Spam refers to any unsolicited or unwanted email messages sent to your inbox. These messages, often referred to as “junk email,” can clutter your mailbox and make it harder to find the messages you care about. To help you manage and reduce spam, we provide tools that allow you to customize your email filtering settings.
Spam Filtering
Every email sent to your address is assigned a “spam score,” which indicates the likelihood of the message being spam. The score ranges from 0 to 10, with 10 meaning the email is highly likely to be spam.
Spam emails are automatically filtered into a separate Spam folder in your webmail, keeping your primary inbox clean. These filtered messages remain on the server and won’t be downloaded to your device when you check your mail. You can easily customize your spam filtering preferences by logging into your mailbox on our website.
Blocking Spam Sources
If spam from a specific site is reported, we can temporarily block emails from the mail server responsible. This approach prevents further spam from reaching your inbox. However, since legitimate users might also rely on the same server, these blocks are time-limited. Additionally, we notify the server’s administrator about the issue, allowing them to address the misuse.
Tagging Potential Spam
For added control, you can enable a feature that tags suspicious emails. Based on their spam scores, these emails will have their subject lines prefixed with {Spam?}. Many email programs allow you to set up local filters to handle these tagged messages automatically.
Long-lived Email Addresses
Email addresses that have been on the Internet for a long time tend to accumulate in data breaches, leaks, and marketing databases. Over time, they may be sold, shared, or scraped, leading to an increase in spam, phishing attempts, and other unwanted messages. Cybercriminals often use these email lists to launch targeted attacks, making it crucial to protect your email address.
Best Practices for Protecting Your Email Address
- Use Unique Emails for Different Services – If a service is compromised, the leaked email won’t affect other accounts.
- Enable Two-Factor Authentication (2FA) – Even if an attacker gets hold of your email, they won’t be able to access your accounts without the second factor.
- Avoid Posting Your Email Publicly – Use contact forms instead of listing your email on websites or social media.
- Use Email Aliases or Forwarding Addresses – This allows you to compartmentalize your online presence and reduce direct exposure.
If you’re receiving a large volume of spam or suspect your email has been compromised, we can help by setting up new forwarding rules, filtering options, or even generating fresh aliases to replace exposed addresses.
If you have any questions or need assistance, our Technical Support team is here to help. You can reach us at 1-877-726-3848. Support is available Monday to Friday from 8 AM to 10 PM and on weekends from 9 AM to 9 PM.