301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at 301-571-5040.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

Google Knows Where You Are: Here’s How to Stop The...
Why Multitasking Doesn’t Work (and What to Do Inst...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Business Email Network Security Software Tech Term Hosted Solutions Internet Data Computer Data Backup Mobile Devices IT Support Data Recovery Google Managed IT Services Efficiency IT Services Ransomware Innovation Backup User Tips Cloud Computing Microsoft Business Management Hardware Workplace Tips Outsourced IT Small Business Productivity Business Continuity Encryption Managed Service Provider Paperless Office Android Smartphone Windows 10 Social Media Collaboration Office 365 Remote Monitoring Phishing Upgrade Smartphones Windows 10 Server Data Management Communication Save Money Managed IT Services Browser Communications VoIP Disaster Recovery Bandwidth Cybersecurity Government Holiday Employer-Employee Relationship Unified Threat Management Saving Money Work/Life Balance BDR Document Management Facebook Infrastructure Tip of the week Automation Internet of Things Risk Management Wi-Fi Antivirus Scam Windows Compliance Vulnerability Passwords IT Management App Managed Service Apps Information Quick Tips Healthcare Business Technology Artificial Intelligence BYOD Applications Money File Sharing Chromebook Virtual Reality Two-factor Authentication Vendor Management How To Network Blockchain Mobile Device SaaS VPN Microsoft Office Maintenance Word Customer Relationship Management Hosted Solution Big Data Office Password Politics Chrome Training Remote Computing Mobile Security Websites Smart Technology Wireless Meetings Tablet Mobile Device Management Botnet Bring Your Own Device Patch Management Router Remote Monitoring and Management Automobile Employees Alert Remote Workers Health Machine Learning Data loss Gmail Company Culture Tech Support Identity Theft Point of Sale Regulations How To Samsung Electronic Medical Records Storage Physical Security Hacker Twitter IoT Telephone Systems Data Security G Suite Computing Server Management Analytics Professional Services Private Cloud Computer Care Virtual Private Network Robot Firewall Website Access Control HIPAA Taxes Downtime Management Recovery Social USB Consulting Cabling Sports Software as a Service Mouse Identity Error Development Authentication Digital Mail Merge IT Solutions Cost Management Theft VoIP Techology Computer Repair Remote Worker SharePoint IT Consultant Unified Communications Favorites WannaCry Shortcut Virtualization Microsoft Excel Screen Reader Digital Payment OneNote Cooperation Cameras Enterprise Resource Planning Files Hard Disk Drive Bluetooth Spam Proactive Permission Firefox Superfish Dongle Managed Services Provider Search Wasting Time Staffing Cables Authorization Spyware Address Upgrades Processors Hotspot Assessment Employee-Employer Relationship Avoiding Downtime ROI Downloads IT Technicians Project Management Monitors Smart Tech Cybercrime Financial Unified Threat Management Staff Law Enforcement CCTV Mobile Read Only Distributed Denial of Service Administrator Test Internet Exlporer Webcam Service Level Agreement E-Commerce Disaster Heating/Cooling Database Comparison Wires Language Time Management Augmented Reality Notes Multi-Factor Security Mirgation Education Vulnerabilities Conferencing Cortana Black Market Connectivity Crowdsourcing Procurement User Error Gadget Emoji Managed IT Service Modem WPA3 RMM Networking Computing Infrastructure Value Utility Computing Features Uninterrupted Power Supply Servers IBM Voice over Internet Protocol Specifications WiFi Zero-Day Threat Network Management The Internet of Things PowerPoint Google Calendar Relocation Cleaning Geography Instant Messaging YouTube Permissions Travel Personal Information Security Cameras Printer Wearable Technology Managing Stress Help Desk Managed IT Gadgets Budget Break Fix Cookies Supercomputer Fleet Tracking Operating System Alerts Electronic Health Records Update Net Neutrality Black Friday Social Networking GPS Backup and Disaster Recovery Monitoring IT Support Touchscreen Legal Virtual Assistant Legislation Chatbots High-Speed Internet Finance Settings Fraud Star Wars Motion Sickness Google Drive Printing Enterprise Content Management Bookmarks Corporate Profile Outlook Users Dark Web Nanotechnology IT Budget Asset Tracking Tech Terms Licensing Web Server Cyberattacks Solid State Drive Statistics Customer Service Windows 7 Cyber Monday Motherboard Office Tips Tracking MSP Human Error Lenovo Notifications Mobile Office Domains Hard Drives Public Speaking Presentation CrashOverride Lithium-ion battery Wireless Technology 5G Printers Emergency Safety Marketing Hiring/Firing Regulation Competition Fun IP Address Miscellaneous