Get Started Today!  321-259-5500

croom new

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

Gmail
To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Outlook
Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at 321-259-5500.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

Google Knows Where You Are: Here’s How to Stop The...
Why Multitasking Doesn’t Work (and What to Do Inst...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Computing Business Internet Email Hosted Solutions Productivity IT Services Data Computer Backup Network Security Mobile Devices Productivity Hardware Microsoft Software Google Efficiency Managed Service Provider Ransomware Workplace Tips User Tips Windows 10 Tech Term Smartphone Android Server Innovation Business Continuity Cloud Computing Disaster Recovery Small Business Communication Upgrade Social Media Encryption Business Management Smartphones IT Support Data Management IT Support Network Phishing App Managed IT Services Browser Data Backup Windows Artificial Intelligence Office 365 BYOD Facebook Data Recovery Outsourced IT Windows 10 Office Apps Internet of Things Big Data Paperless Office Passwords Gmail Employer-Employee Relationship Managed IT Services Microsoft Office Save Money Remote Monitoring Government WiFi Hosted Solution Mobile Device Management Holiday VoIP Vendor Management Collaboration Risk Management Two-factor Authentication Saving Money Chrome Miscellaneous Office Tips Firewall Wireless Technology Alert Cybersecurity communications Recovery Wireless Spam Robot Wi-Fi Vulnerability VPN Quick Tips Infrastructure How To Tip of the week Money Antivirus Password Managed Service Social Word Settings Virtualization Budget Work/Life Balance Avoiding Downtime Scam Analytics IT solutions Website Automation Hacker Document Management Customer Service IT Management Content Filtering Bandwidth Apple Going Green Hard Drives Business Technology Politics Legal Education SaaS Maintenance Bring Your Own Device Tech Support Mobile Device IT service Twitter Information The Internet of Things Computing Healthcare Blockchain Storage Cybercrime Downtime Unified Threat Management Remote Computing Machine Learning Customer Relationship Management Compliance Tablet Applications BDR Data storage Virtual Reality Data Security Hacking Best Practice Identity Theft Computers Solid State Drive Training User Error Private Cloud Search File Sharing LiFi Mobile Security Business Owner End of Support Sports Competition Virtual Private Network Users Outlook G Suite Heating/Cooling User Health Point of Sale Printing Router Taxes eWaste Upgrades Websites Telephone Systems Administration Running Cable Safety Mouse Operating System Electronic Medical Records Presentation Physical Security How To Botnet Augmented Reality Automobile Chromebook IBM Server Management Net Neutrality Google Drive Monitors Virtual Desktop Network Management Cost Management Cortana Access Control HIPAA Patch Management Data loss Samsung YouTube Networking Computer Care Unified Communications Management Business Intelligence Regulations Lithium-ion battery Licensing Writing Notifications IP Address Drones Screen Reader Read Only Bluetooth Managed IT Service Computer Repair Undo Webcam Mobile Computing Cables Theft Motherboard E-Commerce Specifications Social Networking Knowledge Company Culture Human Error Black Market Spyware Bitcoin Remote Workers Professional Services Downloads IT Technicians Entrepreneur 5G Google Maps Internet Exlporer Authentication Online Public Speaking Financial Techology Cooperation Retail Crowdsourcing Mobile Office Supercomputer Smart Tech Printers Break Fix Wires Staffing VoIP Features Black Friday Refrigeration Travel Disaster Experience Managing Stress Permission Lenovo Hotspot Network Congestion Windows 8 Wasting Time Multi-Factor Security Mirgation Error Hard Drive Authorization Mail Merge Microsoft Excel Humor Update Security Cameras Unified Threat Management Staff Social Engineering IT Budget Servers Connectivity Bookmarks Dark Web Web Server Corporate Profile Business Growth Processors GPS Time Management Modem Cyber Monday Motion Sickness Uninterrupted Power Supply Deep Learning Enterprise Content Management Test Superfish Language Display IT Consultant Buisness Hacks Monitoring Google Calendar Environment Chatbots 3D Printing Hiring/Firing Cache Employees Address ROI Printer Wearable Technology Database Digital Payment Co-managed IT Save Time IoT Favorites Shortcut Managed IT Cameras WannaCry Laptop Alt Codes Tracking Information Technology Cookies Electronic Health Records Smart Technology Hard Disk Drive Vulnerabilities RMM Computing Infrastructure Cleaning Firefox Trending Consulting Legislation Identity Unsupported Software Application Fun Administrator Recycling Remote Monitoring and Management Permissions Analyitcs Dark Data Emoji Typing OneNote Notes Law Enforcement Voice over Internet Protocol Star Wars Instant Messaging FCC iPhone Google Docs Help Desk CCTV Halloween Alerts Touchscreen Google Wallet Nanotechnology Files Statistics Distributed Denial of Service Backups Personal Information Meetings Identities Development Tech Terms CIO Current Events Managed Services Provider Comparison Troubleshooting Mobile Data Relocation Cabling Zero-Day Threat Marketing Fraud Scary Stories Cryptocurrency Employee-Employer Relationship PowerPoint SharePoint Gadget Windows 7 Law Assessment Finance Gadgets Title II Digital Flexibility Students CrashOverride Teamwork Shared resources Regulation Emergency USB Domains

      Latest Blog Entry

      If your business is one that depends on transportation, you know that coordination is extremely important. With consumers’ reliance on a company’s distribution arm, today’s companies are turning old practices on their heads and utilizing a more technology-driven approach to ...

      Account Login