{"id":73423,"date":"2014-11-06T13:08:08","date_gmt":"2014-11-06T18:08:08","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-24T16:34:57","modified_gmt":"2021-08-24T20:34:57","slug":"email-etiquette-is-good-for-you","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/email-etiquette-is-good-for-you\/","title":{"rendered":"Email Etiquette is Good For You"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20150527203355\/http:\/\/blogs.villagevoice.com:80\/runninscared\/2011\/03\/righties_like_t.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106816 size-medium\" title=\"Email Etiquette is Good For You\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman-raising-hand.jpg?resize=101%2C150&#038;ssl=1\" alt=\"Email Etiquette is Good For You\" width=\"101\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman-raising-hand.jpg?resize=101%2C150&amp;ssl=1 101w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman-raising-hand.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman-raising-hand.jpg?w=256&amp;ssl=1 256w\" sizes=\"auto, (max-width: 101px) 100vw, 101px\" \/><\/a>Who remembers when <strong>email<\/strong> was a new and exciting technology that the Intertubes brought us? Did <a title=\"AOL\" href=\"http:\/\/www.aol.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">AOL\u2019s<\/a> <a title=\"You've Got Mail\" href=\"http:\/\/youtu.be\/dudJjUU9Nhs\" target=\"_blank\" rel=\"noopener noreferrer\">You\u2019ve Got Mail!<\/a> Make you giddy? They made a <a title=\"You've Got Mail\" href=\"http:\/\/www.imdb.com\/title\/tt0128853\/\" target=\"_blank\" rel=\"noopener noreferrer\">whole chick-flick<\/a> about it starring <a title=\"Tom Hanks\" href=\"http:\/\/www.imdb.com\/name\/nm0000158\/?ref_=tt_ov_st\" target=\"_blank\" rel=\"noopener noreferrer\">Tom Hanks<\/a> and <a title=\"Meg Ryan\" href=\"http:\/\/www.imdb.com\/name\/nm0000212\/?ref_=tt_ov_st\" target=\"_blank\" rel=\"noopener noreferrer\">Meg Ryan<\/a>. I am pretty sure that thrill has worn off by now. According to marketing researchers, the <a title=\" Radicati Group\" href=\"https:\/\/www.radicati.com\" target=\"_blank\" rel=\"noopener noreferrer\">Radicati Group<\/a> <a title=\"Email Statistics Report , 20 1 1 - 2015\" href=\"http:\/\/www.radicati.com\/wp\/wp-content\/uploads\/2011\/05\/Email-Statistics-Report-2011-2015-Executive-Summary.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">predicts<\/a> that by 2015 the average email user will send or receive <strong>125 emails a day.\u00a0<\/strong>Many of the emails are loaded with threats as I have pointed out here again and again. The ubiquity of email has caused some users to take email for granted and let their guard down.<\/p>\n<p><a href=\"https:\/\/maeeastblog.wordpress.com\/tag\/complaints\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106818\" title=\"2015 the average email user will send or receive 125 emails a day\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_overload.jpg?resize=135%2C100&#038;ssl=1\" alt=\"2015 the average email user will send or receive 125 emails a day\" width=\"135\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_overload.jpg?resize=150%2C111&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_overload.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_overload.jpg?w=325&amp;ssl=1 325w\" sizes=\"auto, (max-width: 135px) 100vw, 135px\" \/><\/a>Relaxed vigilance has led to some high-profile incidents where <strong>sensitive business information was exposed via email<\/strong>. <a href=\"http:\/\/www.itweb.co.za\/index.php?option=com_content&amp;view=article&amp;id=134998\" target=\"_blank\" rel=\"noopener noreferrer\">Research<\/a> indicates that at least 22% of companies have experienced an accidental or malicious leak of sensitive or confidential information by employees through email in the past 12 months. While it is may be bad for the firm, it could cost you your job. Here are some tips which will make your emails more effective and more secure:<\/p>\n<h3>Treat emails like business letters<\/h3>\n<p>It\u2019s better to be more formal than too casual when you want to make a good impression. For example, use a person\u2019s surname until they respond by signing their email with their first name. Never write anything in an email message that you wouldn\u2019t want both your boss and your mom to read!<\/p>\n<h3>Company email is never private<\/h3>\n<p>If you want to <a href=\"http:\/\/about.usps.com\/news\/state-releases\/co\/2010\/co_2010_0405.