Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: How to Automate Sorting Your Emails

Tip of the Week: How to Automate Sorting Your Emails

Emails are a wonderfully useful solution, and quite possibly one of the most commonly used ones in the workplace today. However, not everyone is using every capability that their email solutions offer - and it has led to a lot of time being wasted in the workplace. For this week’s tip, we’ll review how to help cut back on the time spent organizing your emails.

Adobe releases an Email Usage Study each year, and in July 2019, their study returned some striking results. According to the responses they received, adults spend about five hours per day checking their email. This is generally split up between their personal accounts - with two hours spent - and their work accounts - which are used for three.

While this survey only collected responses from a total of 1002 people, making it less statistically significant than would be ideal, it still reveals some telling trends...namely, how exactly people are spending their time - more specifically, 21 percent of the entire day. For reference, the recommended period of sleep that we are supposed to receive is 30 percent.

That’s a pretty significant chunk of time spent checking email. Fortunately, email platforms are now equipped with features that help users sort through their messages.

Organization Using Filters and Rules

It isn’t unheard of for an email inbox to suddenly contain emails that number in the hundreds or even thousands, which makes the thought of finding one specific email daunting. However, email clients enable you to sort through all the mess.

Gmail

Google’s email client provides users with a few different ways to sort their emails. For starters, a user can have their emails automatically split within their inbox into any of five distinct, set categorizes:

  • Primary
  • Social
  • Promotions
  • Updates
  • Forums

While these categories can’t be edited or added upon, you don’t necessarily have to use all of them. Under Settings, navigate to the Inbox tab, and select the Default Inbox type. You can select which ones you want to use under Categories, and once you Save Changes, your emails should start to sort themselves into these categories.

You can also set up Labels and Filters in Gmail to assist you in organizing your emails. Each incoming email is compared to the criteria dictated by the filter, and if it matches, you can have a particular label applied - or any of various other actions.

Keep in mind that new filters won’t be applied to the emails already in your inbox unless you specifically instruct Gmail to do so when creating them.

To create a filter, access your Settings, and go to the Filters and Blocked Addresses tab. Click Create a new filter, and you will be presented with the many rules your filter could follow. You also have the option to base a filter upon a message you have already gotten. Once you are satisfied, click Continue to then specify what you want done with the messages that match the filter’s criteria. You can even create a new label to apply to matching messages by selecting Apply the label.

This will sort your messages out in the sidebar menu, allowing you to view specific sets of messages rather than one continuing mass. While this process can take some time, it will help save a lot of time later on.

Outlook

Outlook allows you to create Categories and Rules to sort your emails among them. In Settings, under General, you have the ability to edit the Categories that your emails are sorted amongst. As these categories are assigned a color by default, it is likely most helpful to delete them and replace them with ones that do what you need them to do.

To create your Rules, you will again need to access your Settings, this time navigating to Mail. You should see the option to set Rules, and once accessed, the opportunity to Add new rule. From there, you can give your rule a name that makes it clear what it does, as well as Add a condition that will activate the rule. Then Add an action (or even a few) to direct Outlook in how this message should be handled. You can even add exceptions, so if you want any emails marked URGENT to be filed a certain way - but one of your coworkers tends to label EVERYTHING they send as such - you can have Outlook skip this rule if an email is coming from them.

When all is said and done, email can be an extremely useful collaboration tool - but it can just as easily become a distracting mess if it isn’t handled properly. Creating these rules and conditions can help you keep them more organized… allowing you to be more productive.

Are there any other common processes that you’d like some tips to using? Let us know in the comments!

