Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Simplifying Your Email with Consolidation

Tip of the Week: Simplifying Your Email with Consolidation

How many email accounts do you have? Out of those, how many do you check regularly, and how many different platforms are they on? Too many, and you’re apt to miss something important. That’s why we’re going over how to ensure that your emails are well-organized and accessible from a single source.

One Account, Two Accounts, Three Accounts, Four…
Based on your work responsibilities and how your office is structured, it is quite possible that you need regular access to multiple email accounts. You could have one you use internally, one for communicating with clients, one to reach out to vendors, one to use to sign up for resources… you get the point. When all is said and done, that’s a lot of email messages.

However, you presumably have other work responsibilities beyond just checking your email, so switching between all of them just isn’t a practical option. Well, it just so happens that you won’t need to switch, as the email client you choose will be able to consolidate these multiple accounts for you. Before we get into how, we need to make sure that we’re speaking the same language here.

- An email account is the individual address used to send or receive a message. In your organization, you might have employee1@yourbusiness.com and employee2@yourbusiness.com. Likewise, each employee may have a different account for their different responsibilities - for instance, employee1vendor@yourbusiness.com and employee1internal@yourbusiness.com.

- An email client is the program that allows you to send and receive emails. Gmail and Microsoft Outlook are two perfect examples. If you have multiple clients stored on the same server, they can be used pretty much interchangeably, each client presenting all emails. An email client also has a few features that enable you to better keep track of multiple email accounts, provided you have set it up to do so.

Let’s go over your options now.

Multiple Inboxes
The people who developed the email clients that we use weren’t naive. They understood that a given user isn’t going to be tied down to a single email provider, and certainly not a single account. This is why email clients can support multiple inboxes, assuming they are configured correctly. Multiple inboxes allow a user to access a single client to manage multiple email accounts, streamlining the process greatly and enabling customized organization.

Multiple Email Personalities
On the other hand, some users don’t mind leveraging one inbox, but might still need to utilize more than one address in their correspondence. There is also a method that enables the use of a single, catch-all inbox, but enables the user to select which email address (in this case, known as personalities) their response is sent from.

To do so, you will first need to set up an email account that you do not give out, as it will serve as the catch-all address that all of your emails ultimately accumulate within. Once it has been set up, you need to set all of your other accounts to forward their contents to that mailbox - your internal IT resource should be able to help.

Once your messages are all being sent to the catch-all account, you will be able to respond to these emails from the address that they were originally sent to.

Setting Up Inboxes and Personalities
In order to accomplish either of these tasks for your client of choice, you will need to adjust a few settings.

Gmail
To add another account to your Gmail client, you’ll need to access your Settings, which means you have to click on the gear icon. Once you’re in your Settings, you should see a tab labeled Accounts and Import. Under that tab, there is a Check mail from other accounts section. Click on Add a mail account, and follow the instructions provided.

To add additional personalities to your Gmail account, you’ll need to again navigate to the Accounts and Import tab. There, you will find a section labeled Send Mail As, with the option to Add another email address. This will also allow you to choose your default email address.

Outlook
As it happens, there are too many different versions of Microsoft Outlook and too many variables to allow us to provide a walk-through. Fortunately, Microsoft does offer some documentation that instructs users how to manage their "connected accounts.” Of course, you can also call 866-348-2602 for our assistance, as well.

