Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.
Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two...
Those seeking a powerful file archiver often fall back on WinZip. The tool allows users to quickly and easily compress files into archives or read already compressed data. WinZip also offers other useful features, which are available for a fee as soon as you’ve completed your trial period. However, if you don’t want to pay for file compression, there are various free WinZip alternatives to take...
A professional e-mail signature is a standard part of business communication. Private users can also stand to gain from these e-mail additions. But what exactly does a good e-mail signature contain? And which information should your company include when sending messages to customers or business partners?
It comes to the rescue when you think it’s too late: Outlook’s recall function enables you to delete e-mails after you’ve sent them or to replace them with a new version. However, it only works under certain conditions. We explain how to recall Outlook messages you’ve already sent, and provide possible reasons why the recall function might not work.
Appointments are easier to schedule if you already know your colleague or business partner’s calendar. The groupware Microsoft Outlook offers the option to share calendar information with other people, or share the entire calendar to view. What information you choose to disclose is up to you. We just tell you how to do it.
Have you ever been curious about how an e-mail arrives at the designated recipient? The header area of an e-mail contains a lot more information than just the sender, the subject, the recipient and the date the e-mail was received. By displaying all of the e-mail header you can determine whether the e-mail falls into the spam category. Learn how to decipher the information in an e-mail header.
If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...
Spam e-mails may be annoying, but they’re mostly harmless. What’s more problematic is phishing – a technique whereby fraudsters try to con you by posing as trustworthy sender addresses in an attempt to get hold of sensitive data. These messages appear genuine too, because without a digital signature, it’s very easy to assume a trusted identity online. In order to protect customers and their own...
Automatic out-of-office replies are a great way to let your contacts know when you’re not available. You can easily send automatic out-of-office replies from Outlook. Moreover, with Outlook you can set up numerous special rules, for example for cases when important e-mails need forwarding. We will show you how to use the Outlook out-of-office assistant, including the tool to set special rules.
IONOS E-mail Guide: everything need to know about e-mails
Most people couldn’t imagine a life without e-mails. Whether you use them to communicate for business or personal reasons, e-mails have practically replaced traditional letters. Over 200 billion e-mails are sent around the world each day and despite the rise in social media and instant messaging, they show no sign of slowing down. Our E-mail Guide forms part of the IONOS Digital Guide and is dedicated to the basic framework of the e-mail–from the technical security requirements to marketing strategies you should use when sending business e-mails. The contents of this E-mail Guide cater for both beginners as well as more experienced computer users.
The E-mail Guide’s target audience
The numerous e-mail tips in the guide are aimed at a wide readership, from hobbyists and novices to IT and e-mail marketing professionals. Owners of small and medium-sized companies can also benefit from articles that provide information on how to create business e-mails and build successful e-mail marketing campaigns. The e-mail guide takes into consideration that readers have different levels of IT knowledge; as well as introductory articles on FAQs (e.g. ‘How is an e-mail sent?’ or ‘What should an e-mail header contain?’) there are also more detailed and specific articles such as ‘E-mail encryption with PGP’ or ‘Creating individual newsletter templates’.
The E-mail Guide’s structure and topics
In IONOS’s Digital Guide, the E-mail Guide offers three different subcategories. Under ‘E-mail marketing’ you can read about marketing trends as well as tips on direct marketing via e-mail. The ‘E-mail security’ subcategory mainly deals with e-mail encryption and how to handle spam and phishing e-mails. Lastly, under ‘Technical matters’, you’ll find various articles about structure, operation and storage of e-mails and the corresponding software. In our guide, we provide detailed information on everything to do with e-mails, presented to you in a clear and understandable way.