Are you looking after your email reputation?

Over the past few months I have bumped into many companies that have not been looking after their email domains. So after many an hour helping people fix this I started wondering how many of use are looking after their email domains?

Ask yourself this, are you a responsible email marketer or a spammer? You many think of yourself as the first, but many other people might see you as the second. Did you know you can test this yourself?

Go here and send them an email from your coporate address, did you score less than 7? 5? 3? or even 0? Don’t be surprised if you got any of these scores, in my experience its quite common! Lets explore the common factors and how to fix them.

First all make sure the mail server you’re using is configured correctly? Do you have a DMARC? Is your SPF configured correctly? Is you DKIM Signature valid?

All of these things will affect your score and could be the difference between a 6 and 10 score. If you’re asking yourself what all these things are and where to fix them, have a look at your DNS entries, all of these things are linked back to DNS.

Lets remove the acronyms for you:

  1. DKIM (DomainKeys Identified Mail) is an important authentication mechanism to help protect both email receivers and email senders from forged and phishing email. Forged email is a serious threat to all parties in an email exchange.
  2. An SPF (Sender Policy Framework) record is a type of Domain Name Service (DNS) record that identifies which mail servers are permitted to send email on behalf of your domain. The purpose of an SPF record is to prevent spammers from sending messages with forged From addresses at your domain. Recipients can refer to the SPF record to determine whether a message purporting to be from your domain comes from an authorized mail server.
  3. DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication protocol. It builds on the widely deployed SPF and DKIM protocols, adding a reporting function that allows senders and receivers to improve and monitor protection of the domain from fraudulent email.

Okay that’s the technical bit, the next bit is all about how you’ve been behaving over the past, are you on Blacklists?

In this case you need to contact the blacklist companies and have them remove you, it maybe your domain or it maybe your server. If its the server contact your hosting company to get help!

I hope this has been informative, let us know if you need any help!

Solidblueliquid Technical Team

Re-purposing an Old Machine to Something New… The trendy thing, and why I can’t do it!

In our office sits one of the old iMac G4’s, the first flatscreen with the half circle base. It has a fantastic 800Ghz G4 Processor, not even a 1GB Ram and by all standards a modern Raspberry Pi 3 can run rings around it.

So why won’t I touch it, why won’t I upgrade this machine like I would any other computer out there? Nostalgic reasons? Overly Complicated? I honestly can’t put my finger on it… its just hardware, its no different to the graphics card I replaced at Christmas, but for some reason I *won’t* touch it.

I found myself debating why, i find a list is helpful in organising my ideas and helping me move forward;

  1. Modernise this machine
  2. Install Linux and make it a usable machine
  3. Watch TV on it/Kodi Box?
  4. Use it as a Apple TV

All good ideas, but I couldn’t do it. I think what upsets me about touching it is the fact that it still works! Running Mac OS Panther (the latest OS Apple did for the G4 chips), it boots up, plays music, even plays videos… the hinged stand works so why do it!


3 ways to improve the Security of Your Website

Investing on website security measures should be a compulsory idea to every web master. It takes a lot of time, money and resources to build a website site from scratch until it becomes a well-functioning site that users can navigate through and quench their intended purposes. But as there are nefarious web thieves everywhere, your website could compromised and get wiped out in minute without you noticing. There are some simple but unique ways that can help you to protect your website besides backing up your files regularly. Many people think that after web design is complete, hacking is not possible but with advanced technology, intrusion to your website features can occur.

Always Keep the Trendy Features on Your Platform

A strong website promotes business growth online which is why it should be trendy to overcome the stiff competition from synonym businesses. The platforms and scripts that you have launched in the website should be up to date to ensure that people find it hard to compromise your website security systems. Many of these features that people use, like plugins, are built on open-source software where people of all intentions, bad or good, can access them. When you leave these features for long on your website, hackers can easily generate the security codes of these features and easily intrude your website. Change them regularly and make sure that they are up to date because by doing so, they would not have the time to generate codes for the new features.

Security Plugins Installation Should be Compulsory

There is software that tools that provide 24-hour surveillance of your site to detect and bounce all the hacking threats from hackers. These software tools are readily available, and when you want to address the inherent website weakness, you just need to install and attach them to your website. A good example is Better WP security and Bullet proof security when you are using WordPress. If you use HTML pages, Site Lock could be the best software to install because it protects both website features that content. Improve business with your website by enhancing its security features.

Invest on File Permissions through Codes

This method is too technical, but it is not that hard to understand and implement. You can break down your site into files which would be stored by the web hosting company. Each of these files would be assigned a code with three digits that work to offer permissions or authorisation on who should access the file. For example 756. 7 mean the owner of the site and can edit, delete or make amendments of content. 5 means the person can read and edit but cannot delete or save changes unless permitted by 7 who is the owner of the website. 6 is the read-only user who is just allowed to read but not edit or do anything else to the website. Codes can take different numbers, but they are from 0-7.

Security measures of a website are important to put emphasis on because they are the ones that would enhance smooth running of your business.