Are there any solutions that you frequently use that you’d like some extra tips for? Tell us which ones in the comments section, and don’t forget to subscribe!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Phishing Windows Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Chrome Virtualization Gadgets Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime Networking IT Support Hacking Internet of Things Wi-Fi BYOD Health Mobile Device Management Covid-19 Spam Managed Service Provider Office 365 Telephone Systems Information Technology Remote Alert Information Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Encryption Data Breach Remote Monitoring Applications Big Data Law Enforcement App History Mobile Computing Application Human Resources Password Money Mobile Office Government Office Tips Training How To Blockchain Private Cloud Paperless Office VPN Managed IT Data Storage Patch Management Apps Remote Computing Mouse HaaS Servers Google Drive Data Security Avoiding Downtime Wireless Flexibility Marketing Gmail WiFi IT solutions Entertainment Settings Website Bring Your Own Device Data Management Budget Work/Life Balance Infrastructure Voice over Internet Protocol Two-factor Authentication Vulnerability Windows 7 Word End of Support Social Physical Security Education User Error Safety Employee/Employer Relationship Data Protection Vendor Management HIPAA Meetings Sports RMM Redundancy Keyboard Risk Management Hacker The Internet of Things Lithium-ion battery Software as a Service Telephone System Staff Save Time Machine Learning Connectivity Remote Work Firewall Cleaning USB Conferencing Vendor Virtual Reality Managed Services Scam Apple Display Fraud Network Congestion Shadow IT Humor IT Management Processor Legal eWaste Botnet Remote Worker Internet Exlporer IT Plan Cryptocurrency Hard Drive PDF Unsupported Software Wearable Technology Comparison Retail Hard Drives Computing Charger Proactive IT Instant Messaging Robot Excel Compliance CES Computer Care Best Practice OneNote Current Events YouTube Biometrics Black Market Virtual Desktop Telephony Virus Business Technology Content Management Samsung Access Control Digital Signage Unified Threat Management Computer Accessories Virtual Assistant DDoS Value Document Management Authentication Solid State Drive SharePoint Wireless Technology Downtime Spam Blocking Procurement Electronic Medical Records How to Net Neutrality Workplace Strategy Data storage Update Customer Service Printer Hiring/Firing Help Desk Printing Automobile Bluetooth Environment Google Docs Fax Server Computing Infrastructure Identity Theft Managed Services Provider Going Green SaaS Database IT Consultant Business Intelligence Audit Augmented Reality Remote Workers Worker Battery IT Assessment Public Computer Audiobook Twitter Manufacturing Bloatware Email Best Practices Search Engine Regulations NIST Transportation Business Mangement Touchpad Security Cameras Trending Tablets Computer Tips Computer Fan Managed IT Service Rootkit Smart Tech OneDrive Politics Addiction Biometric Security Advertising Amazon Entrepreneur Virtual CIO Consultant Peripheral Workers Benefits Recycling Practices Shortcut Notifications Digital Security Cameras Analytics FENG Wiring Using Data Copiers IBM Cache 5G Amazon Web Services Cost Management Social Networking Best Available Flash Quick Tip Safe Mode Smart Technology Criminal Hosted Computing Smartwatch Relocation WIndows 7 Ergonomics GDPR Software Tips Development Supercomputer Wireless Internet OLED Online Shopping Sync PCI DSS Emails File Sharing Virtual Machine Video Games Running Cable Worker Commute Inventory Employee Specifications Memory 2FA Camera Fiber Optics Messaging Experience Wire Cabling Evernote Travel Policy Netflix Hypervisor Two Factor Authentication Scalability Windows Media Player Business Owner Millennials User Dark mode PowerPoint Root Cause Analysis Printers Trend Micro HBO SMS Knowledge Smart Office Default App Music Wireless Charging NarrowBand Skype Science Procedure Saving Time Search Google Search iPhone Workforce Managing Stress dark theme Data loss Virtual Private Network Shopping Outlook AI Leadership IT Infrastructure Troubleshooting Cables Distributed Denial of Service Customer Relationship Management Start Menu FinTech Cameras Bing Loyalty Nanotechnology Files Telecommuting Analyitcs Screen Mirroring Project Management Social Network Programming Frequently Asked Questions Investment Books Cortana Chromecast Mobile Employees Windows 10s Employee/Employer Relationships Digital Signature ISP Colocation Uninterrupted Power Supply Windows 365 Cast Warranty Tip of the week Video Conferencing webinar HVAC ROI Emergency Google Apps Antivirus Shortcuts Monitor Professional Services Windows 8 Sales Printer Server Public Cloud Bitcoin Employer Employee Relationship Analysis Personal Assessment Devices Cryptomining IT service Point of Sale Administrator Windows Server 2008 Supply Chain Management Enterprise Content Management Reputation Streaming Media Tools Tablet Monitoring MSP Batteries Accountants Digitize Television Content Thought Leadership Credit Cards Domains Tech Support Windows 8.1 Microchip Password Management Windows Server 2008 R2 Techology Password Manager Laptop IaaS Customers Multi-Factor Security Maintenance Customer relationships

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code