The ability to store contacts is one of the most important features of e-mail services like Microsoft Outlook. An extensive address book helps you to contact friends, business partners, or employees at any time without having all mail addresses in your head. To prevent the loss of useful contact information, you should export your Outlook contacts regularly. With this kind of backup, you can also...
A tidy mailbox is the basis of professional e-mail communication. With Outlook “Rules and Alerts” you keep track and ensure that important requests are processed promptly. We will explain how to set up the appropriate automatic rules using illustrated step-by-step instructions.
Carbon copy (CC) allows transparency in communication. A CC address field can be found in any email program. Recipients you enter in the CC field will receive messages as a copy for their information, allowing them to stay in the loop. The feature is not suitable for advertising emails, newsletters or public circulars. We explain why this is the case.
The BCC feature found in your email program allows you to send blind carbon copies of your messages to anonymous third parties. Although it may sound unethical and can be seen by some conversation partners as a breach of trust, the inclusion of BCC recipients is useful and justified in exceptional circumstances. We explain when this is the case.
Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by encrypting the transmission and content of emails can you ensure that your data is secure while being sent. Otherwise, unauthorized persons can read your email traffic easily and possibly gain access to sensitive data such as passwords and bank information. We’ll show you the best protection...
An update for the mail server: Microsoft has made important improvements to their popular software with Exchange 2019. The focus is now on higher security and improved performance. At the same time, a prominent feature of the previous version has been eliminated. Is it worth switching to the new version?
Microsoft Exchange Server is considered the standard solution for business e-mail traffic and computer-supported collaborative work. The software has many different usage models of available and these require purchasing special licenses. We’ll show you the licensing model here and give you an overview of the different functions of the collaborative software.
StartTLS initiates encryption of an e-mail based on the TLS protocol. For this purpose, the server is pinged without encryption first of all, and StartTLS support is requested. The encryption method can be used when the answer is positive. StartTLS is handy, as e-mails are encrypted automatically once the method has been accepted. You don't need to contact a dedicated port, StartTLS can simply be...
Large-scale hacker attacks constantly make their way into the news, which then causes panic among users. Hackers exploit e-mail addresses and passwords by using them for criminal purposes. Victims often don’t even realize that their data has been stolen. We introduce four tools to help you check whether your e-mail has been hacked.
Office 365 is more than just the successor of Microsoft Office 2013. The Office 365 plans and subscription that you choose should be carefully thought-out; for an overview, read the first part of our Office series. This second part examines the SME plans: Office 365 Business, Office 365 Business Essentials, and Office 365 Business Premium, to help small and medium-sized enterprises decide on the...
IONOS E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.