E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...What to do if your e-mail is hacked? How to find out
How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?What is an SPF record and how to use it
Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.What is greylisting? Definition, advantages and disadvantages
Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.What is PGP encryption and how to implement it
Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit Email addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce four tools to help you check whether your Email has been hacked.Email hack checker: Check if your Email has been hacked
Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...What is email encryption and how does is work
How can you spot fraudulent emails if they use a known sender name and look like familiar newsletters or service emails? One way is to use the DMARC verification protocol, which triggers appropriate measures if an email doesn’t pass certain checks. In this article we explain how DMARC can give you an early warning about possible misuse of your sender name.What is DMARC and why do you need it?
Spam robots, so-called harvesters, consistently search the internet for email addresses that can be used for unlawful advertising, phishing emails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop them from being misused? This article gives you advice on how to protect your email address.How to protect email address on website from spam
Gmail is Google’s popular free email application. To access their account, users have to log in using a password. But what if you forgot your password or want to change it? This guide sets out the steps to follow to reset or change your Gmail password.How to change or reset your Gmail password
What is an allowlist and how can allowlisting help you have more smooth email communication? Formerly known as email whitelisting, allowlisting uses a curated list of permitted senders to prevent dangerous or unwelcome content from entering your inbox. How do you create such a list? Keep reading to find out.What is email whitelisting and how to create an email whitelist
IONOS E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.