
Past webinars Date Webinar Speaker Link 08/20/2020 The Power of an Amazing Welcome Email Pilar Bower, Sr. Customer Success Manager and Tori Garcia, Email Strategist at Validity Video Recording 05/07/2020 Bounce Codes: All you ...
-
Best practices when sending email to an international audience
The world is getting smaller and sending to international subscribers is becoming an important part of many organizations’ email program. No matter where your country of origin is as a marketer, it’s important to do some research about the country...
-
Best practices for improving sender reputation
Sender reputation is the way mailbox providers measure the trustworthiness of a sender’s email. It is based on a variety of metrics, including spam complaint rate, unknown user rate, volume, spam trap hits, and blocklistings. Achieving and maintai...
-
Best practices for effective list acquisition
Your email program’s success depends on continually increasing your return on investment (ROI). One of the obvious ways to achieve this is by expanding your subscriber list. And as you might know, there are good and bad ways to do this, and good r...
-
Best practices for list hygiene
Good list hygiene practices are recommended for all B2C and B2B senders and is an important factor that impacts your sending reputation and ability to reach the inbox. The following Validity products can help you assess list quality, clean your da...
-
Best practices for avoiding spam traps
Spam traps are used by mailbox providers to ensure senders are following email best practice guidelines. Mailbox providers use spam traps to help determine your sending reputation, so keeping spam traps to a minimum is important for the overall he...
-
Best practices for avoiding high unknown user rates
Maintaining an accurate subscriber database is the foundation of email best practices. Unknown users are invalid addresses in your database. The unknown user rate is calculated by dividing the number of email addresses associated with unknown user...
-
Best practices for changing your sending credentials
Changing sending credentials can be a challenge, but there are situations that call for it and best practices for doing it right. You may need to change sending credentials if: You are changing your brand You want to improve your subscribers' exp...
-
Best practices for image-to-text ratio in HTML email
While Image-to-text ratio is important, there is not an exact formula that works effectively under all circumstances. However, there are some rules of thumb that are considered best practices. SpamAssassin recommends a minimum of 60% text and a m...
-
Best practices for increasing sending volume
Increasing volume in your email program usually involves: A temporary increase for a special event or a holiday. A permanent increase to reflect a new email stream, additional frequency, new email address acquisition sources or a company merger....
-
Best practices for sending transactional email
Sending transactional email is a great way to establish and maintain communication with your customers. However, sometimes transactional email is filtered into the spam folder or blocked by a mailbox provider. It is frustrating when this happens s...
-
Best practices for sending frequency and cadence
Frequency and cadence are two important elements to keep in mind when you are creating a sending strategy. Frequency refers to how often you email your subscribers, and cadence is the rhythm or pattern of those emails. There are subtleties to defi...
-
Best practices for volume consistency
If your sending volume is inconsistent, or erratic, you will probably encounter delivery issues. Anytime your volume increases dramatically, you can look like a spammer, and mailbox providers will treat your email as such. Keep the following sugg...
-
Website security basics
A website is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server. If your website is not secure, there is a risk of others stealing your customer...
-
Security Best Practices
What is a secure database?A secure database prevents others from tampering with your recipients’ email addresses and related personal information. How do I secure sensitive data stored and passed over the internet and network?To secure sensitive ...
-
Network infrastructure security basics
Network infrastructure refers to resources that enable network connectivity, communication, operation, and management. Typically, it includes networking hardware, software, and services. If your network is not secure, it presents a significant vul...
-
Database security basics
A database can include different types of data, database applications, database systems, database servers, and the associated network links. Database security protects your subscribers’ email addresses and related personal information. Database se...
-
Mail server security basics
A mail server is a computer within your network that is responsible for sending, delivering, and storing electronic mail messages. If your mail server is not secure, malicious actors can gain unauthorized access to exploit it by sending different ...