Spam

What is SMTP authentication? SMTP Auth explained

What is SMTP authentication? SMTP Auth explained

  • Technical matters

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP…

What is SMTP authentication? SMTP Auth explained
How to strengthen your website’s malware protection

How to strengthen your website’s malware protection

  • Technical matters

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

How to strengthen your website’s malware protection
How to identify phishing emails

How to identify phishing emails

  • E-mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

How to identify phishing emails
The double opt in process: Introduction and guidelines

The double opt in process: Introduction and guidelines

  • Technical matters

An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. The double opt in process is used in the UK to try to combat spam. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double opt in process.

The double opt in process: Introduction and guidelines
Click rate & opening rate – newsletter KPIs in e-mail marketing

Click rate & opening rate – newsletter KPIs in e-mail marketing

  • E-mail marketing

In e-mail marketing, KPIs (Key Performance Indicators) are extremely important for analysing campaigns. Various indicators can help you to determine the final success rate of your marketing activities. But how exactly can you measure metrics like a newsletter’s conversion rate, opening rate, and click-through rate? And which other KPIs are important?

Click rate & opening rate – newsletter KPIs in e-mail marketing
Personal Data

Personal Data

  • Digital law

What do your e-mail address, eye colour, preferred political party, and license plate have in common? They can all be regarded as personal data which companies and cybercriminals can use to draw direct or indirect conclusions about your physical, physiological, genetic, psychological, economic, cultural, or social identity. It goes without saying that this sensitive information must be protected…

Personal Data
Online Identity Theft

Online Identity Theft

  • Website creation

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just merely screenwriters’ fantasies; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of the…

Online Identity Theft
Outlook spam filter: How to set it up, customise it and check the junk filterRawpixel.comShutterstock

Outlook spam filter: How to set it up, customise it and check the junk filter

  • E-mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: How to set it up, customise it and check the junk filter
What is greylisting? Definition, advantages and disadvantages

What is greylisting? Definition, advantages and disadvantages

  • E-mail security

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

What is greylisting? Definition, advantages and disadvantages
What is pharming and how to protect pharming attacks

What is pharming and how to protect pharming attacks

  • E-mail security

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

What is pharming and how to protect pharming attacks
In order to provide you with the best online experience this website uses cookies. By using our website, you agree to our use of cookies. More Info.
Manage cookies