Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Write a Better Email

Tip of the Week: How to Write a Better Email

Writing an email is one of the most prevalent methods of communication in the business world, but it’s not as easy as you might think. There are considerable details and intricacies to mastering this art, and we’re here to help. By the end of this blog article, you’ll be armed with five tips to write the most effective email that you can.

Keep It Short
Nobody wants to read a long message in their email. After all, they likely have more pressing matters to attend to, and many more messages that they have to read. Therefore, it makes sense that you get right to the point when you have to send an email. Try to include only information that’s absolutely critical. Remember, concision is the friend of any businessperson, as they only have so much time in a day to read and respond to messages that aren’t mission-critical.

Present a Clear Subject Line
Similarly, you want to use only the most clear and concise subject lines, as anything less could mislead the recipient into thinking that the message either isn’t important or doesn’t warrant immediate attention. Basically, you want to provide enough information in the subject line to give the recipient a reason to open it.

Personalize the Email
You shouldn’t be copying and pasting a catch-all message into an email. You should take the time to personalize each message that you send so that it looks as authentic and genuine as possible. You should always use your full name, as well as the organization you belong to--especially if you are sending messages to vendors or clients.

Perform a Spelling and Grammar Check
Nothing is more embarrassing than making a major spelling or grammar error in an important email. Thankfully, this can be avoided by giving your message a quick proofreading before hitting the Send button. Try to avoid statements in all caps, as they can create a subtext that you don’t necessarily want to convey.

Keep it Business-Friendly
If you’re going to send a bunch of memes or other fun things to your employees, it’s best not to do it through email. It’s one thing if you have a dedicated email thread designed for sharing information unrelated to work, but when you have your employees sending things that have no place in a professional environment, you get clutter (and a general lack of focus), both of which can create an unproductive workplace environment.

For more information on how to make the most of your email, reach out to us at 845-876-6561.

Is Work Invading Your Home Life?
2018: What to Expect from Technology


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Hackers Network Security Business Computing Backup Managed IT Services Malware Hosted Solutions Google Disaster Recovery Microsoft Software VoIP Mobile Devices Business Continuity Business Email Outsourced IT Internet Productivity Data Innovation Smartphones Cybercrime Efficiency IT Support Windows 10 Ransomware Data Backup IT Services Browser Android communications Computer Hardware Office Cloud Computing Alert Computers Telephone Systems Server Business Management User Tips Mobile Device Management Windows Virtualization Small Business Saving Money Smartphone Data Recovery Social Engineering Internet of Things Network Chrome BDR Quick Tips Cybersecurity BYOD Upgrade Work/Life Balance Office Tips Avoiding Downtime Productivity Microsoft Office Save Money Collaboration Holiday Law Enforcement How To Social Media Recovery Miscellaneous Passwords Workplace Tips App Managed IT Private Cloud Firewall Mobility Hacking Bandwidth Business Intelligence Bring Your Own Device Managed Service Provider Facebook Two-factor Authentication Operating System Proactive IT Money Gmail Communication Remote Monitoring Data Protection Office 365 HaaS Phishing Budget Data Security Password Information Technology Health Redundancy Flexibility Wi-Fi VPN Data Management Black Market Router Compliance Employer-Employee Relationship Identity Theft Mobile Device Google Drive Cleaning Windows 10 Data Breach Big Data SaaS Automation Marketing User Error Artificial Intelligence Spam Safety Value Vulnerability Tech Term Managed IT Services Gadgets Apps Risk Management Workers Legal Physical Security Mobile Computing DDoS Battery CES Training Downtime Credit Cards Meetings Content Filtering Applications Wireless History IT Management Charger Apple Word OneNote Electronic Medical Records Best Practice IT Plan Data storage Shadow IT eWaste Solid State Drive Government Hiring/Firing End of Support Unsupported Software Settings Computer Care Internet Exlporer HIPAA Comparison Samsung The Internet of Things Patch Management Entertainment Business Owner Spam Blocking Encryption Keyboard Data loss Scam Document Management Public Cloud Remote Computing Wearable Technology Update Wireless Technology Save Time Worker Automobile PDF Computing Infrastructure Data Storage Tip of the week IoT Rootkit Uninterrupted Power Supply Remote Work Antivirus Mobile Computer Fan Television Fiber-Optic Troubleshooting Knowledge Voice over Internet Protocol hacker Windows Server 2008 Smart Tech Content Professional Services FENG Public Computer Cables Hosted Solution Network Congestion Two Factor Authentication Distributed Denial of Service Education WiFi Multi-Factor Security Data Warehousing Content Management Windows 7 Insurance Emails Vendor Management Audiobook Tools Unified Communications Blockchain Trending Going Green Regulations Robot Practices Tech Support Politics Fraud Hard Drives Video Games Relocation Networking Theft Human Resources IT Consultant Mouse Users Lifestyle Laptop Hosted Computing Unified Threat Management Amazon Scalability Botnet IBM Cortana Books IaaS Staff Leadership Virtual Reality Touchpad Servers Outlook Inventory Netflix Lithium-ion battery Environment Amazon Web Services Running Cable Instant Messaging Travel Root Cause Analysis Supercomputer YouTube Google Apps Emergency Digital Signature Employer Employee Relationship Streaming Media Worker Commute Internet exploMicrosoft Software Tips Flash Humor Access Control Online Shopping Search iPhone Current Events Infrastructure Strategy webinar Computer Accessories SharePoint Specifications Advertising Sync Monitor Authentication Sports Evernote How to Software as a Service NarrowBand Password Manager Analysis Conferencing Bluetooth Millennials HBO People Telephony Reputation Windows 10s Loyalty Notifications Experience Techology Transportation Fax Server Files Screen Mirroring Business Mangement Accountants IT Support Workforce Hybrid Cloud Frequently Asked Questions Mobile Office Skype Customer Music Benefits IT solutions Google Docs Colocation Cast Chromecast Recycling Telecommuting Excel Start Menu Audit Assessment Wireless Charging USB Smart Technology Website Criminal Administration Thank You Webinar Congratulations IT solutions CrashOverride Nanotechnology

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!