MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

There are good emails, and there are bad emails. You know them when you see them, but can you write an email that’s more likely to be read and acted upon? There are a few key steps to writing them more effectively. For this week’s tip, we’ll walk you through five steps to improving your emails.

Brief is Better
What’s your knee-jerk reaction to a long email? Best-case scenario for the sender, you skim it briefly before moving on to the rest of your inbox. You have other things to do, after all, which probably include reading the rest of your emails. Your contacts are in the same position, so it is better to keep your emails concise and direct. Any extra information that doesn’t serve the email’s purpose can be chopped. If an email is too long for you to read, it will be too long for the recipient to read as well.

Write a Persuasive Subject Line
Your subject line is your first, and only, opportunity to convince the recipient of your message that it is worth their time to read. You want to introduce the topic of your email in such a way that grabs the attention of the reader and encourages them to open the email and at least see what is inside. Give them a reason to open the email, not fluff.

Personalization can Help
If your email messages read like they could be sent to anyone, from any company, you need to revisit them. Each email that is sent out should look like the time was spent to create a genuine message, which means that you need to take the time to create that genuine message. You should always identify yourself and your company, especially when communicating with vendors, new clients, and prospects.

Check Your Spelling
If you want to immediately discredit everything you have to say in your email, try misspelling a word or using improper grammar. These embarrassing and reputation-harming mistakes are easy enough to avoid by proofreading any message that is about to go out before clicking the Send button. Furthermore, don’t write anything that may be conveyed as unprofessional, like a sentence with Caps Lock activated.

Business Messages Should be Professional
We’re not saying that you shouldn’t share the occasional meme or joke with your organization, we’re saying that some ground rules need to be established. Provide your employees with an outlet that they can use to share these kinds of casual messages, so that their business inboxes aren’t filled with clutter that distracts them from their work. Otherwise, your email could start to contribute to a lack of productivity and focus.

For more information on possible business communication solutions, including email, give MERIT Solutions a call at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 March 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Disaster Recovery Computer Microsoft VoIP Outsourced IT Business Continuity Business communications IT Support Mobile Devices User Tips Windows 10 Innovation IT Services Email Hardware Productivity Cybercrime Managed IT Server Small Business Efficiency Data Backup Mobility Mobile Device Management Windows browser Ransomware Apps Cybersecurity Smartphone Telephone Systems Internet of Things Save Money Operating System Saving Money Data Recovery Android Virtualization Law Enforcement Hosted Solution Quick Tips Passwords BYOD Data Password Phishing Holiday BDR Money Information Technology Chrome Data Security Office 365 Recovery VPN Microsoft Office Risk Management Google Drive Hacking Update Unsupported Software Avoiding Downtime Vulnerability Gadgets Automation Cloud Computing Alert Health Miscellaneous Managed Service Provider Computers Work/Life Balance Wi-Fi upgrade Social Best Practice Social Media App Communication Budget Smartphones Data Management IT Support Facebook Government Wireless Wireless Technology Windows 10 Spam Identity Theft Telephony Workplace Tips Managed IT Services Flexibility Shortcut Office tips Applications Private Cloud Social Engineering Data Breach History Firewall Proactive IT Application Antivirus search Current Events The Internet of Things Audit Personal Information Collaboration User Error Politics Two-factor Authentication USB Save Time Computer Care Phone System Patch Management Legal IT solutions Users iPhone Encryption Blockchain DDoS Excel Mobile Computing Transportation Artificial Intelligence Data Storage Robot OneNote Television Cost Management Remote Computing Streaming Media Apple End of Support SaaS Data Loss WiFi Fraud Tech Term Marketing Samsung Going Green Content Filtering Google Docs Bandwidth Battery Humor HaaS Disaster eWaste Compliance Employer-Employee Relationship Data Protection Project Management Automobile Redundancy Network Sports Commerce Tech Support Saving Time Cleaning Hacker Cortana Internet Exlporer Gmail Office Solid State Drive FAQ Video Games Augmented Reality tweet Relocation Virtual Reality NFL Access IT budget Lifestyle Business Intelligence Touchscreen Scam Music calculator Charger Outlook Twitter Maintenance Word PDF control Legislation Managed IT Service Employer Employee Relationship Analytics Wireless Charging iOS Keyboard WSJ Device Security Instant Messaging Windows Ink Text Messaging Identities Worker Commute Exchange Comparison Computer Accessories Mobile Device Distributed Denial of Service Big Data altivista Evernote Regulation Computer Fan Devices Managing Stress Google Maps IoT SBS Specifications Screen Mirroring Books compaq Networking Scalability Sync Dark Web Software as a Service Meetings Hiring/Firing Spyware Education Language Sales Laptop Router Cast Uninterrupted Power Supply Emails Vendor Management Wearable Technology hp Workers How To Adobe Settings Benefits domain Retail Touchpad WannaCry Unified Threat Management Updates Reputation Licensing Advertising Edge Virus Entertainment remote Conferencing HBO Webinar Training Upgrades Electronic Medical Records Yahoo Microsoft Word Mobile Microsoft Excel Data storage Ciminal Point of Sale Running Cable Proactive HIPAA Server 2008 Gifts IT solutions Company Culture Consultant Ali Rowghani Administration Black Market Professional Services Chromecast File Sharing Trending Smart Technology Value Websites Avoid Downtime IT Management Windows 10s Nanotechnology Colocation Shadow IT Travel Document Management Storage Hard Drives MSP Experience server installation dvd "cannot install required files" Credit Cards WIndows Server 2008 Files Hard Disk Drive Root Cause Analysis Lithium-ion battery stock Tablets Administrator intranet Worker Congratulations CrashOverride Cache Monitors Remote Monitoring Safety Emergency Data Theft Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...