Home › Blog › Send out Newsletters and Know About Double Opt In
Send out Newsletters and Know About Double Opt In
Unless you already are, your organization needs to send out newsletters on a regular basis that contain useful information. It does you no good if your email messages get blocked by your subscribers’ spam filters. Double Opt In helps you bypass those spam filters.
Double opt in is a two-step process that works like this:
- First Opt In: Someone subscribes to your newsletter at a web page such as the one here: http://www.fosterinstitute.com/it-roi-newsletter/
- Second Opt In: Then your newsletter service will send a message to the subscriber asking them to “confirm” that they want the newsletter.
Now they are on your list of subscribers.
Were it not for Double Opt In, “a bad guy” could enter “a good guy’s” email address and your newsletter would effectively be “spamming the good guy” since the good guy is on your subscriber list.
Anytime your organization sends unsolicited mail, your organization might get placed on a spam list. Being on a spam “black list” can effectively reduce your abilities to communicate with others via email.
The solution is simple: Publish a newsletter to provide value and remind your subscribers that you do deliver value. Use Double Opt In for your subscribers.
And FYI, The Foster Institute is undergoing a similar process right now to help avoid your spam filters. We are using Double Opt In to reconfirm all subscribers. Unless you’ve already done so, please renew your free subscription to the newsletter by going here: http://www.fosterinstitute.com/it-roi-newsletter/
And yes, you will receive a Double Opt In email asking you to confirm your subscription. If you are concerned the confirmation email is spam, please forward it to us and we’ll click the confirmation link for you. Many of you have already confirmed, and users who do not confirm will be dropped from the mailing list.
Posted by Mike Foster in Best Practices, social media, Technology on September 13th, 2012.
Tags: double opt in, email marketing
Leave a Reply
- Watch Mike on YouTube
- Follow @safenetwork
- Join Mike on Facebook
- Connect with Mike Foster
- Subscribe to the Blog
Recent Blog Posts
- New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City
- A New Opportunity for Your IT Pros to Protect your Servers
- How Buying a Spare Printer can Vastly Improve Your Cyber Security
- When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush
- Patching Nightmare – Please Forward to Your IT Pros
- Three Serious Trends to Watch Out for in Cyber Security
- Major Flaw in Computer Processors Affects Security
- Protecting and Restricting iPads, iPhones, and Android Devices
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Bromium
- browser security
- Carbon Copy Cloner
- CCleaner
- Children
- Cloud
- Computer Processor
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- DEF COM
- Disaster Recovery
- Download
- Equifax
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- NSA
- NYC Secure
- Online Impersonators
- Online Security
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Pwn2Own
- Ransomware
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- Save time
- Scratch
- Security Breach
- Security Logs
- Shadow Protect Desktop
- Sir Michael Fallon
- social media
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uninstall
- Upgrade
- Videos
- VirtusTotal.com
- Virus
- WDAG
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows 10
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo