Showing items tagged with "email best practice" - 55 found.
Posted Wednesday September 7th, 2016, 6:24 pm by Dr Monica Seeley
Monica often writes replies to questions on Quora. Here replies are popular with some receiving over 3K views. Here are a few from the summer.
What is a legitimate use of BCC – in email? For sending an email to a group of people.
and a golden oldie from last summer.
How do I write a polite reminder to my boss? Start with a gentle reminder.
Posted Sunday April 26th, 2015, 3:52 pm by Dr Monica Seeley
Recently, I was asked, what makes a good email signature block. Here is my advice.
Email signature blocks should be as short as possible. An email signature block is not an advertising campaign. This is best left to either your website or an advertisement. The key point of an email signature block is to tell the recipient who you are and how to contact you.
Key information to include:
- Your name.
- Your organisation name and position (optional but useful).
- Short strap line (optional).
- Telephone number(s).
- Website address.
- All logos as they can be trapped as spam and enlarge the size of the email (making it slower to download if you are somewhere with limited connectivity). This includes the company logo, awards and social media logos.
- Long disclaimers. There has yet to be a legal case where either their presence or absence has been of consequence. Best practice is to add a line with a link to where the disclaimer can be found on your organisation’s website.
Some people include social media presence links which again in my opinion are optional because the signature block starts to become long. Sometimes with short emails the signature block takes up more lines than the email itself. How annoy in that? For people on mobile devices, all they want is the key information.
What is you opinion on email best practice and what should and should not be included in the email signature block.
Posted Wednesday October 15th, 2014, 9:17 pm by Dr Monica Seeley
According to recent research from Centrify (providers of identity management services) forgetting your password is more annoying than spam email.
The cost of cyber crime has doubled in the past four years according to recent research from Ponemon. Strong passwords is one way to prevent prying eyes but just how easy is it to construct one? Also is it good to keep changing your password?
Back in 2010 Microsoft found that changing security words often cost billions of pounds as people wasted time constructing and memorising them and then forgetting them and worse leaving them unsecured.
Centrify now estimate that poor password management costs around £130,500 per year for a business of about 500 users. How they arrive at that figure is not clear. What is clear is that we really are not good at the basics of identity management. The top five mistakes being:
1. Always use the same password whenever possible.
2. Rotate through a variety of similar passwords.
3. Keep a written password in a master book of passwords.
4. Use personal information in a password.
5. Avoid using complicated symbols or combining upper and lower case.
Security management behaviour can easily be improved although it often takes a cyber attack (personal or corporate) as a wake up call. User education is key to reducing cyber crime. Here are our five top tips.
1. Avoid the traps identified above.
2. Second, use strong passwords which are really very easy to construct and remember. Take a phrase and then build a password from the first letter of each word and turn some into capitals and numerics, for example make your ‘i’ and ‘1’ and add a couple of symbols.
4. Where you have a choice adopt devices which have more than just password protection for example finger and retina recognition.
5. Be vigilant about those emails which grab your attention telling you your accounts has been hacked. Delete them without even opening them as they are almost certainly from spammers attempting some form of identity theft.
Email is often the open backdoor for a cyber attack. For more about how we help our clients to reduce the risk of email cyber crime through email best practice contact us now.
Posted Wednesday July 2nd, 2014, 8:52 am by Dr Monica Seeley
Training is always the first item to be cut during an economic downturn. If Mesmo Consultancy’s order books (for email best practice training) are a barometer of the state of economy, then as others are experiencing there is a distinctive feel good factor in business. We have had our busiest six months since 2011. Working with organisations of all sizes and from all sectors we are still seeing considerable scope for ways to improve personal and business performance and productivity.
Here is our pick of the top five articles and blogs from the past few weeks on ways to improve personal and business performance from reducing email overload to proof reading apps.
Suffering from email and social media disruption, feeling you have no time to stand still? This is our top pick.
A cyber attack not only dents your reputation but can also absorbs valuable time and resources on the damage limitation exercise.
Sometimes reaching for a pen and paper is the quickest way to take notes. No waiting either for the technology to boot-up or hassle if it runs out of juice.
How long does it take to get back to real productive work after you stoop to peek at either email or social media post? Sufficient time to run five miles in Roger Banister style. To be precise 23 minutes according to research from Microsoft) The moral as we have said many times before – limit all those distractions and stay in the present for at least 2o minutes.
Many top executives have amazing speed reading skills. In today’s age of information overload speed reading is an essential survival skill for all of us regardless of our position in the organisational food chain.
Posted Saturday April 12th, 2014, 4:40 pm by Dr Monica Seeley
Here are our top five articles of note related to email best practice (from tackling email overload to email security).
- Cyber attacks fallout could cost the government economy $3 trillion by 2020. Opening a rogue email is the easy backdoor for a cyber criminal to plant a virus in your organisation’s IT systems. Be on you guard when you see a suspicious email.
- 10 things to help you bridge the IT- end user gap. It is often very easy for an IT professional to assume people know how to use new software and indeed even the seemingly most fool proof devices (such as ipads). The executive users however may not be starting from the same knowledge base. This article provides food for thought for both the end user and IT professionals.
- The women who created the technology industry. Did you realise that the first computer programmers and most celebrated mathematicians throughout history were women. Esther Gerston and Gloria Gordon were amongst them. See how many you guess correctly.
- Email statistics report for 2013 to 2017. So you thought email was dying. Think again. The latest Radicati report projects a 3% to 5% growth year on year.
What did we miss? What was you article of note from the last few weeks?