RMail Inbox and RMail Web provide certain additional features that you may find useful in your email correspondence.
SideNote
SideNote enables you to include a note in your email messages just like a yellow Post-it note for paper. The recipient of the email does not see the SideNote. Only you and those you copy on the email message (CC or BC) see the SideNote. Thus, the SideNote is not intended for the recipient but is intended for others in your organization or outside collaborators related to the business of the email.
This is a feature you should try immediately, because you might find it more useful in routine mail correspondence than you might imagine.
PDF Conversion
You can use the PDF conversion feature for Microsoft Word, Excel, or PowerPoint attachments to your email. By doing this, the recipient will be able to read such attachments even if the they do not have Microsoft Office. (Note that because the Microsoft files are attachments, they are independent of being displayed correctly by a particular email program.) Although this conversion capability is available in other software, RMail makes it available at the point that you need to use it.
Metadata Removal
Metadata is information embedded in a document about the document itself. It is not visible in the document but is accessible via the original authoring software (e.g., Word). The metadata in a document can provide a recipient more information than they should have. Perhaps most metadata are harmless, but some can be proprietary or at least confidential. Therefore, the best practice for many businesses is to remove the metadata before sending a document to anyone.
RMail Inbox and RMail Web enable you to remove the metadata from documents with one click (tap) of a button.
Anti-phishing
The RMail plug-ins for Outlook and Microsoft Office 365 includes anti-whaling (specialized anti-phishing) algorithms to reduce your risk of being a victim to an imposter email. How does this work?
To understand whaling you first have to understand phishing. Phishing is an email sent to you by somebody intending to get you to do something. The From: email address showing in the email message, however, is not that of the real sender. The From: email address showing can be anything the sender wants it to be.
For instance, John Fisherman with an email address of JohnFisherman@gmail.com might send you an email with the From: email address of American Cancer Society <donations@AmericanCancerSociety.com> showing in the email message. The email solicits a $25 donation to the American Cancer Society to be sent by you asking you to click (tap) on a link with the text American Cancer Society Donations. Such a link takes you to a phony website simulating the website of the American Cancer Society but belonging to John Fisherman. Because you routinely donate to good causes, you readily make a donation. The donation goes into John Fisherman’s phony website, not into the American Cancer Society’s bank account. John gets the funds.
Why do they call this phishing? Because John Fisherman sends out thousands of these emails fishing for a few suckers to take the bait. If he sends out 10,000 emails and 10% of the recipients make a $25 donation, he ends up with $25,000 resulting from this scam.
But don’t think hackers use phishing just to scam money. They use it to get useful information too. And that information can eventually lead to more serious scams. Read Chapter 16.
Keep in mind that anybody can do this; it takes no advanced expertise. And it’s easy to fool people. In fact, we all have probably been victims of this phishing without ever even discovering it.
Much email software has anti-phishing algorithms that detects phishing attempts. It’s quite simple. They match up the email address showing on the From: line with the actual email address from which the message was sent (hidden in the meta transmission data). If the two do not match, it’s phishing.
Anti-whaling
The insidious version of phishing called whaling is highly dangerous. That is where the hacker directs the phishing specifically at wealthy individuals or at individuals who are involved in major high-value transactions (e.g., real estate closings). In this case, the phishing involves catching a whale; so this variation of phishing is called whaling. And the RMail plug-ins for Outlook and Microsoft Office 365 contain anti-whaling algorithms.
A typical whaling attempt might be by someone who knows that you’re involved in a high-value transaction, such as the closing at the Tennessee Trans State Title Company for a real estate investment. In this case, John Fisherman showing the From: email address sends you an email with the return address of Tennessee Trans State Title Company <closings@TennesseeTransStateTitleCompany.com> showing. The email directs you to wire the $83,972, that you’re obligated in the transaction, to the Closing Fund account at a certain bank. This is pretty straightforward, because you know you’re closing, and you know you have to come up with the money. So you duly arrange to wire it to the bank as requested. Little do you suspect that you’re wiring the money to John Fisherman’s Closing Fund account at his bank, not the title company’s bank account.
