Thursday, April 17, 2014

10 Core Netiquette Rules For Business Email - From Netiquette IQ




Netiquette applies to all demographics and defined areas of our world's nations and economies. Some segments of society have specifics to their normal types of communication. Business, is of course, a main area ofelectronic communication. Here is a list of 10 essential rules for business Netiquette.

10 Rules of Business Email

1.    Keep the subject line pertinent – Make the reader want to open the email! After the sender address, the subject line is the first thing  email recipients will see.
2.    Stay succinct – Do not assume your email will be given more than ten seconds!
3.    Be clear. Check for bad grammar, formats, tone and weak, overused words
4.    Be ethical and genuine – Tone usually comes across and can be a deciding factor in your connection and goals.
5.    Speak to the addressee – Do all you can to assure you are not speaking under or over the business language of your recipient
6.    Watch out for a "knowledge gap." Don’t assume recipients have the same knowledge about your product or service you do. After you’ve captured their interest and have reached the "additional information" stage, try offering a step-by-step walkthrough of whatever you’re marketing to help them understand what you’re trying to say.
7.    Write business emails as letters, not as ads. In the B2B world, a forthright communication in letter format is much more effective than an email that looks and smells like an ad.
8.    Assume your email will be read by others – Do not be critical, be positive and praiseworthy. Include important information to assist others not as knowledgeable, especially about costs.
9.    Have a complete signature block – Include title, company, phones, fax, email and URL links. Do not limit how to contact you for more information.
10. Select good times to send your email – Do not send during late hours, weekends, holidays or prime business times of the recipient.
  ================================================
     In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

==============================================
 Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
     Enjoy most of what you need for email in a single book.
===========================================






Netiquette - US-Cert Security Alerts for Microsoft Products - Via Netiquette IQ

For IE users there are a number of security flaws to be aware of. Any Internet user should be familiar with US-Cert, http://www.us-cert.gov/ .
microsoft -- internet_explorer
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1751 and CVE-2014-1755.
microsoft -- internet_explorer
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0235 and CVE-2014-1755.
microsoft -- internet_explorer
Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
microsoft -- internet_explorer
Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
microsoft -- internet_explorer
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0235 and CVE-2014-1751.
microsoft -- office_compatibility_pack
Microsoft Word 2007 SP3 and 2010 SP1 and SP2, and Office Compatibility Pack SP3, allocates memory incorrectly for file conversions from a binary (aka .doc) format to a newer format, which allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office File Format Converter Vulnerability."
microsoft -- word
Stack-based buffer overflow in Microsoft Word 2003 SP3 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Word Stack Overflow Vulnerability."
microsoft -- publisher
pubconv.dll in Microsoft Publisher 2003 SP3 and 2007 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via a crafted .pub file, aka "Arbitrary Pointer Dereference Vulnerability."
microsoft -- internet_explorer
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."