(Editor's note: These days, much of our communication takes place via email. At The Computing Center, our staff sees well over 1,000 emails each working day that are NOT deleted or quarantined by our spam filtration system. This is an excellent article regarding making your emails more compelling and read by those receiving them.)
Do your business emails get ignored, cause confusion, or get deleted before they’re ever opened? If your emails aren’t getting results, first be sure you aren’t falling prey to these bad email habits. Then ask yourself honestly if you’re making any of the following common email mistakes:
Instead of doing this:
Sending emails from unprofessional email addresses or unfamiliar usernames—If you’re using a free email domain and/or a made-up email “handle,” your emails risk being deleted. An email from firstname.lastname@example.org is likely to be perceived as spam.
Be professional—Save the free email domain for personal emails. For business, obtain your own company email domain and create email addresses incorporating your name and that domain (i.e., Sue.Smith@Smithandjones.com).
The reality of bring your own device (BYOD) is unavoidable. If your organization has yet to implement a BYOD strategy, you can take several steps to get started. But first, know that the question is no longer whether you will support mobile devices. Instead, it's how do we secure and manage these devices in a user-friendly way?
A Forbes Insights and Google survey of U.S. business executives found that by 2016 more than half of leaders expect to use mobile devices instead of PCs as their primary business platform. By 2020, HP estimates that each professional in the workplace will use more than six mobile devices.
A well-crafted BYOD strategy can facilitate increased employee productivity and engagement in an era of mobile-first behavior that has begun to blur the lines between work demands and personal usage. As you and your team develop the appropriate strategy for your organization, realize that there is no “one-size-fits-all” solution to this endeavor.
In the movies, hackers are easy to identify. The screen’s green glow reflects on their grizzled faces as they type furiously at their keyboards in the murky shadows. Of course, real-life hackers aren’t nearly so easy to spot. And they’re also likely not the biggest source of risk for your business.
The truth is that most security breaches—over 80 percent—are crimes of opportunity. The largest security threat many businesses face comes not from criminal masterminds, but their own employees. To help you keep your data and networks safe, we’ve compiled five common IT security mistakes, and what you can do to avoid them.