Return Path monitors the Certified IP addresses of all of its customers for suspicious activity 24 hours a day, 7 days a week, 365 days a year. We use a variety of methods, including real-time system alerts and human investigative techniques.
To detect potential security compromises, we:
- Look for email traffic from sending domains not owned or related to your business during an investigation by the Certification support team
- Monitor performance metrics such as sending volume, complaints, and spam trap hits to spot abnormal patterns of behavior
- Examine real-time alerts from third-party spam and security sources, such as Spamhaus, the Spam Uniform Resource Identifier Real-time Block List (SURBL), and SpamAssassin