Christian Computers Blog

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

Gmail
To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Outlook
Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at (252) 321-6216.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Security Technology Tip of the Week Best Practices Privacy Business Management Cloud Business Computing Managed Service Provider Internet Microsoft Software Saving Money Hosted Solutions Workplace Tips Malware Hackers IT Services Backup Productivity Data Mobile Devices Email IT Support Small Business Hardware Business Business Continuity Computer Network Innovation Network Security Google Managed IT Services Outsourced IT Smartphones Server Productivity VoIP Efficiency Upgrade Data Backup Ransomware Communication Social Media User Tips Disaster Recovery Windows Vendor Management Tech Term Remote Monitoring Gadgets Microsoft Office Mobile Office Smartphone Virtualization Cloud Computing Data Recovery Mobile Device Management Quick Tips Android Internet of Things Save Money Windows 10 Passwords Miscellaneous Unified Threat Management Holiday BYOD Alert Paperless Office Data Management Artificial Intelligence Users Bring Your Own Device Collaboration Best Practice Encryption Trending Going Green Apps Apple Firewall Browser IT Support Phishing Facebook Mobile Computing Current Events Office 365 Managed IT Maintenance Antivirus App Wireless Technology Remote Computing Mobile Device Printer The Internet of Things Managed IT Services Document Management IT Solutions Wi-Fi Cybersecurity Customer Relationship Management Recovery Health Operating System IT Consultant Vulnerability Windows 10 History Router Hard Drives Excel Automation Gmail Content Filtering Password Information Technology Risk Management Office WiFi Money Digital Payment Robot Hosted Solution Windows 8 Tablet Spam Big Data Applications communications Scam Analytics Employer-Employee Relationship Tech Support BDR File Sharing Training VPN Data storage Budget Compliance IT Management Proactive IT Help Desk Hacker Social Point of Sale Telephone Systems Computer Repair Bandwidth Information How To Humor Healthcare Government Fax Server Infrastructure SaaS Downtime Wireless Work/Life Balance Two-factor Authentication Unified Communications Net Neutrality Administration PowerPoint Mouse Storage Lithium-ion Battery Website Chrome Marketing Saving Time Printing Samsung Touchscreen Blockchain Regulations Word Outlook Politics Twitter Avoiding Downtime Machine Learning Managed Service Computing Statistics IT Service Education Virus Virtual Reality Project Management Social Networking Customer Service Inbound Marketing Licensing Data Security Company Culture Private Cloud Computers Solid State Drive Virtual Private Network Save Time Identity Theft Phone System Websites USB Smart Technology Search Business Technology Mobile Security IoT Alerts LiFi Business Growth Settings Wearable Technology Botnet Conferencing Uninterrupted Power Supply Remote Monitoring and Management Legal Chromebook Bluetooth Computer Care Electronic Medical Records Monitors Mobility Server Management G Suite Remote Workers Display Management Webcam HIPAA Automobile Sports Hiring/Firing Application How To Cost Management Employees Flexibility Travel Data loss Office Tips Video Surveillance Google Drive Patch Management Network Management IBM Taxes User Error Recycling Physical Security Heating/Cooling End of Support Upgrades Access Control Piracy iPhone Files Assessment Augmented Reality Internet Exlporer Co-Managed IT Software as a Service Meetings Tip of the week Managing Stress Finance 3D Printing SharePoint Migration LinkedIn Mobile Device Managment User OneNote ROI Computer Accessories Processors Data Warehousing Disaster Resistance Value Staff Error Disaster Cortana Proactive Theft ebay Backups Update Cleaning Consultation YouTube Cache Read Only Online Currency Cables Human Error Hacks Personal Information Technology Tips Cookies Memory Web Server Spyware Hacking Java Managed Services Provider Network Congestion Law Enforcement Servers Enterprise Content Management Authentication Unsupported Software Downloads Chatbots Best Available Corporate Profile Employee-Employer Relationship Notes Notifications Mail Merge Microsoft Excel Data Breach Operations Public Cloud Financial Distributed Denial of Service Debate eWaste Gadget lenevo Hotspot Software Tips Wires Permission Comparison Nanotechnology People Cameras Refrigeration Star Wars E-Commerce PC Care Remote Support Deep Learning Webinar Vulnerabilities Authorization Alt Codes Mobile Data Two-factorAuthentication Identity WannaCry Cybercrime Professional Services Dark Data Address Bookmarks Data Loss Streaming Media Macro WPA3 Procurement 3D Text Messaging Emoji Managed IT Service Programming Staffing Time Management Work Station Writing Superfish Language Test Specifications Screen Reader CCTV CIO Utility Computing Features Leadership Permissions Supercomputer IP Address Geography Typing Multi-Factor Security Virtual Desktop Crowdsourcing Redundancy Enterprise Resource Planning Favorites Avoiding Downtown Technology Laws Business Intelligence IT Technicians Administrator Hard Disk Drive Fleet Tracking Security Cameras Virtual Assistant Break Fix GPS Retail Telephony Networking Computing Infrastructure Relocation Cabling RMM Google Wallet Black Friday Print Server Smart Tech Firefox Electronic Health Records Fraud Intranet IT Budget Shortcut Safety Identities High-Speed Internet Zero-Day Threat Cryptocurrency Motherboard Crowdfunding Motion Sickness VoIP Monitoring Phone Systems Mobile Instant Messaging Mirgation Skype Sync Asset Tracking Remote Worker Google Docs Black Market Dark Web Tracking Social Engineering Cooperation MSP Tech Terms Gaming Console Drones Cyber Monday Law Firm IT Connectivity Hard Drive Cyberattacks Emergency Windows 8.1 Update Google Maps Development Backup and Disaster Recovery Bitcoin Modem Running Cable Digital Trojan Scheduling Consulting Presentation Printers Knowledge 5G CrashOverride Buisness Experience Domains Laptop Public Speaking Fun Regulation Undo Halloween Wasting Time Competition Scary Stories