Get Started Today!  321-259-5500

croom new

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

Gmail
To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Outlook
Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at 321-259-5500.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

Google Knows Where You Are: Here’s How to Stop The...
Why Multitasking Doesn’t Work (and What to Do Inst...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Email Hosted Solutions Internet Productivity Computer IT Services Backup Network Security Data Mobile Devices Productivity Software Hardware Microsoft Ransomware Google Managed Service Provider User Tips Tech Term Efficiency Windows 10 Workplace Tips Smartphone Innovation Android Business Continuity Disaster Recovery Small Business Cloud Computing Data Management Server IT Support Social Media Business Management Smartphones IT Support Encryption Managed IT Services Browser Network Data Backup Communication App Outsourced IT Artificial Intelligence Office 365 BYOD Facebook Data Recovery Paperless Office Office Gmail Phishing Big Data Windows Apps Upgrade Passwords Internet of Things Employer-Employee Relationship Vendor Management Windows 10 Managed IT Services WiFi Holiday Save Money Remote Monitoring Government Hosted Solution Mobile Device Management Firewall Wireless Technology VoIP Alert Recovery Wireless Collaboration Robot Wi-Fi Vulnerability Risk Management Miscellaneous Two-factor Authentication Microsoft Office Spam Office Tips Work/Life Balance Avoiding Downtime Scam Cybersecurity IT solutions Website Hacker Document Management Automation IT Management Content Filtering Customer Service Saving Money Bandwidth Social Quick Tips Infrastructure VPN How To Tip of the week Money Antivirus Password Chrome Word Virtualization Budget Downtime Unified Threat Management Remote Computing Machine Learning communications Analytics Customer Relationship Management Information Tablet Managed Service Healthcare IT service Applications BDR Data storage Virtual Reality Apple Going Green Hard Drives Business Technology Politics Legal Education SaaS Maintenance Bring Your Own Device Cybercrime Mobile Device Twitter Tech Support The Internet of Things Settings Computing Blockchain Storage Server Management Google Drive Lithium-ion battery Virtual Desktop Router Hacking Network Management Cost Management Monitors Cortana Business Owner Access Control HIPAA Compliance Competition Patch Management Users Data loss YouTube User Samsung Computer Care Unified Communications Business Intelligence Regulations eWaste Running Cable Best Practice Identity Theft Computers Solid State Drive Data Security Training User Error Private Cloud Search File Sharing LiFi Mobile Security End of Support Virtual Private Network Outlook G Suite Sports Heating/Cooling Health Point of Sale Printing Management Upgrades Websites Telephone Systems Administration Taxes Safety Mouse Operating System Electronic Medical Records Presentation Physical Security Botnet Augmented Reality Automobile Chromebook IBM How To Printer Wearable Technology Smart Tech Printers Digital Payment Co-managed IT Save Time Shortcut Net Neutrality Managed IT Wires Financial Gadgets Cameras WannaCry Laptop Alt Codes Features Tracking Information Technology Smart Technology Managing Stress Permission Hard Disk Drive Computing Infrastructure Firefox Trending Legislation Identity Unsupported Software Application Fun Hard Drive Authorization Administrator Permissions Dark Data Emoji Wasting Time Cleaning Law Enforcement Connectivity Bookmarks Entrepreneur FCC Google Docs Help Desk Security Cameras CCTV Halloween Typing Modem Touchscreen Google Wallet Statistics Distributed Denial of Service Backups Personal Information Enterprise Content Management Test Meetings Identities Networking Alerts CIO Current Events Comparison Mobile Data Relocation Cache Employees Cabling Fraud Monitoring SharePoint Gadget Law IoT Favorites Title II ROI Digital Scary Stories Cryptocurrency Notifications IP Address Cookies Electronic Health Records Drones Bluetooth Managed IT Service Computer Repair Undo Vulnerabilities RMM Webcam Mobile Computing Licensing Writing Specifications Social Networking Recycling Remote Monitoring and Management Knowledge Black Market Consulting Downloads IT Technicians 5G Star Wars Instant Messaging Environment Google Maps Online Public Speaking OneNote Notes Spyware Bitcoin Retail Crowdsourcing Mobile Office Nanotechnology Files Supercomputer Break Fix Development Tech Terms Techology Cooperation Staffing VoIP Black Friday Refrigeration Zero-Day Threat Travel Disaster Experience Lenovo Hotspot Network Congestion Managed Services Provider Windows 8 Multi-Factor Security Mirgation Assessment Finance Error Mail Merge Microsoft Excel Humor Update Employee-Employer Relationship PowerPoint Analyitcs Staff Social Engineering Screen Reader Read Only IT Budget Servers Dark Web Cables Theft iPhone Web Server Corporate Profile Business Growth Unified Threat Management E-Commerce GPS Time Management Cyber Monday Company Culture Human Error Motion Sickness Uninterrupted Power Supply Deep Learning Superfish Language Display Processors Motherboard Buisness Hacks Google Calendar Chatbots 3D Printing Internet Exlporer Authentication Troubleshooting Hiring/Firing Address Remote Workers Professional Services Marketing IT Consultant Emergency USB Domains Regulation Database Flexibility Voice over Internet Protocol CrashOverride

      Latest Blog Entry

      When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encry...

      Account Login