Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address. [...] ►
An inbox full of spam is enough to grind anyone’s gears. Too many marketers try to worm their way into the inboxes of potential customers without seeking permission. This is technically allowed in the US, but only until the recipient explicitly opts out. To ensure you don’t drive any customers away or ruin your company’s reputation by sending undesired newsletters, you should look into the double opt in process. [...] ►
Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own reputations, businesses operating online should be fully aware of the importance of electronic signatures. Find out more about how they function here. [...] ►
In e-mail marketing, KPIs (Key Performance Indicators) are extremely important for analyzing campaigns. Various indicators can help you to determine the final success rate of your marketing activities. But how exactly can you measure metrics like a newsletter’s conversion rate, opening rate, and click-through rate? And which other KPIs are important? [...] ►
Analytics tools are widely used to collect statistics on website usage: with Google Analytics, Piwik, and other software, the users’ surfing behavior can be more easily understood. What’s less known is that newsletter tracking in e-mail marketing does a similar job regarding e-mail dispatch. This allows you to determine, for example, whether recipients have opened your newsletter and clicked on its links. This and other information will help you optimize your own newsletters. [...] ►
Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce three tools to help you check whether your e-mail has been hacked. [...] ►
Traditional e-mail is still a big part of online communication for private and for business use, with many users typically opting for Outlook as their e-mail client. For PC users, Microsoft is practically an essential, but many private users and small businesses often look for alternatives. Luckily, there is a great number of free e-mail programs available for anyone put off by Outlook’s licensing costs. [...] ►
Office 365 is more than just the successor of Microsoft Office 2013. The Office 365 plans and subscription that you choose should be carefully thought-out; for an overview, read the first part of our Office series. This second part examines the SME plans: Office 365 Business, Office 365 Business Essentials, and Office 365 Business Premium, to help small and medium-sized enterprises decide on the perfect option. [...] ►
Microsoft offers the popular cloud-based Office suite as a subscription. In addition to popular applications such as Word, Excel, PowerPoint, Publisher, Outlook, and Access, Office 365 also includes online services, such as OneDrive cloud storage and SharePoint’s content management system. We provide you with an overview of the software’s main user plans for private users and business customers, which features they offer, and at what cost. [...] ►
Office 365 is Microsoft’s way of offering its beloved productivity software in the cloud. Users can benefit from numerous functions that enable central data storage and collaborative editing of documents, presentations, spreadsheets, and more. When it comes to buying Office 365, you’ll need a subscription – instead of a one-off payment like the traditional desktop installation of Office, Office 365 comes at a monthly or even yearly price. But for this subscription, Microsoft promises lots of exclusive functions and a variety of plans. So is this purchasing model good value for customers? [...] ►
1&1 E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the 1&1 Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In 1&1’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.