Is Your Email Correctly 

Authenticated?

Do you meet email providers new rules for February 2024?

Are your emails going to SPAM or getting rejected?

Want to know if your settings are correctly configured?


We can audit your settings and tell you if you are

compliant and what you need to do if you're not.

So what's it all about and why should I bother

Google, Microsoft and Yahoo are tightening the rules on email deliverability and the engagement of your contacts from February 2024.

So what does this mean for you as a small business sending emails to your list of contacts?

From February 2024, your email service needs to be properly authenticated with DKIM, SPF and DMARC as a minimum.

This is the first step in ensuring your emails will be delivered.

Beyond that, your list engagement will become vital to manage to ensure the ongoing deliverability of emails, but more about that later.

If you want to ensure your emails continue to make it to the inbox, you’ll have to comply when the following best practices for email authentication and spam prevention become mandatory.

You will need to:

  • Authenticate your emails using SPF, DKIM and DMARC.
  • Keep your spam reporting low and maintain a spam complaint rate under 0.3%
  • Make it easy for people to unsubscribe with just one click.
SPF

Sender Policy Framework

This record identifies all the mail servers that are validated to send email from your domain. This includes your domain but should also include CRM systems, membership sites as they also send email on behalf of you.

DKIM

DomainKeys Identified Mail

This is a hidden signature that is encoded into the body of an email. When an email is received, the receiving server will check that the hidden code created and sent in the email, is the same domain as the one on the sender’s DKIM settings.

DMARC

Domain based Message Authentication Reporting & Conformance

DMARC is an email security policy that instructs email receivers to approve, quarantine or reject emails that are not sent from an authenticated source. It bases its decisions on whether SPF and DKIM are aligned or not.

What does that all mean for me?

Explaining the process for non technical people is a specialism of mine so here goes!!

When you send an email from your server, it includes sections of code that are created by your email server. When the email arrives at the receiving server, it then checks these codes against the ones set up on your server (SPF and DKIM). Alongside these checks, you also need to specify what happens to email if it fails either of these checks (DMARC policy).

Sometimes, emails can be changed en-route (think spoofing, phishing etc) and if something does not match up the receiving server will use your DMARC policy to decide what to do (see diagram below).

Depending on what your DMARC policy says, it will deliver the email according to that:

p=none - sends emails to the inbox

p=quarantine - sends email to Spam so you can decide

p=reject - doesn't deliver the email

HOT TIP: When setting up DMARC for the first time, ALWAYS use p=none, until you have checked all your email services.

How will it benefit my business

email authentication

The authentication is the tip of the iceberg!

Keeping your list of contacts engaged and current is also very important, after the authentication is in place. Google, Yahoo and Microsoft are also monitoring contact engagement in deciding whether to deliver emails or not.

Tackling these two parts of email marketing will ensure you get all and more of the benefits listed below.

  • Establishes Professionalism
  • Boosts engagement and relationship building
  • Increases ROI of marketing spend
  • Increases your sender reputation
  • Reduces SPAM complaints
  • Less marketing spend wasted on disengaged contacts

What You'll Get During Your Authentication Audit

Step 1.

We Will Ask You To Tell Us The Systems You Use

As you are no doubt aware, there are hundreds of email systems, CRM systems and membership sites that are capable of sending emails on your behalf. We cannot possibly work with them all.

So the first step in applying for an audit is to check which systems you have and if we work within those systems.

When you apply for your audit, the first step is filling in a form to tell us what systems you are using. You will not pay a penny unless we confirm with you that we can indeed help.

Step 2

To Continue, Pay For Your Audit

Once we confirm with you that we can help, you will then be sent a link to a payment page. The cost of the audit is £49 and will be refunded off any follow-up work that is carried out on your behalf.

Step 3

Receive Your Compliance Report

On completion of the audit, you will receive a report which details your level of compliance for SPF, DKIM and DMARC.

You will receive a list of the set up that is required for each of the 3 checks.

Step 4

Next Steps

If you would like us to carry on and make the necessary changes and make sure that you are fully compliant, we will arrange a video call to gather all the information required and discuss the best options for your business based on your email volumes and systems.

Open chat
How Can I Help
Scan the code
Hello
Please send me your enquiry and I will reply shortly.