MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

There are good emails, and there are bad emails. You know them when you see them, but can you write an email that’s more likely to be read and acted upon? There are a few key steps to writing them more effectively. For this week’s tip, we’ll walk you through five steps to improving your emails.

Brief is Better
What’s your knee-jerk reaction to a long email? Best-case scenario for the sender, you skim it briefly before moving on to the rest of your inbox. You have other things to do, after all, which probably include reading the rest of your emails. Your contacts are in the same position, so it is better to keep your emails concise and direct. Any extra information that doesn’t serve the email’s purpose can be chopped. If an email is too long for you to read, it will be too long for the recipient to read as well.

Write a Persuasive Subject Line
Your subject line is your first, and only, opportunity to convince the recipient of your message that it is worth their time to read. You want to introduce the topic of your email in such a way that grabs the attention of the reader and encourages them to open the email and at least see what is inside. Give them a reason to open the email, not fluff.

Personalization can Help
If your email messages read like they could be sent to anyone, from any company, you need to revisit them. Each email that is sent out should look like the time was spent to create a genuine message, which means that you need to take the time to create that genuine message. You should always identify yourself and your company, especially when communicating with vendors, new clients, and prospects.

Check Your Spelling
If you want to immediately discredit everything you have to say in your email, try misspelling a word or using improper grammar. These embarrassing and reputation-harming mistakes are easy enough to avoid by proofreading any message that is about to go out before clicking the Send button. Furthermore, don’t write anything that may be conveyed as unprofessional, like a sentence with Caps Lock activated.

Business Messages Should be Professional
We’re not saying that you shouldn’t share the occasional meme or joke with your organization, we’re saying that some ground rules need to be established. Provide your employees with an outlet that they can use to share these kinds of casual messages, so that their business inboxes aren’t filled with clutter that distracts them from their work. Otherwise, your email could start to contribute to a lack of productivity and focus.

For more information on possible business communication solutions, including email, give MERIT Solutions a call at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Network Security Business Computing Hackers Malware Software Productivity Internet Managed IT Services Hosted Solutions Backup Business Management google Mobile Devices Computer Disaster Recovery Outsourced IT Business Microsoft IT Support Business Continuity Hardware communications VoIP Innovation Windows 10 Email User Tips IT Services Cybersecurity Efficiency Data Backup Tech Term Cybercrime Windows Managed IT Small Business Apps Server Ransomware Data Recovery Internet of Things Saving Money Mobile Device Management Mobility Productivity Data Smartphone Law Enforcement Operating System browser Office 365 Telephone Systems Android Virtualization BDR Money Save Money Quick Tips Cloud Computing Phishing Smartphones Passwords Hosted Solution Data Security Microsoft Office Password Holiday IT Support BYOD Automation Managed Service Provider Chrome Communication Information Technology VPN Recovery Network Update Gadgets Workplace Tips Google Drive Collaboration Hacking Avoiding Downtime Two-factor Authentication Wireless Alert Health Miscellaneous Social upgrade Computers Risk Management Unsupported Software Vulnerability App Best Practice Social Media Work/Life Balance Cost Management Facebook Budget Data Breach Government Wi-Fi Data Management Application Tech Support Compliance Personal Information Wireless Technology Data Protection Politics Blockchain Telephony Social Engineering Cleaning USB Streaming Media Save Time Applications Private Cloud Office tips Users search History Identity Theft Remote Computing Spam Proactive IT Artificial Intelligence Flexibility Shortcut Managed IT Services The Internet of Things User Error Router Firewall Employer-Employee Relationship Gmail Antivirus Current Events Audit HaaS MSP Google Docs IT solutions Hacker Internet Exlporer Solid State Drive DDoS Automobile Value Television Redundancy Management iPhone Saving Time Travel Commerce Mobile Computing Office Apple Transportation Computer Care Phone System Cortana Mobile Security Windows 10 WiFi Patch Management Devices Robot Legal Going Green Encryption Bandwidth Google Assistant End of Support eWaste Wireless Charging Excel Fraud Big Data Data Storage Humor OneNote Disaster Education Vendor Management Networking SaaS Samsung Project Management Content Filtering Data Loss Sports Battery Marketing WannaCry Training Updates Memory Hard Drives Entertainment Licensing Electronic Medical Records calculator Data Theft Files Upgrades Lithium-ion battery Twitter Conferencing Content Filter Point of Sale HBO Administrator Webinar Company Culture Microsoft Word Students HIPAA control Mobile intranet Safety Microsoft Excel Computing Black Market Remote Monitoring Consultant Smart Technology WSJ Gifts Monitoring Relocation Access IT solutions Avoid Downtime Unified Communications Exchange Professional Services IT budget altivista File Sharing Analysis Shadow IT Distributed Denial of Service Document Management IT Management Maintenance Windows 10s Nanotechnology Financial PDF Experience SBS compaq Storage App store Credit Cards Financial Technology WIndows Server 2008 Device Security Hard Disk Drive Tablets Identities Video Games Root Cause Analysis Wearable Technology Bring Your Own Device Text Messaging hp Virtual Reality Scam FAQ Printing domain NFL IoT Augmented Reality Hybrid Cloud Music Lifestyle Identity Business Intelligence Touchscreen Employer Employee Relationship Charger Outlook Spyware remote Word Language Laptop Uninterrupted Power Supply Business Technology Analytics Keyboard Yahoo Legislation Data Privacy Instant Messaging Managed IT Service iOS Computer Accessories Computer Forensics Worker Commute Server 2008 Windows Ink Touchpad Mobile Device Running Cable Wasting Money Ali Rowghani Comparison Hard Drive Reputation Managing Stress Computer Fan Trending Evernote PowerPoint Advertising Regulation Edge Google Maps Virus Scalability Amazon Books Hiring/Firing Specifications Chromebook Screen Mirroring Dark Web Wireless Internet Sync Ciminal Data storage server installation dvd "cannot install required files" Software as a Service Proactive How To Meetings Virtual Assistant Benefits stock Sales Smart Tech Administration Cast Chromecast Emails Workers Gamification Adobe Websites Settings Unified Threat Management Alexa for Business tweet Retail Connectivity Colocation Cache Monitors Emergency Worker CrashOverride Thank You Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...