Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: How to Consolidate Your Email Management

Tip of the Week: How to Consolidate Your Email Management

Quick question for you: how many email accounts do you have? How many do you have to regularly check? How many different platforms do they utilize? If there’s too many, important communications are easy to miss in the ensuing mess of messages. Fortunately, there are a few ways that this can be avoided, which we’ll review for this week’s tip.

How Many Emails Do You Need?
Depending on your office’s organization style, there may be a fair chance that you have to juggle multiple email addresses. You may have one that you use internally, one that’s client-facing, and one to interact with your vendors. However, we do have to address how many messages this could wind up being. You and your team are responsible for more than just checking emails, after all, so you don’t have the time to log into each email account you have in order to do so.

Fortunately, your email platform of choice will have the capability to handle each of these emails from each provider. First, we need to set some terminology straight:

Understanding Email
When we refer to an email account, we’re talking about the individual address used. For instance, if your organization has a branded email address, “” and “” are two different accounts.

An email client, on the other hand, it the program that you choose to use to read your emails, like Microsoft Outlook or Gmail. If these clients are stored on a single server, you can use them more or less interchangeably, as all of your emails will appear in each client.

However, this doesn’t help you if you have too many accounts to keep track of… at least, not without exercising the capabilities of your chosen email client.

Utilizing Multiple Inboxes
Those responsible for developing these email clients understand that there are assorted reasons that a user isn’t going to be tied to a single email account or provider. As a result, email clients are now designed to support multiple inboxes. This means that, if properly configured, a user can access one email client and check multiple email accounts, dividing them into folders (or combined into one large group, if so desired).

Utilizing Multiple Personalities in a Central Inbox
Alternatively, if you don’t mind the idea of using a single inbox to hold all of your correspondence but still want to respond with multiple addresses, you can use a different method. This method will collect all of your messages into a single inbox, while allowing you to select which email address (sometimes known as a personality) your response comes from.

First, you will need to set up an email with an address that you never give out. This mailbox will be the central catch-all. Then, you need to set all of the accounts you have in use to forward to that mailbox (ask your internal IT resource for help). Pretty simple so far, right?

However, you still aren’t quite done. After all, you want to be able to respond to these emails with the address that they were originally sent to, right? This is where the personalities we mentioned above come into play. Basically, your email client allows you to change the address that appears in the From: box to whichever email address is appropriate for that correspondence.

Adding Inboxes and Personalities to Your Email Client
Of course, each email client has a somewhat different approach to adjusting these settings:

To set up multiple accounts in Gmail, click on the gear to access your Settings, then select the Accounts and Import tab. To add inboxes to your Gmail, you should see a section labeled Check mail from other accounts. In that section, follow the prompts given after you click Add a mail account.

To add new personalities to your Gmail account, follow the same steps to the Accounts and Import tab. Under the Send Mail As section, follow the instructions provided when you click Add another email address. You can also select this email address as the default selection from here.

Unfortunately, we don’t have the information required to provide a walk-through for setting up Microsoft Outlook, as there are too many versions to cover here. Make sure you check the documentation provided online for what Microsoft describes as “connected accounts.” Of course, we are always available to help, so feel free to give us a call at 1-844-237-4300.

What other tips would you like to learn for your most-used solutions? Let us know in the comments, and make sure to subscribe so you don’t miss anything!

