Follow

How does Return Path detect a security compromise?

Return Path monitors the Certified IP addresses of all of its customers for suspicious activity 24 hours a day, 7 days a week, 365 days a year. We use a variety of methods, including real-time system alerts and human investigative techniques.

To detect potential security compromises, we:

  • Look for email traffic from sending domains not owned or related to your business during an investigation by the Certification support team
  • Monitor performance metrics such as sending volume, complaints, and spam trap hits to spot abnormal patterns of behavior
  • Examine real-time alerts from third-party spam and security sources, such as Spamhaus, the Spam Uniform Resource Identifier Real-time Block List (SURBL), and SpamAssassin
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request