Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1



Similar documents
Introduction to the Cloud and Online

Introduction. All About Outlook Outlook 2010 Getting to Know Outlook Video: Getting to Know Outlook 2010

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Secure FAQs for External Stakeholders

STOP. THINK. CONNECT. Online Safety Quiz

A Guide to . For Beginners

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Internet basics 2.3 Protecting your computer

Protect yourself online

Using Google Docs in the classroom: Simple as ABC

Computer Basics 4 Basics

In the Cloud. Scoville Memorial Library February, 2013

U.S. Bank Secure Quick Start Guide

Computer Security Self-Test: Questions & Scenarios

INTRODUCTION TO & BASICS

Basic E- mail Skills. Google s Gmail.

Start to Finish: Set up a New Account or Use Your Own

Recognizing Spam. IT Computer Technical Support Newsletter

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Google Apps Migration

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate

Secure Client Guide

Basics. For more information on the Library and programs, visit BCPLS 08/10/2010 PEMA

Basics Webmail versus Internet Mail

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

October Is National Cyber Security Awareness Month!

Introduction to Webmail. Apache County Library District April 2011

How To Access Your Cpa.Com From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account

Create Web based E mail

Malware & Botnets. Botnets

How can I keep my account safe from hackers, scammers and spammers?

Protection from Fraud and Identity Theft

Security Fort Mac

Secure Recipient Guide


How to get started with Microsoft SkyDrive

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Module 1. Internet Basics. Participant s Guide

Amy wants to use her to view some photos her friend Sandy sent, from her vacation to Washington DC.

Google Drive lets you store and share all your stuff, including documents, videos, images and other files that are important to

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

WINDOWS LIVE MAIL FEATURES

Wayland Account Setup Instructions

Google Groups: What is Google Groups? About Google Groups and Google Contacts. Using, joining, creating, and sharing content with groups

F-Secure Internet Security 2012

Gmail setup for administrators

Securing Communications

Mail. Add or delete contacts. Chapter 3: Manage Contacts. Table of Contents

To learn more about social networking, see the handout titled Know Social Networking.

Cyber Security. Securing Your Mobile and Online Banking Transactions

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Changes to Skillnet Group s. Outlook and Outlook Express Users

Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date Version 1.2

GUIDEWIRE. Introduction to Using WebMail. macrobatix. Learn how to: august 2008

After you've enabled POP/IMAP access in i.mail, you need to configure your client to download i.mail messages.

Setting up a Personal Account

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Mailrelay The best marketing solution for your needs

USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER

INinbox Start-up Pack

Adjust Webmail Spam Settings

Using the City of Stamford / Stamford Public Schools. Web System

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

ESA FAQ. Self Administration Frequently Asked Questions

Cyber Security. Maintaining Your Identity on the Net

Frequently Asked Questions:

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Set internet safety parental controls with Windows

F-Secure Anti-Virus for Mac 2015

Outlook Web App McKinney ISD 5/27/2011

You can attach accounts to this domain name (eg. or which also increases your corporate branding.

How to Create and Send Newsletter Using G-Lock EasyMail

Tips For Job Seekers

Copyright 2011 Smart VA Ltd All Rights Reserved.

F-Secure Anti-Virus for Mac. User's Guide

What's the difference between spyware and a virus? What is Scareware?

Tips For A Profitable Real Estate Marketing Campaign


What should I do if I have problems with my account statement?

Mentoring Field Guide. Last Updated On: 1/30/2013 Created by the Learning & Organizational Development and Support Teams education@score.

Transcription:

Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines that people use to communicate more effectively. You should also know how to protect yourself from certain risks, like malware or phishing. In this lesson, we'll discuss writing more effective emails using good email etiquette, both for personal use and in the workplace. We'll also talk about different strategies for using email safely. Tips for Email Success Here are some basic rules you can follow to write better emails, no matter who you're emailing. In some cases, it's okay to break these rules. Use these rules as a starting point, then tailor each email you send based on the situation. Click the arrows in the slideshow below to learn more about basic email etiquette. Page 2

Email Attachment Etiquette Page 3 Attachments are an easy way to share files, photos, and more, but many people aren't aware of some of the most common attachment mistakes. Be sure to follow these basic rules when including attachments in your emails: Mention Included Attachments Never attach a file without mentioning it in the body of your email. Something as simple as "I've attached a few photos to this email" will help your recipients know what to expect. On the other hand, make sure that attachments you mention are actually included with the message it's easy to focus on your message and forget to include the file itself. We recommend attaching any files before you start writing.

Mentioning an included attachment Consider File Size and Format Avoid sending excessively large attachments or uncompressed photos, which can take a long time for your recipients to download. You can always ZIP or compress files to make them easier to send over the web. Additionally, make sure your attachments don't need to be viewed in a specific application use universal file types like.pdf,.rtf or.jpg. Attaching a ZIP file Only Include Related Files If you need to send a lot of different files to the same person, you should consider sending the attachments through multiple emails. If you include several unrelated files in the same email, it can be difficult for your recipients to find the exact file they need.

Sending only related attachments While attachments are still an easy way to share files quickly over email, many people have started using cloudbased storage services like Google Drive and Microsoft SkyDrive to share large files. Rather than sharing the file itself, you can share a link, allowing others to access the file remotely. Check out our lessons on Sharing Files in Google Drive and Sharing Files in SkyDrive to learn more. Using Email in Business Whether you're using email at work or applying for a job, the normal rules of email etiquette still apply. However, there are a few additional considerations to keep in mind, as business emails can affect your professional reputation. Click the arrows in the slideshow below to learn more about using email in the workplace. Page 4

Remember, you should never use your work email account for personal communication. It's best to get your own personal account from a webmail service like Gmail, Yahoo! or Hotmail. Email Safety Page 5 Email is not totally secure, so you should avoid sending sensitive information, such as credit card numbers, passwords, or your Social Security Number. In addition, you may receive emails from scammers and cybercriminals, so you'll need to know how to deal with those messages. Here are a few things to watch out for:

Spam: Spam is another term for junk email or unwanted email advertisements. It's best to ignore or delete these messages. Luckily, most email services offer some protection, such as spam filtering. Phishing: Certain emails pretend to be from a bank or trusted source in order to steal your personal information. It's easy for someone to create an email that looks like it's from a specific business. Be especially cautious of any emails requesting an urgent response. Attachments: Some email attachments can contain viruses and other malware. It's generally safest not to open any attachment that you weren't expecting. If a friend sends you an attachment, you may want to ask them if they meant to send it before downloading. Spam emails For more information, check out Email Tips for Scams and Spam in our Internet Safety tutorial. Page 6 Now that you've finished exploring Email 101, you can: Get your own email account. It's easy to get a free email account from any major webmail provider, such as Yahoo!, Hotmail, or Gmail. Learn how to use a specific email client. Our Gmail tutorial will provide step-by-step instructions for sending, receiving and managing your email. Check out our Beyond Email topic. If you're ready to explore other ways of talking and sharing online, go to our Beyond Email topic to learn about instant messaging, video chat, text messaging, social networking, blogging and more.