Google Knows Where You Are: Here’s How to Stop The...
Why Multitasking Doesn’t Work (and What to Do Inst...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers Internet IT Services Network Security Productivity Software Productivity Managed IT Services Outsourced IT Data Data Backup IT Support Business Mobile Devices Innovation Tech Term Ransomware Computer Data Recovery Microsoft Hardware Cloud Computing Small Business Google Backup Internet of Things Smartphone Managed Service Provider Efficiency Business Continuity Data Management Windows 10 Remote Monitoring Smartphones Android Paperless Office User Tips Disaster Recovery Social Media IT Support Managed IT Upgrade Browser Communication Encryption Artificial Intelligence Business Management VoIP Collaboration Phishing Windows Facebook Save Money BYOD Workplace Tips Windows 10 Cybersecurity App Mobile Device Management Mobile Device Risk Management Holiday Document Management Unified Threat Management Apps Bring Your Own Device Passwords Gmail Applications Server Vendor Management Managed IT Services Recovery communications BDR Network Employer-Employee Relationship Office 365 Saving Money Wi-Fi Firewall Bandwidth Government Robot Money Telephone Systems SaaS Data storage Content Filtering Going Green IT Management Wireless Automation Tip of the week Healthcare Password Big Data Virtualization Scam Antivirus Project Management Chrome Infrastructure Information Hosted Solution Vulnerability Compliance Website Miscellaneous Politics Regulations Work/Life Balance Computing Office IT Service Microsoft Office Computers Storage Printing Training Router Two-factor Authentication Quick Tips Analytics Remote Computing File Sharing Unified Communications Tablet Help Desk Customer Service Customer Relationship Management Files Apple Managed Service Data Security Blockchain Social Data loss Virtual Reality Education Tech Support Wireless Technology Legal Server Management Mobile Security LiFi How To Employees IT solutions Digital Payment Uninterrupted Power Supply Company Culture End of Support Health Websites Identity Theft Budget Licensing Monitors Sports Alert Word Electronic Medical Records Information Technology Operating System Redundancy Mouse The Internet of Things Outlook Software as a Service How To Samsung Remote Monitoring and Management Machine Learning Mobility Google Drive Maintenance Management Smart Technology Chromebook Settings Flexibility VPN Users Remote Workers Spam Patch Management Avoiding Downtime Business Growth WiFi YouTube Internet Exlporer Downtime Mobile Computing Virtual Private Network Network Management IoT Upgrades HIPAA Hacker Administration Private Cloud Twitter Access Control Assessment Business Technology Test Retail Cortana Technology Laws Cache Electronic Health Records Cabling Physical Security Current Events Mail Merge Specifications Alt Codes Touchscreen Techology Permissions Nanotechnology Star Wars Monitoring 3D Printing VoIP Sponsor Legislation IT Technicians Virtual Assistant High-Speed Internet Virtual Desktop Display Social Networking Asset Tracking Processors Cryptocurrency SharePoint Staff Remote Worker Conferencing Point of Sale Consultation Lenovo Break Fix MSP RMM Statistics Unified Threat Management Hotspot Recycling Cyberattacks Office Tips Address Black Friday Roanoke — Central Technology Solutions Update Typing Disaster Resistance Fraud Screen Reader Utility Computing Consulting Sync Unsupported Software Virus Hacks Digital Obstacle Mirgation Wasting Time Development Zero-Day Threat Telephony Dark Web Motherboard OneNote Public Cloud Bitcoin Search Downloads Augmented Reality ROI Managing Stress Instant Messaging Law Enforcement Best Practice Superfish Marketing Proactive Tech Terms Botnet Social Engineering USB Bluetooth User Error Language eWaste Read Only Travel Cyber Monday technology services provider Proactive IT Smart Tech Buisness Managed Services Provider Mobile Device Managment Software Tips Mobile Data Spyware Course Migration Gadgets Cables Backup and Disaster Recovery Data Warehousing Employee-Employer Relationship Automobile Computer Care Windows 8 Save Time Shortcut Operations Notes Enterprise Content Management Finance Gadget Theft Safety Identities Computing Infrastructure Dark Data Personal Information Firefox Technology Assurance Group ’s 18 GPS Heating/Cooling IT Consulting Net Neutrality Cost Management E-Commerce Technology Tips Chatbots Wires Human Error Time Management Networking Microsoft Excel Modem Connectivity Notifications WannaCry Multi-Factor Security Wearable Technology PowerPoint Vulnerabilities Authentication Google Wallet WPA3 Financial Supercomputer Black Market Hard Drives Google Docs Hacking Printer Alerts Enterprise Resource Planning Bookmarks Crowdsourcing Meetings Distributed Denial of Service Annual Convention Permission Tracking Writing Emoji Servers Data Breach Hard Drive Features G Suite History Humor Comparison Identity Drones Cookies Google Maps Backups Google Calendar Professional Services Geography Authorization Taxes Network Congestion Fleet Tracking Procurement IT Budget Solid State Drive Disaster Trending Cooperation Security Cameras Mobile Favorites Computer Repair Deep Learning Managed IT Service San Diego Regulation IT Consultant Error Cybercrime Web Server Hard Disk Drive Cameras Printers Motion Sickness Administrator CCTV Relocation Emergency CrashOverride Webcam