KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Improving Outlook With Three Tips

Tip of the Week: Improving Outlook With Three Tips

Does your business use Microsoft Outlook as its preferred email client? It’s likely that you have already noticed how dynamic of a solution it is for your business purposes, but little do you know that the most recent version of Outlook is stacked with some of the best features out there to make your user experience even better.

Here are three of the best ways you can use Outlook to get more productivity out of your workday.

Quickly Access Your Inbox
If you want to access your inbox without going through all sorts of folders or icons, you can easily do so with just a few keystrokes. Just press the Windows key and R, and you’ll open the Run window. Just type outlook into the field.
ib outlook 2

Add an Attachment
If you’ve worked in Excel or Word on a document, or recently downloaded a PDF or image file that you want to attach to an email, you can do that easily with Outlook. Outlook pulls any documents that you’ve recently opened and allows you to quickly attach it to a message.
ib outlook 3

Deleting and Archiving
If you delete a file, it will be sent to your Delete folder. Delete folders are emptied from time to time, and once they have been emptied, the emails will be gone for good.
ib outlook 4

If you archive a file, it goes to the Archive folder. Archives messages will be removed from your inbox, but will keep them stashed away for later viewing. You can even set your emails to auto archive so that you don’t have to worry about doing it manually.
ib outlook 5

For more great tips and tricks about Microsoft Outlook and other Microsoft services, subscribe to the KT Connections blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 16 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices hackers Privacy Technology Email Business Computing Cloud Internet malware Network Security Google software Business Ransomware Efficiency User Tips Backup Data Computer IT Support Microsoft Android Money Facebook Hardware Productivity Managed IT Services IT Support Small Business Network Smartphone Windows Hosted Solutions cybersecurity Mobile Device Management VoIP Gmail IT Management Artificial Intelligence Microsoft Office Phishing communications Cloud Computing Data Management Business Continuity Mobile Devices Operating System Outsourced IT data breach End of Support Apple Encryption IT Services Alert Smartphones Outlook Bandwidth BDR Business Management Windows 10 Windows 10 Data storage Unified Communications Social Media Nextiva Upgrade Antivirus Internet of Things security cameras Passwords Disaster Recovery Update Communication Browser Patch Management Save Money vulnerability SaaS Saving Money Innovation Document Management Collaboration Information Technology Managed IT Services IoT Law Enforcement Hard Drive Analytics Robot Project Management security solutions Remote Monitoring Networking Firewall Big Data Customer Service The Internet of Things Apps Automation Search Productivity IBM Server Gadgets Google Maps BYOD Cost Management WiFi Start Menu Google Wallet YouTube Google Docs Politics Legal Scam News Lunch and Learn Best Practice Data Recovery Events App Office 365 Word Event Marketing Local Buzz Spam Drones Data Backup Access Control South Dakota History Bluetooth Rapid City Quick Tips Specifications File Sharing Websites Penetration Testing user confidence Access Virtual Desktop Office Tips Web Servers DDoS attacks Applications Printer Music Data Security Local Technology Event Virtual Machines Safety IoT Devices Television Workers Software as a Service Solid State Drive Physical Security Phishing Scams Spyware DDoS Internet 101 Redundancy Tips and Tricks Audit Sales Tax Google Drive security precautions Mixer Government Writing Risk Creep Mouse Samsung Virus Cryptocurrency IT Consultation LastPass communication device Internet Connected Devices Black Market Maintenance Telephony Vendors Virtual Reality IT for Oil Companies Laptop SharePoint Tablets Law IT Cleaning IT Assessment Cache Social Engineering business owner Managed Service Provider How To Hacking Fortinet Mobility VoIP Community Involvement Retail Risk Management Memory Tablet IT Security Lawyers IT Strategy face communication solutions Emergency Business Growth Business Security Social Download vulnerabilities Kaseya identity theft SOX Network Congestion Freedom of Information IT Solutions Administration surveillance cameras Virtualization Communications Education Deep Learning Business Technology Content Filtering Printing Information Security Time Management healthcare Dell ’s Sonicwall Global Management System Experience Microsoft Office 365 Kaseya Connect media experience Sarbanes-Oxley Act Fake News Attorneys Computer Care Trend Micro Phone System AtomBombing Office Disaster Managed IT Downloads Distributed Denial of Service Email Security Unified Threat Management tool Password Sports Microsoft Office 365 features Conference information End User Testing Microsoft Excel Running Cable Managed Services Chamber of Commerce Wireless Technology Google Play Store Hardware as a Service LiFi appointment Vendor Management Uninterrupted Power Supply Google Calendar Streaming Media Flash Cabling Society HaaS Visible Light Communication enterprise productivity software Monitors Data Protection Knowledge Hosted Solution Business Communications Webcam Business Comunications Windows XP Settings VPN botnet attack Windows 8 Press Release camera Vendor Mangement Website Microsoft Bookings Displays Corporate Profile Tech Terms Programming Comparison Touchscreen Budget Remote Computing password manager LastPass Compliance macbook Workplace Tips Worker botnet Rebrand Tech Support Digital Proactive IT Hack Business Mangement Advertising booking process Fast food Cloud Backup Machine Learning Paperless Office Hiring/Firing Bring Your Own Device Language Administrator Relocation Hacker Miscellaneous base infrastructure CCTV Hacks Holiday Automobile security solution IT service Web Server Unified Threat Management Notifications Telephone Systems Business Metrics Meetings end-of-support date Ordinary Computers Health holiday season Emails Banking Phone Systen Rental Service Chromebook UTM Tracking Flexibility quantum computers 3D Printing holidays Cortana Supercomputer Threat management Reliable Computing Users scammers CrashOverride Twitter Work/Life Balance IT Consultant Scalability network security professionals scams G Suite Training Computer Malfunction Travel Playbook Processors Wi-Fi collaboration capabilities Employer-Employee Relationship Employer Employee Relationship Messenger Sync Digital Payment Private Cloud breach methods Microchip Documents In Internet of Things Books Text Messaging PDF Motion Sickness Public Cloud Taxes Computing Marketing Reading