If you’re one of the millions who are using mobile devices to take their work with them, then you know how important it is to have a professional email presence no matter what device you use. Part of that presence is a professional signature that lets you send messages from your phone or tablet with the same contact information as your desktop
Sometimes, it’s the little things that can give us the most annoyances. As often as software gets updated, things that used to be common knowledge now have entirely new ways of getting done, and the way it used to be doesn’t apply. Something as necessary as changing your email signature, for example, gets lost in the shuffle of new menus and options. This
Inbox Zero is often a topic of discussion amongst those online, and with good reason. Everyone seems to have an opinion, and Hope’s Inbox Zero post generated debate in our office. Because we thought our readers would enjoy a glimpse into our discussion, Zac and I have decided to take our opinions to a more open forum. You can read Zac’s post
Hope wrote a great piece on the virtues of Inbox Zero earlier this month. Andrew and I often talk about our different perspectives on this, so we decided to independently write about them. It turns out that we have more in common than we thought, and our differences are just a matter of definition. Check out Andrew’s post here. Is Inbox Zero
Email was supposed to make our lives easier. Instead of trying to track someone down via phone for a conversation or waiting days for a letter to reach its destination, email provided a means of faster communication between parties. Sending an email meant that we (theoretically) reduced the amount of paper in our offices and saved a few virgin forests in the
Unsolicited commercial email (UCE) is the digital junk mail known as spam. At the very least UCE is a nuisance, and at its worst an access point for viruses and malicious code. However you may view it, spam is an ever-present problem for most businesses and individuals. Considering that the volume of email worldwide is 269 billion messages per day and that
If you are a LinkedIn member, please be aware that Invitations to Connect may be phishing attempts. We’ve seen a few of these LinkedIn scams lately. Details of the LinkedIn phishing email scam The email appears to be from LinkedIn with a spoofed email address of firstname.lastname@example.org The subject line is Invitation to connect on LinkedIn. The links embedded in the email do not
The technology that drives all of this is known as Public Key Infrastructure, or PKI. Anyone can use the Public Key, but only the holder of the Private Key can use this Private Key — it should never be shared. If someone wants to send me a private/encrypted email message, they simply use my Public Key to encrypt the message before sending. Since only I have the Private Key, only I can decrypt the message to see the original contents.
Let’s talk for a moment about email. As an instrument of communication, email allows us to conduct business, catch up with friends, send links, and share information. In the not-too-distant past, postal mail accomplished those same things, albeit more slowly – hence the name “snail mail” in use today. The variety of communications that travel through postal mail utilize varying degrees of
We’ve all become so accustomed to using email in our daily personal and working lives that we really don’t give a whole lot of thought to it. It’s the fastest way to communicate with others in the course of the day, and the emails we send and receive – in general – never see the light of day again once they’ve been read. People
For all of the press out there about hacking and suspicious websites, one important facet of internet security that gets overlooked is email. Most of us know not to click on links in a spam message, and many of us realize that some email attachments harbor unsavory bits of code. Malicious code and viruses get transferred easily with email, often without the
There is also an expectation among smartphone users that company email will be accessible through their personal devices, and employees bring their personal devices into the workplace in order to conduct business. This is most commonly known as “bring your own device,” or BYOD.
Recently we have seen a few emails related to the same phishing attempt make it through our email antispam filter service. Details of the AMEX phishing email scam. The email appears to be from American Express with a spoofed email address of AmericanExpress@welcome.aexp.com. The subject line is Your American Express Forgotten User ID. The links embedded in the email do not go
Shakespeare famously posed the question, “What’s in a name?” hundreds of years ago, and the question is relevant even today. Nowhere is this more evident than in the choice of an email address name and domain. In the most basic terms, your email address is an electronic postal address – but done correctly, your email address can be part of your brand,
If you have a Gmail account (or Google Apps for Business), you may not be aware that you can embed information in your email address. For example, if your address is: email@example.com You can add arbitrary text like +some_string to the end of the address and make it: firstname.lastname@example.org Anything after the plus sign is ignored in routing the email, but the