Fortunately, the RMail anti-whaling function will pick up this whaling activity and alert you to the fact that John Fisherman’s email is not a legitimate request. Were you to email the funds as per the request, you would find out sometime later the funds did not go to the Tennessee Trans State Title Company. They went to John Fisherman’s Closing Fund bank account. You still owe the Tennessee Trans State Title Company $83,972 for the closing.
Beware that often hackers in other countries do the whaling, which puts the scam well beyond the practical reach of US law enforcement.
Beware also that you cannot rely upon anyone’s anti-whaling algorithms to fully protect you. Never ever respond to an email requesting funds for any purpose. You always initiate the payment of funds separately from the email and only to email addresses, websites, PayPal accounts, or bank accounts that you know to be legitimate.
Phishing and whaling can be very convincing and even motivating. Fortunately, RMail will catch a significant percentage of these attempts for users of Outlook and Microsoft Office 365. But again, the best practice is to make your payments separately from any email you receive. (See Chapter 16 for more on this.)
Custom Features
If you need custom features for your small business, ask RMail services for what you need. There might be some inexpensive off-the-shelf features that RMail can readily install for your use.
The custom features, however, are directed at enterprises that are much more likely to need them than small businesses. If you desire to integrate RMail services into your enterprise email system but require special features, contact RMail to see what’s available. RMail has hundreds of off-the-shelf custom features that you can use to make the RMail system work for your company.
Plug-ins
As set forth in Chapter 7, there are plug-ins for Microsoft Office 365, Outlook.com, Hotmail, and Gmail. These plug-ins put the RMail button right in the email program making it convenient for users to use RMail services (see the RMail website at Rmail.com).
Thus, right from inside Microsoft Outlook, Outlook.com, Hotmail, and Gmail, you can send email using any of the RMail services.
All of these have different interfaces which if covered by this book would make the book much longer and perhaps confusing. But by becoming familiar RMail services, you should have no trouble using any of the user interfaces.
Although these plug-ins enable you to use RMail services inside your favorite email program, remember you can always use RMail Inbox or RMail Web in your web browser too. There is an RMail plug-in for the Google Chrome browser. But that plug-in is just a bookmark, and you don’t really need it. You can easily set up your own browser bookmark to access RMail Inbox or RMail Web.
iPad App
There is an app for iPad that enables you to send email and use RMail services. It’s send-only (like RMail Web), and does not receive email.
The Button
It’s not only the plug-ins that provide the RMail services button, but many enterprise programs make the button available, if requested. For instance, Salesforce can include the RMail button as can IBM Notes. But there are other enterprise business programs that can provide you with the RMail button too.
If you ask, and your business software provider cannot give you the RMail button, ask the provider to contact RMail and incorporate the RMail services button into their software for your use. This is not necessarily a custom request on your behalf. Once a provider integrates the RMail button into their email software, they can make it available as an extra feature to all their other customers.
The button is also available from ISPs. If you use your ISP’s email program, it may already have the RMail button. If not, your ISP may be able to provide it upon request. If that’s not the case, request that your ISP incorporate the RMail button into the ISP’s email software. Again, this is not a custom request. By integrating the button into the ISP’s email program, an ISP has an extra feature to generate revenue and provide to all its customers.
Free RMail Services
For those of you who don’t use RMail services much, you can use RMail services up to five times each month without a charge. For every instance of use over the five-a-month allotment, you will be charged at the posted RMail rates (on the RMail website), which you will find very reasonable and a significant cost savings over other ways of enacting business communications. And you pay as you go; there is no monthly charge. For heavier use, there are other payment plans.
Monthly Accounting
You are encouraged to keep track of your email just as you would any correspondence. RMail helps you do this by issuing a monthly activity report consisting of all the email messages you sent using RMail services. This may suffice as a general index to your email accounting system or as an auditing tool.