How To Change Your Email Signature in iOS7

If you’re one of the millions who are using mobile devices to take their work with them, then you know how important it is to have a professional email presence no matter what device you use. Part of that presence is a professional signature that lets you send messages from your phone or tablet with the same contact information as your desktop

How To Change Your Email Signature in Microsoft Outlook 2010

Sometimes, it’s the little things that can give us the most annoyances. As often as software gets updated, things that used to be common knowledge now have entirely new ways of getting done, and the way it used to be doesn’t apply. Something as necessary as changing your email signature, for example, gets lost in the shuffle of new menus and options. This

Inbox Zero: Why It’s Important to Me

Inbox Zero is often a topic of discussion amongst those online, and with good reason. Everyone seems to have an opinion, and Hope’s Inbox Zero post generated debate in our office. Because we thought our readers would enjoy a glimpse into our discussion, Zac and I have decided to take our opinions to a more open forum. You can read Zac’s post

Inbox Zero Is Not Realistic

Hope wrote a great piece on the virtues of Inbox Zero earlier this month. Andrew and I often talk about our different perspectives on this, so we decided to independently write about them. It turns out that we have more in common than we thought, and our differences are just a matter of definition. Check out Andrew’s post here. Is Inbox Zero

Inbox Zero: Is It Realistic?

Email was supposed to make our lives easier. Instead of trying to track someone down via phone for a conversation or waiting days for a letter to reach its destination, email provided a means of faster communication between parties. Sending an email meant that we (theoretically) reduced the amount of paper in our offices and saved a few virgin forests in the

How Do Email Spam Filters Work?

Unsolicited commercial email (UCE) is the digital junk mail known as spam. At the very least UCE is a nuisance, and at its worst an access point for viruses and malicious code. However you may view it, spam is an ever-present problem for most businesses and individuals. Considering that the volume of email worldwide is 269 billion messages per day and that

Email Phishing Alert: “Invitation to connect on LinkedIn”

If you are a LinkedIn member, please be aware that Invitations to Connect may be phishing attempts. We’ve seen a few of these LinkedIn scams lately. Details of the LinkedIn phishing email scam The email appears to be from LinkedIn with a spoofed email address of The subject line is Invitation to connect on LinkedIn. The links embedded in the email do not

How Does Email Encryption Work?

The technology that drives all of this is known as Public Key Infrastructure, or PKI.  Anyone can use the Public Key, but only the holder of the Private Key can use this Private Key — it should never be shared. If someone wants to send me a private/encrypted email message, they simply use my Public Key to encrypt the message before sending. Since only I have the Private Key, only I can decrypt the message to see the original contents.

Why Encrypt Your Email?

Let’s talk for a moment about email.  As an instrument of communication, email allows us to conduct business, catch up with friends, send links, and share information. In the not-too-distant past, postal mail accomplished those same things, albeit more slowly – hence the name “snail mail” in use today.  The variety of communications that travel through postal mail utilize varying degrees of

What is an Email Retention Policy and Why Does Your Business Need One?

We’ve all become so accustomed to using email in our daily personal and working lives that we really don’t give a whole lot of thought to it.  It’s the fastest way to communicate with others in the course of the day, and the emails we send and receive – in general – never see the light of day again once they’ve been read. People

How Secure is Your Email?

For all of the press out there about hacking and suspicious websites, one important facet of internet security that gets overlooked is email. Most of us know not to click on links in a spam message, and many of us realize that some email attachments harbor unsavory bits of code. Malicious code and viruses get transferred easily with email, often without the

BYOD: Bring Your Own Device

There is also an expectation among smartphone users that company email will be accessible through their personal devices, and employees bring their personal devices into the workplace in order to conduct business. This is most commonly known as “bring your own device,” or BYOD.

Email Phishing Alert: “Your American Express Forgotten User ID”

Recently we have seen a few emails related to the same phishing attempt make it through our email antispam filter service. Details of the AMEX phishing email scam. The email appears to be from American Express with a spoofed email address of The subject line is Your American Express Forgotten User ID. The links embedded in the email do not go

Your Email Address: An Opportunity for Branding

Shakespeare famously posed the question, “What’s in a name?” hundreds of years ago, and the question is relevant even today. Nowhere is this more evident than in the choice of an email address name and domain. In the most basic terms, your email address is an electronic postal address – but done correctly, your email address can be part of your brand,

Using Aliases in Gmail

If you have a Gmail account (or Google Apps for Business), you may not be aware that you can embed information in your email address. For example, if your address is: You can add arbitrary text like +some_string to the end of the address and make it: Anything after the plus sign is ignored in routing the email, but the

« Previous Page