Remove Copyright Remove Email Remove Examples Remove Phones
article thumbnail

4 ways to make people feel valued at work, even when you’re not all together

Ideas.Ted

Instead of listening as others share their ideas, now we often read them in an email or other digital medium. For example, here’s a recent email exchange I had with a client. For example, here’s a recent email exchange I had with a client. The solution is simple: Proofread your emails. Client: Yes.

Email 131
article thumbnail

Using Email Effectively

Ian's Messy Desk

Home About Contact Me Links Sitemap Using Email Effectively Posted by Ian McKenzie Written on June 18, 2010 If youre new here, you may want to subscribe to my RSS feed. When responding to an email that contains an attachment, use Reply without Attachment(s) option. Or, if you prefer, you can subscribe to my blog posts by e-mail.

Email 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From Executive Assistant to CEO

ProAssisting Blog

And then this too: Later, the phone rang. These working relationships are a perfect example of how much more the position of executive assistant can be and what that can lead to in the future. Digg Email Facebook Google Reddit StumbleUpon Technorati TwitThis Comments #1. She figured that it was not good news.

2009 500
article thumbnail

What Kind of Leader Are You: A Fixer, Fighter or Friend?

Success

For example, over the course of my career I’ve occupied the role of Fixer and Friend at times, but the Fighter is my go-to theme.). You might, for example, decide that you have a Fixer culture, which will inform what kinds of culture-wide communication and behavior you should focus on changing. No example is too small.

Mentoring 318
article thumbnail

19 Tips for Managing Your Email Even When You Don't Want To.

Stephanie LH Calahan

Productive & Organized Goes Audio in 3 Different Ways » 19 Tips for Managing Your Email Even When You Dont Want To E-mail, it is the form of communication that we love to hate and love to love.    Multiple studies on business productivity will tell you that huge amounts of time are wasted on email.

Email 100
article thumbnail

Safeguard Your Data with Google’s Two-Step Verification

Productivity Bits

Copyright © 2011 Productivity Bits. What happens when you set up Two-Step verification is that every time you login on a new computer you will be asked to enter a verification code sent to your phone by SMS (text) or a voice call. In any of those cases, the hacker would need access to your phone, too. Guest Post. Not a problem.

article thumbnail

The 12 Privacy Tips of Christmas

Ian's Messy Desk

name, address, phone number) will be used. Refuse to give out personal information on the phone, through the mail or over the internet unless you have initiated the contact or you know who you’re communicating with. For example, Social Insurance Numbers are rarely needed for retail transactions. Thanks for showing it.