Discouraging Freemium Abuse with Email Address Verification
Oct 09, 2020 22:57
An effective way to convince target customers to use an enterprise’s product or service is to offer free trials or freemium plans. Some brands have been quite successful in using the freemium acquisition model. Spotify, Dropbox, Trello, and MailChimp are just a few examples. Aside from being a good marketing and pricing strategy, it also effectively brings down customer acquisition costs, allowing companies to maximize profits.
However, the free trial and freemium strategies are not without issues. One of the biggest challenges they bring is the risk of getting abused. This post tackles how website abuse occurs and how companies can avoid them when they verify an email address.
How Does Websites Abuse Happen?
By using the freemium model or offering free product trial periods, companies hope that end users would eventually convert and become paying customers. After all, every business’s goal is to increase sales and not just expand its user base.
However, freeloaders abound, and they find ways to use products and services for free even if their usage requirements go way beyond what is allowed. For example, an email marketing company offers a freemium plan that enables customers to send 2,500 emails per month. A freeloader would sign up multiple times to use the email service beyond the 2,500 monthly limits. Website abusers do this by:
●Using disposable or temporary email addresses when signing up for a free account
●Purposely using nonexistent email addresses for each of their free accounts
●Making up email addresses using valid email address providers
How Can Email Address Verification Minimize Website Abuse?
One of the first steps in discouraging freeloaders from abusing free trials is to verify an email address upon signup. Such a tactic requires integrating email address verification tools that can detect disposable and nonexistent email addresses.
Detect Disposable Email Addresses
The email address company@sharklasers[.]com, for instance, appears to be a valid and acceptable email address. However, when run through email address verification, a tool would detect that it was created using Guerilla Mail and is, therefore, a temporary or disposable email address.
Disposable email addresses can still receive messages. As such, even if companies verify an email address by sending email confirmation links through welcome emails, website abusers can still receive them and confirm.
Check the Existence of Email Addresses
There are also instances when freeloaders do not even have to create disposable email addresses. They can make up email addresses and use these to sign up. However, when companies put email address verification in place, website abusers cannot get away with this technique.
To verify an email address, Email Verification API checks if the email address’s mail server records exist. So when a website abuser signs up for a free account using the email address support@mycompany[.]com, it would fail the tool’s Domain Name System (DNS) check.
But suppose website abusers use valid email address providers such as Gmail, Microsoft Outlook, and Yahoo? They would pass the DNS check since mail servers for these providers do exist. However, made-up email addresses, such as customersupportofmycompany@gmail[.]com and accountingdeptofmycompany@gmail[.]com, would still be flagged by email address verification tools.
These would fail the Simple Mail Transfer Protocol (SMTP) check of Email Address Verification API, which uses email-sending emulation techniques to verify an email address and check if it can receive emails.
To verify an email address and ward off website abusers, sending a welcome email is, unfortunately, not enough. It is best to employ an email address verification system at the onset of the signup process to discourage freeloaders. Doing this could also augment a company’s marketing efforts and enhance its cybersecurity posture.
The year 2020 has seen an important increase in reselling hacked network access. It only takes one workstation inside your company, for a hacker to come in. Once inside, he can then resell the entry path to other cybercriminals. This illustrates the importance of protecting your business network, now more than ever. Read more
Marketing is paramount for business success, without it, there would be no sales and hence no company to run. According to a recent Gartner Research Study large companies, with annual revenues exceeding $10 billion U.S. dollars allocate on average 11.6% of their marketing budget to digital advertising, whilst smaller companies, with annual revenues ranging from $500 million to $1 billion U.S. dollars allocate 8.5% to digital marketing. Email is considered as one of the most effective marketing channels, with an average return of $42 dollars for every one dollar spent. In this article, we will look at the way one SaaS company, Fastbase Inc., turned the email marketing channel into a vital piston in its automated lead generation and sales management B2B engine. Read more
DDoS attacks. We’ve all heard about them, right? Whether you’ve speed-read headlines about the massive DDoS attacks Sony faced in 2014, perhaps you’ve been playing on an online game server to only have it suddenly wiped offline or maybe even your own project has been the target of a DDoS attack. Whichever context you’re familiar with DDoS attacks in, everyone in the vast land-of-internet has at least heard of DDoS attacks, even if only in the abstract. Read more