Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at 1-844-237-4300.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

Google Knows Where You Are: Here’s How to Stop The...
Why Multitasking Doesn’t Work (and What to Do Inst...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Productivity Internet Network Security Data Productivity Data Backup Software Outsourced IT Managed IT Services Business IT Support Innovation Mobile Devices Data Recovery Tech Term Ransomware Computer Hardware Microsoft Google Backup Cloud Computing Small Business Efficiency Internet of Things Business Continuity IT Support Managed Service Provider Upgrade Smartphone Business Management User Tips Disaster Recovery Remote Monitoring Android VoIP Encryption Data Management Social Media Paperless Office Windows 10 Phishing Communication Smartphones Browser Workplace Tips Collaboration Managed IT Windows Artificial Intelligence Facebook BYOD Windows 10 Risk Management Managed IT Services Server Save Money communications Cybersecurity Mobile Device Saving Money Holiday Passwords Mobile Device Management App Network BDR Compliance Chrome Robot Applications Office 365 Bring Your Own Device Bandwidth Vendor Management Government Apps Unified Threat Management Document Management Automation Recovery Gmail Employer-Employee Relationship Analytics Firewall Wi-Fi Business Technology Big Data Money SaaS Data storage Telephone Systems Going Green IT Management Hosted Solution Healthcare Website Tip of the week Wireless Microsoft Office Quick Tips Scam Password Antivirus Project Management Virtualization Content Filtering Infrastructure Managed Service Information Vulnerability Social Training Virtual Reality Unified Communications File Sharing Miscellaneous Tablet Computing Regulations Office IT Service Files Computers Two-factor Authentication Printing Router Storage Politics Work/Life Balance VPN Remote Computing Settings Customer Relationship Management Help Desk Blockchain Data Security Apple Data loss Customer Service Assessment Hacker Mobile Security Server Management Upgrades Employees How To Mobility Wireless Technology Legal Twitter Company Culture Users Machine Learning Spam Uninterrupted Power Supply WiFi YouTube End of Support Health Downtime Budget Word Proactive Information Technology The Internet of Things Administration Monitors Software as a Service Redundancy Private Cloud Electronic Medical Records Operating System LiFi Alert Education Maintenance Mouse Management Smart Technology Outlook Tech Support Remote Monitoring and Management Net Neutrality IT solutions Digital Payment Remote Workers Google Drive How To Samsung Networking Patch Management Websites Identity Theft Business Growth Internet Exlporer Sports Licensing Chromebook Flexibility Avoiding Downtime IoT HIPAA Virtual Private Network Network Management Access Control Mobile Computing Drones Mobile Device Managment Writing Software Tips Emoji Cache Electronic Health Records Disaster Trending Specifications Backups Test Nanotechnology Automobile Network Congestion Computer Care Star Wars Monitoring Technology Laws Solid State Drive Legislation IT Technicians Gadget High-Speed Internet Mail Merge Deep Learning Wasting Time Permissions Computer Repair Asset Tracking Touchscreen Techology SharePoint Staff Conferencing VoIP Sponsor ROI Current Events Break Fix Social Networking Consultation Lenovo Alt Codes Unified Threat Management Hotspot Retail Cortana Recycling Cyberattacks Black Friday Roanoke — Central Technology Solutions GPS Physical Security MSP RMM Fraud Screen Reader Display Utility Computing Consulting Statistics Cryptocurrency Mirgation 3D Printing Development Zero-Day Threat Address Database Supercomputer OneNote Disaster Resistance Downloads Augmented Reality Crowdsourcing Meetings Processors Managing Stress Instant Messaging Digital Obstacle Notes Dark Web Motherboard Superfish Typing User Error Language G Suite History eWaste Read Only Search Hacks Cyber Monday technology services provider Office Tips Tracking Tech Terms Best Practice Voice over Internet Protocol Smart Tech Google Maps Update Managed Services Provider Bluetooth Bitcoin Migration Taxes Unsupported Software Virus Cables Backup and Disaster Recovery IT Budget Employee-Employer Relationship Proactive IT Operations Enterprise Content Management Finance Spyware Course PowerPoint Data Warehousing Computing Infrastructure Social Engineering Cabling USB Shortcut Technology Assurance Group ’s 18 Virtual Desktop Theft Windows 7 Cost Management E-Commerce Windows 8 Technology Tips Save Time Chatbots Mobile Data Wires Human Error Firefox Connectivity Heating/Cooling IT Consulting Identities Multi-Factor Security Wearable Technology Point of Sale Vulnerabilities Authentication Professional Services Microsoft Excel Modem Financial Time Management Printer Alerts Safety Enterprise Resource Planning Bookmarks WannaCry Security Cameras Distributed Denial of Service Annual Convention Dark Data Personal Information WPA3 Transportation Google Wallet Sync Hard Drive Features Hacking Comparison Identity Telephony Permission Marketing Public Cloud Servers Data Breach Hard Drives Google Calendar Google Docs Law Enforcement Notifications Geography Authorization Virtual Assistant Cookies Fleet Tracking Procurement Cooperation Buisness Travel Black Market Mobile Favorites Remote Worker Managed IT Service Humor San Diego Gadgets Botnet Students Regulation Cameras Motion Sickness Teamwork Administrator CCTV Relocation Shared resources Webcam Printers Hard Disk Drive IT Consultant Error Cybercrime Emergency Web Server CrashOverride