Cold email

Last updated

A cold email is an unsolicited e-mail that is sent to a receiver without prior contact. It could also be defined as the email equivalent of cold calling. Cold emailing is a subset of email marketing and differs from transactional and warm emailing.

Contents

Cold email is a personalized, one-to-one message targeted at a specific individual. Its aim is to get into a business conversation with that individual, rather than to promote a product or a service to the masses. Cold email, according to its proponents, is not spam. Cold emailing is distinct from spam in that it aims to initiate a genuine conversation rather than deceive the recipient. However, if certain steps are not followed, it may be treated as spam by spam filters or reported by the recipients.

Email deliverability

Email deliverability is the percentage of emails that got successfully delivered to the primary inbox, instead of getting blocked or classified as spam.

Email deliverability is not the same as email delivery. Email delivery is the percentage of emails that got successfully delivered to the recipient's email address, regardless of whether it is the main inbox or any other folder, including spam.

Email deliverability is especially important for cold email senders because their goal is to have their email delivered to the recipients' main inbox.

Factors decreasing email deliverability

Low email deliverability may result from:

Bad domain reputation

Domain reputation of the sender is a key factor. [1] The specific domain name may lose its reputation if the emails are being sent in large quantities at once and with too high a frequency. The recipient's email server may consider such behavior as spamming and blocklist the domain used for sending emails.

A domain may also be blocklisted if spam filters detect spam words in the subject line, within the email content, or when other spamming techniques are used.

A domain's age is an important factor in determining a domain's reputation. A new domain has a neutral reputation by default. However, its activity is closely monitored by spam filters. If the email providers detect suspicious use of a domain, for example, sending a big number of emails in a short period of time, any such activity will be flagged and the domain may lose its reputation. To use a domain for cold email outreach, it is recommended to warm it up first.

Bad server IP reputation

Each email sender is assigned an IP address, and this IP address' reputation can be assessed. If an IP address is associated with spam activities, its reputation gets harmed.

An IP address may be shared or dedicated. The reputation of a shared IP address depends on all the users who are assigned to it. If one of the users sends emails marked as spam by spam filters or email recipients, the shared IP address's reputation is harmed. The reputation of a dedicated IP address depends solely on the specific user to whom it is assigned.

A new IP address has a neutral reputation and needs to be warmed up first in order to build up a good reputation.

Emails sent by the IP address that has a bad reputation would be classified as spam. Ultimately, the IP address associated with spam activity may be blocked by the Internet Service Provider.

How to warm-up servers IPs

It is easier to establish a good reputation as a new sender if you warm up your domains. IP warm-up age is the main factor to make a good reputation for your server. You can set a limit on your server to:

  • 1 day limit - 20 email/day
  • 2 day limit - 30 email/day
  • 3 day limit - 45 email/day
  • 45 email/day after the initial 3 days.

Bad email address reputation

An email address can be appointed with a bad or good reputation based on its sending history. If the emails are treated as spam by spam filters or reported by the recipients, the email address loses its reputation and further emails are placed into the spam folder or are entirely blocked by the Internet Service Provider.

Email address, similarly to a domain or IP address, requires a warm-up process before it can be used for sending cold email campaigns.

No SPF and DKIM records set up on a domain's DNS server

Both SPF and DKIM records protect the domain from email spoofing and phishing attacks.

SPF record authenticates the email message sent from an authorized domain's DNS server on which the SPF is set up.

DKIM record affixes a digital signature linked to a domain name to each outgoing email. It ensures that the message was sent from an authorized domain's DNS server.

Setting up both DKIM and SPF on a domain's DNS server positively influences domain reputation.

Exceeding the email provider’s sending limits

Each email provider has its own email sending limits that can be found on their websites. The limits may be daily, hourly, or sometimes even per minute. Exceeding the limits may result in blocking the email account for a time period determined by an email host.

Problems with email content

Sending volume and frequency

Sending volume is connected with the email provider's sending limit. The email provider determines the number of emails that can be sent per minute or hour. If too many emails are sent in a given period of time the email provider may block the sending process.

Also, if the number of emails sent increases significantly over a certain amount of time, it may be a sign for spam filters that the emails are not sent manually. Any non-human behavior alarms the spam filters, which results in the emails being placed in a spam folder.

High hard bounce rate

Sending emails to a big number of invalid or non-existent email addresses results in a high hard bounce rate, which in turn alarms the mailbox providers who may block the sender.

High soft bounce rate

Soft bounces take place when an email is turned back before reaching the recipient's server, hence, it is not delivered to their mailbox. The reason for a soft bounce is often a temporary technical issue with the recipient's mailbox, such as a server's failure or a full inbox.

Good Open rate for Cold Email

If a cold outreach campaign has a 50% open rate, it is considered successful. The stats can't be tampered with, and anything below 50% suggests the campaigns need to be modified. [3]

Rules and regulations

Below are the summaries of some example data protection legislation and laws restricting the use of unsolicited emails. A complete list of internal rules and regulations around the world can be found here.

GDPR

The General Data Protection Regulation aims primarily to give the European Union citizens control over their personal data and to simplify the regulatory environment for international business. [4]

All the individuals who send cold emails to the citizens of the EU are required to comply with the GDPR because they collect and process personal data, in this context, an email address connected to an identifiable individual at minimum.

In order to respect the GDPR while sending cold emails, an individual should abide by the specific principles:

CCPA

The California Consumer Privacy Act regulates the ways personal information of California Citizens is used by businesses that get their revenue from selling consumer's personal data. CCPA focuses on data collection and privacy and gives California Citizens: [5]

CAN-SPAM Act

Source: [6]

The CAN-SPAM Act set first national standards for sending commercial emails in the USA. According to the CAN-SPAM Act: [7]

Canada's Anti-Spam Legislation (CASL)

The CASL gives the citizens of Canada the right to: [8]

Australian Spam Act

The Spam Act regulates in what cases commercial emails, including cold emails, can be sent and what must be included in the content. It states that commercial emails: [9]

New Zealand – Unsolicited Electronic Messages Act

The Unsolicited Electronic Messages Act regulates sending unsolicited commercial emails, including cold emails, with a New Zealand link, that is, emails that are sent to, from, or within New Zealand. According to the Act: [10]

Local personal data protection regulations and laws restricting the use of unsolicited emails may be subject to change. Cold email senders must keep up to date with the amendments to such regulations in order to always act in compliance with the law.

Cold email trends and best practices change with time. Many factors depend on the type of business and target recipients of the emails.

Related Research Articles

<span class="mw-page-title-main">Email</span> Mail sent using electronic means

Electronic mail is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail. Email is a ubiquitous and very widely used communication medium; in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries.

Various anti-spam techniques are used to prevent email spam.

<span class="mw-page-title-main">Mobile phone spam</span> Unwanted communication through a mobile phone

Mobile phone spam is a form of spam, directed at the text messaging or other communications services of mobile phones or smartphones. As the popularity of mobile phones surged in the early 2000s, frequent users of text messaging began to see an increase in the number of unsolicited commercial advertisements being sent to their telephones through text messaging. This can be particularly annoying for the recipient because, unlike in email, some recipients may be charged a fee for every message received, including spam. Mobile phone spam is generally less pervasive than email spam, where in 2010 around 90% of email is spam. The amount of mobile spam varies widely from region to region. In North America, mobile spam steadily increased after 2008 and accounted for half of all mobile phone traffic by 2019. In parts of Asia up to 30% of messages were spam in 2012.

<span class="mw-page-title-main">Email spam</span> Unsolicited electronic advertising by email

Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.

Sender Policy Framework (SPF) is an email authentication method which ensures the sending mail server is authorized to originate mail from the email sender's domain. This authentication only applies to the email sender listed in the "envelope from" field during the initial SMTP connection. If the email is bounced, a message is sent to this address, and for downstream transmission it typically appears in the "Return-Path" header. To authenticate the email address which is actually visible to recipients on the "From:" line, other technologies such as DMARC must be used. Forgery of this address is known as email spoofing, and is often used in phishing and email spam.

A Joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data. Early Joe jobs aimed at tarnishing the reputation of the apparent sender or inducing the recipients to take action against them, but they are now typically used by commercial spammers to conceal the true origin of their messages and to trick recipients into opening emails apparently coming from a trusted source.

Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again after a delay, and if sufficient time has elapsed, the email will be accepted.

A bounce message or just "bounce" is an automated message from an email system, informing the sender of a previous message that the message has not been delivered. The original message is said to have "bounced".

Email marketing is the act of sending a commercial message, typically to a group of people, using email. In its broadest sense, every email sent to a potential or current customer could be considered email marketing. It involves using email to send advertisements, request business, or solicit sales or donations. Email marketing strategies commonly seek to achieve one or more of three primary objectives: build loyalty, trust, or brand awareness. The term usually refers to sending email messages with the purpose of enhancing a merchant's relationship with current or previous customers, encouraging customer loyalty and repeat business, acquiring new customers or convincing current customers to purchase something immediately, and sharing third-party ads.

Email authentication, or validation, is a collection of techniques aimed at providing verifiable information about the origin of email messages by validating the domain ownership of any message transfer agents (MTA) who participated in transferring and possibly modifying a message.

<span class="mw-page-title-main">Message submission agent</span>

A message submission agent (MSA), or mail submission agent, is a computer program or software agent that receives electronic mail messages from a mail user agent (MUA) and cooperates with a mail transfer agent (MTA) for delivery of the mail. It uses ESMTP, a variant of the Simple Mail Transfer Protocol (SMTP), as specified in RFC 6409.

Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unrelated party whose identity has been faked. Disposable email address or "masked" email is a different topic, providing a masked email address that is not the user's normal address, which is not disclosed, but forwards mail sent to it to the user's real address.

A challenge–response system is a type of that automatically sends a reply with a challenge to the (alleged) sender of an incoming e-mail. It was originally designed in 1997 by Stan Weatherby, and was called Email Verification. In this reply, the purported sender is asked to perform some action to assure delivery of the original message, which would otherwise not be delivered. The action to perform typically takes relatively little effort to do once, but great effort to perform in large numbers. This effectively filters out spammers. Challenge–response systems only need to send challenges to unknown senders. Senders that have previously performed the challenging action, or who have previously been sent e-mail(s) to, would be automatically

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email, a technique often used in phishing and email spam.

Email forwarding generically refers to the operation of re-sending a previously delivered email to an email address to one or more different email addresses.

Backscatter is incorrectly automated bounce messages sent by mail servers, typically as a side effect of incoming spam.

<span class="mw-page-title-main">Feedback loop (email)</span> Process of forwarding user complaints to senders

A feedback loop (FBL), sometimes called a complaint feedback loop, is an inter-organizational form of feedback by which a mailbox provider (MP) forwards the complaints originating from their users to the sender's organizations. MPs can receive users' complaints by placing report spam buttons on their webmail pages, or in their email client, or via help desks. The message sender's organization, often an email service provider, has to come to an agreement with each MP from which they want to collect users' complaints.

Spam reporting, more properly called abuse reporting, is the action of designating electronic messages as abusive for reporting to an authority so that they can be dealt with. Reported messages can be email messages, blog comments, or any kind of spam.

With the invention of online message-transfer methods like email, an array of anti-spam techniques has been developed in regard to email spam. Email spam refers to the unwarranted inundation of unsolicited bulk emails. These are methods created on the client arrangement of a situation, rather than the server-side.

SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products:

References

  1. "How to improve domain reputation for better email deliverability". postmarkapp.com. Retrieved 2023-04-02.
  2. Karim, Asif; Azam, Sami; Shanmugam, Bharanidharan; Kannoorpatti, Krishnan; Alazab, Mamoun (2019). "A Comprehensive Survey for Intelligent Spam Email Detection". IEEE Access. 7: 168261–168295. doi:10.1109/ACCESS.2019.2954791. ISSN   2169-3536.
  3. A Complete Guide to Mastering Cold Email Outreach
  4. "Regulation (EU) 2016/ 679 of the European Parliament and of the Council". Official Journal of the European Union. 27 April 2016.
  5. "Bill Text - AB-375 Privacy: personal information: businesses". leginfo.legislature.ca.gov. Retrieved 2019-01-02.
  6. "CAN-SPAM Act: A Compliance Guide for Business". Federal Trade Commission. 2009-09-02. Retrieved 2023-04-02.
  7. "LegalArchiver.Org: Can-Spam Act 2003". 2016-02-13. Archived from the original on 2016-02-13. Retrieved 2019-01-02.
  8. Government of Canada, Industry Canada (2014-06-30). "Canada's Anti-Spam Legislation - Canada's Law on Spam and Other Electronic Threats - Home". fightspam.gc.ca. Retrieved 2019-01-02.
  9. Authority, The Australian Communications and Media (2018-12-10). "Spam Industry obligations". www.acma.gov.au. Retrieved 2019-01-02.
  10. "Unsolicited Electronic Messages Act 2007 No 7 (as at 13 November 2018), Public Act Contents – New Zealand Legislation". www.legislation.govt.nz. Retrieved 2019-01-02.