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106820\" title=\"Treat emails like business letters\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mrzip.jpg?resize=68%2C100&#038;ssl=1\" alt=\"Treat emails like business letters\" width=\"68\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mrzip.jpg?resize=102%2C150&amp;ssl=1 102w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mrzip.jpg?resize=51%2C75&amp;ssl=1 51w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mrzip.jpg?w=139&amp;ssl=1 139w\" sizes=\"auto, (max-width: 68px) 100vw, 68px\" \/><\/a>send someone confidential or time-sensitive information, use the phone or meet in person. Emails can be duplicated, forwarded, and printed; anything unfortunate you write could come back to haunt you or your employer. Never use your employer&#8217;s email system to look for your new job. That move could cost your current job and the next one too.<\/p>\n<h3>Be cautious about the \u201creply all\u201d feature<\/h3>\n<p>If you receive an email that was sent to a multitude of people, including yourself, reply only to those who need a response. Hit \u201creply all\u201d only if it is crucial that every person on the distribution list see your response. In many cases, the sender is the only person who requires a response. Misuse of \u201creply all\u201d is a key way in which sensitive business data slips outside the network.<\/p>\n<h3>Take care with email attachments<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106822\" title=\"Never open attachments from unknown sources\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_virus.jpg?resize=86%2C100&#038;ssl=1\" alt=\"Never open attachments from unknown sources\" width=\"86\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_virus.jpg?resize=130%2C150&amp;ssl=1 130w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_virus.jpg?resize=65%2C75&amp;ssl=1 65w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_virus.jpg?w=318&amp;ssl=1 318w\" sizes=\"auto, (max-width: 86px) 100vw, 86px\" \/>Never open attachments from unknown sources. And before sending attachments yourself, find out if the recipient wants them. Bogus attachments remain one of the most popular ways for cyber-attackers to gain a foothold in business networks, and it\u2019s very easy for hackers to imitate legitimate email addresses.<\/p>\n<p>This infographic includes some pretty amazing stats about email. Did you know?<\/p>\n<ul>\n<li>The average user creates 5,000 email attachments every year?<\/li>\n<li>There are 6 copies of each attachment made?<\/li>\n<li>The government reads over 250 million emails annually?<\/li>\n<\/ul>\n<p>That is why email etiquette is important.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20141217032224\/https:\/\/www.intralinks.com\/doctrackr\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-106824\" title=\"Data Running Wild Infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_data-running-wild.jpg?resize=400%2C2885&#038;ssl=1\" alt=\"Data Running Wild Infographic\" width=\"400\" height=\"2885\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_data-running-wild.jpg?w=142&amp;ssl=1 142w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/infog_data-running-wild.jpg?resize=21%2C150&amp;ssl=1 21w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20160428111649\/https:\/\/www.allstate.com\/tools-and-resources\/identity-restoration\/what-is-phishing.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">What Is Phishing?<\/a> (allstate.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email etiquette is important users send &#8211; receive 125 emails \/day many are loaded with threats like employers or the government.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,325,1795,849,171,2289,2288,2290],"class_list":["post-73423","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-aol","tag-breach","tag-data","tag-email","tag-meg-ryan","tag-tom-hanks","tag-youve-got-mail"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=73423"}],"version-history":[{"count":7,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73423\/revisions"}],"predecessor-version":[{"id":131349,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73423\/revisions\/131349"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=73423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=73423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=73423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}