{"id":1565,"date":"2018-04-03T10:00:51","date_gmt":"2018-04-03T14:00:51","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=1565"},"modified":"2018-03-21T10:53:48","modified_gmt":"2018-03-21T14:53:48","slug":"how-to-kill-spam-without-using-exchangedefender","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2018\/04\/how-to-kill-spam-without-using-exchangedefender\/","title":{"rendered":"How to kill SPAM without using ExchangeDefender"},"content":{"rendered":"<div id=\"attachment_1566\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/shutterstock_172545959-720x720.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1566\" class=\"wp-image-1566\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/shutterstock_172545959-720x720.jpg\" alt=\"\" width=\"780\" height=\"520\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/shutterstock_172545959-720x720.jpg 720w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/shutterstock_172545959-720x720-300x200.jpg 300w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/a><p id=\"caption-attachment-1566\" class=\"wp-caption-text\">65% of all emails sent are spam, what&#8217;s the solution?<\/p><\/div>\n<p>At ExchangeDefender we kill <strong>SPAM<\/strong> for a living. We spend a ton of time and energy identifying, filtering, and destroying junk mail. If you&#8217;ve ever wondered how you could make your email experience better, even <em>without<\/em> the massive layered<span style=\"color: #3366ff;\"> <a style=\"color: #3366ff;\" href=\"https:\/\/www.exchangedefender.com\/security.php\">security<\/a> <\/span>that ExchangeDefender provides, these are the steps you could take today:<\/p>\n<p><span style=\"color: #3366ff;\">1. <strong>Configure strict SPF\/DKIM DNS records<br \/>\n<\/strong><\/span><br \/>\nSPF and DKIM (DMARC) can help you protect your domain name from being used in SPAM mailbombs. Spammers will often use real email addresses and domains to send forged &#8220;spoofed&#8221; email messages and SPF\/DKIM provide a mechanism for identifying which email server\/platform you use. By setting up an SPF\/DKIM you can tell places that are receiving email from your domain what to do if the message wasn&#8217;t actually sent from you. If your inbox is full of email bounces and non-delivery receipts, someone is using your email address to send junk mail and an SPF\/DKIM record will practically eliminate bouncebacks.<\/p>\n<p><span style=\"color: #3366ff;\"><strong>2. Get rid of generic email aliases<\/strong><\/span><br \/>\nAt ExchangeDefender we manually process SPAM complaints from our customers &#8211; that&#8217;s how we train our system to eliminate messages that otherwise make it through because they are legitimate in every way we can automatically process them. The number one way to get a ton of annoying email that may be on the borderine between legitimate commercial mail and an unsolicited one: generic email aliases. If you get info@, sales@, admin@ or so on, you are painting a giant bullseye on your Inbox and practically begging to be spammed.<\/p>\n<p><span style=\"color: #3366ff;\"><strong>3. Unsubscribe from newsletters<\/strong><\/span><br \/>\nI know, I know, everyone that has your email address supports <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business\">CAN-SPAM<\/a><\/span> , would never send you unsolicited mail, would never sell their client list&#8230; and even if you believe all those lies most of the time, people still get hacked. All the time! As do their ISPs and infrastructure along the way. If you want to reduce the amount of junk mail you deal with, simply reduce the number of places that have your email address. Simple!<\/p>\n<p><span style=\"color: #3366ff;\"><strong>4. Don&#8217;t click on everything in your Inbox<\/strong><\/span><br \/>\nSometimes SPAM gets through. Sometimes dangerous stuff from your friends and colleagues gets forwarded around. Sometimes your antivirus isn&#8217;t up to date. Sometimes the firewall virus protection is misconfigured our expired. Things happen: none are a good excuse for the simplest thing you can do: avoid clicking on anything in messages that look or seem suspicious.<\/p>\n<p><span style=\"color: #3366ff;\"><strong>5. Do not blindly whitelist major ISPs<\/strong><\/span><br \/>\nThe second biggest source of SPAM complaints at ExchangeDefender is actually completely self-inflicted: people whitelist major email providers and wonder why blatant junk mail keeps on &#8220;slipping through&#8221; as whitelisted. Go through your whitelist entries in Outlook, etc and make sure you aren&#8217;t whitelisting Gmail, Outlook, Yahoo, Verizon, AT&amp;T, Hotmail or any of the widely used and abused email domains. Spammers know your email admin doesn&#8217;t want to deal with complaints about messages you&#8217;re getting from these platforms so they treat them more leniently &#8211; so spammers simply abuse them.<\/p>\n<p>It&#8217;s really that <em>simple<\/em> &#8211; following these steps will cut your junk mail pile in half within a day. If you want to reduce it to less than 1%, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.exchangedefender.com\">ExchangeDefender<\/a><\/span> is here for you for less than a buck a month or you can layer it and add more protection if you need it because time is money: but no amount of technology and automation can replace just a little bit of common sense.<\/p>\n<p>Federal Trade Commission<br \/>\n<a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business\">CAN-SPAM Act: A Compliance Guide for Business<\/a><br \/>\nThe official website of the Federal Trade Commission, protecting America\u2019s consumers for over 100 years.<\/p>\n<p style=\"padding-left: 30px;\"><a href=\"http:\/\/www.exchangedefender.com\/partners.php\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1556 size-large\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-1024x215.jpg\" alt=\"\" width=\"1024\" height=\"215\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-1024x215.jpg 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-300x63.jpg 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-768x161.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,4,1,22,48],"tags":[56,54,32,57,50,40],"class_list":["post-1565","post","type-post","status-publish","format-standard","hentry","category-business-continuity","category-exchangedefender","category-uncategorized","category-pro-tips","category-security","tag-antispam","tag-cybersecurity","tag-exchangedefender","tag-howtoguide","tag-it","tag-security"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=1565"}],"version-history":[{"count":7,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1565\/revisions"}],"predecessor-version":[{"id":1573,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1565\/revisions\/1573"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=1565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=1565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=1565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}