VoIP Gets You Where You Need to Go
Disaster Recovery: RPO & RTO
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email Network Security IT Services Data Privacy Data Backup Malware Internet Hackers Software Outsourced IT Productivity Innovation Managed IT Services Computer Microsoft Data Recovery Business IT Support Hardware IT Support Efficiency Ransomware Mobile Devices User Tips Tech Term Google Upgrade Business Continuity Backup Small Business Cloud Computing Internet of Things Communication Windows 10 Phishing Collaboration Managed Service Provider Cybersecurity Managed IT Services Paperless Office Remote Monitoring Disaster Recovery VoIP Business Management Smartphone Workplace Tips Android Smartphones Encryption Managed IT Managed Service Save Money Artificial Intelligence Social Media Data Management Windows 10 Windows communications Browser Server Mobile Device Office 365 Facebook Saving Money BDR Help Desk Risk Management BYOD Passwords Password Automation Mobile Device Management Business Technology Wi-Fi Apps Miscellaneous Holiday Government Quick Tips App Document Management Big Data Network Employer-Employee Relationship Recovery Analytics Virtualization Chrome Firewall Training Avoiding Downtime Bandwidth Compliance Robot Laptops Bring Your Own Device Applications Gmail Going Green Vendor Management Unified Threat Management Healthcare Microsoft Office Infrastructure Data loss Vulnerability Blockchain Information Hosted Solution Apple Website Processor Windows 7 File Sharing Money IT Management Data storage Telephone Systems Content Filtering SaaS Redundancy Tip of the week Scam Wireless Antivirus Project Management Work/Life Balance Storage VPN Unified Communications Remote Computing Users Customer Relationship Management Settings Data Security Downtime Access Control Customer Service Social Machine Learning Mobility Virtual Reality Tablet RMM Computing Files Regulations Office IT Service Information Technology Operating System Router Printing Two-factor Authentication Politics Computers Gadgets Digital Payment Remote Monitoring and Management Outlook Maintenance Management Mouse Smart Technology Networking Net Neutrality Patch Management Websites Identity Theft Google Drive Licensing How To Samsung Remote Workers Spam File Management Virtual Private Network Chromebook WiFi Network Management Internet Exlporer Flexibility Hard Drive YouTube Business Growth IoT HIPAA Assessment Server Management Mobile Computing Cooperation How To Administration Mobile Security OneDrive Hacker Solid State Drive Upgrades Monitoring LiFi Uninterrupted Power Supply Employees Education Consultation Wireless Technology Legal Twitter Professional Services Current Events Company Culture IT solutions Recycling Utility Computing Word Search Display Dark Web End of Support Health Proactive Sports Budget Private Cloud Bitcoin The Internet of Things Software as a Service Tech Support Monitors Alert Employee-Employer Relationship Electronic Medical Records Social Engineering USB Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Solid State Drives Technology Assurance Group ’s 18 Wires Human Error Time Management Return on Investment Windows 8 Save Time Cybercrime Mobile Data Cost Management E-Commerce WannaCry Teamwork Technology Tips Chatbots Database Management Identities Microsoft Excel Modem Sync Connectivity Hacking Database Sensors Multi-Factor Security Wearable Technology Telephony Vulnerabilities Authentication Annual Convention Public Cloud Safety WPA3 Financial Servers Data Breach Notes Printer Alerts Law Enforcement Dark Data Personal Information Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Permission Active Directory Travel Features Shared resources Google Wallet Comparison Identity Botnet GDPR Hard Drives Google Docs Cookies Mobile Device Managment Software Tips Notifications Disaster Trending Voice over Internet Protocol Payment Cards Google Calendar Geography Authorization Managed IT Service San Diego Automobile Computer Care Black Market Fleet Tracking Procurement Technology Laws PowerPoint Value of Managed Services Humor Gadget Mobile Favorites Mail Merge 5G Writing Emoji Test Touchscreen Techology Windows Server Backups Cache Electronic Health Records VoIP Sponsor Drones Specifications Lenovo Permissions Nanotechnology Star Wars Deep Learning Telephone Legislation IT Technicians GPS Network Congestion High-Speed Internet Break Fix Social Networking Asset Tracking Statistics Managed Services SharePoint Staff Computer Repair Conferencing Virtual Desktop Address Wireless Internet Retail Cortana MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Physical Security Cyberattacks Digital Obstacle Manufacturing Alt Codes Black Friday Roanoke — Central Technology Solutions Supercomputer Superfish Cryptocurrency Fraud Screen Reader G Suite History 3D Printing Consulting Transportation Mobile VoIP Mirgation Tracking Development Zero-Day Threat Employer/Employee Relationships Motherboard Google Maps Processors OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Managing Stress Instant Messaging IT Budget Tech Terms Proactive IT Remote Worker Batteries Hacks User Error Language Office Tips eWaste Read Only Spyware Course Hard Disk Drives Typing Cyber Monday technology services provider Marketing Backup and Disaster Recovery Projects Smart Tech Cabling Unsupported Software Virus Managed Services Provider Shortcut Best Practice Cyber security Migration Update Cables Proactive Maintenance Data Warehousing Buisness Wasting Time Smart Devices Operations Enterprise Content Management Finance Firefox Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant