All things email

The Axigen Blog



How to Stop Malware Emails? Simple Step by Step Guide

Nov 08, 2021  •  6 min. read

Find out how to stop malware emails, things to watch out for, how to recognize malware in emails, and best practices to avoid and prevent malware.

Read article

4 Benefits of Good User Interface Design

Oct 22, 2021  •  4 min. read

Learn four benefits of good user interface design for business mail servers.

Read article

Lawful Interception for Service Providers — Overview and Compliance

Oct 06, 2021  •  8 min. read

Find out what lawful interception means, how and why hosting providers intercept emails but protect user privacy, & how the rules apply in our day-to-day lives.

Read article

Email Anti Abuse for Service Providers — Overview and Best Practices

Oct 06, 2021  •  6 min. read

Find out what email anti-abuse is, what M³AAWG is, the relationship between service providers and email anti-abuse, and 3 best practices to avoid email abuse.

Read article

Are Chain Messages Safe? The Definitive Answer

Sep 10, 2021  •  4 min. read

Find out whether chain messages are safe, the legal implications associated with them, and some best practices to follow if you receive chain messages.

Read article

Customer Experience Optimization for Service Providers — How to Do It Right

Aug 03, 2021  •  5 min. read

Find out how service providers like ISPs and MSPs optimize the customer experience through a customer focus, employee satisfaction, and data security.

Read article

What Is an Email Server? Definition, How It Works, Why You Need One

Aug 02, 2021  •  3 min. read

Find out what an email server is, what it does, why you need one, and how to keep your email safe throughout its transfer.

Read article

How to Test Your Email Infrastructure For Email Deliverability

Jul 30, 2021  •  7 min. read

Testing email infrastructure deliverability means going through spam tests, email validation checks, capacity tests, and many content tests. More in our guide.

Read article

Top Customer Loyalty Programs in the Telecom Industry You Need to See

Jul 05, 2021  •  6 min. read

Although no one type of telecom customer loyalty program will be perfect, we can see how implementing a few good practices keeps customers coming back.

Read article

What Is Business Email Compromise + Why and How to Prevent It

Jul 05, 2021  •  6 min. read

Find out what BEC is, how it happens, and how to detect and prevent it.

Read article


accounts anti abuse email auto migration automatic migration benefits of good user interface design broadband marketing strategy brute-force attack protection business email compromise chain messages cloud email service cloud native cloud native applications cloud-based email service container containerization customer loyalty customer privacy customer retention customer stickiness customer value dark mode trend data privacy data protection demilitarized zone network dkim dmarc dmz dmz server Docker docker mail server email email archiving email bounce email deliverability test email hosting and archiving email migration best practices email search email security email server provider emojis fail2ban gdpr generic email address google graylisting greylisting guide how does dkim work how to market internet services how to search email how to sell internet service how to setup smtp relay server how to stop malware emails icewarp alternative imap folders internet service provider business plan IP isp isp advertising isp marketing ideas isp trust kubernetes kubernetes mail server lawful interception linux mail server mail transfer agent mailhive marketing plan for ISP company mentions msp MTA mxtoolbox open source openDMARC postfix prepare for lawful interception reputation rich text security Sender Rewriting Scheme service provider customer experience source of spam SRS stop email spoofing strategy telco telecom customer loyalty telecom industry telecom trust webmail customization webmail search webmail skinning website what is an email server what is cloud-native