Welcome to the First Column IT Tech Blog

HomeBlog
Organizing Your Emails Can Be Pretty RAD

Organizing Your Emails Can Be Pretty RAD

July 23, 2024

Struggling to manage your overflowing email inbox? You're not alone. Many professionals find it challenging to achieve the elusive "inbox zero." If you're ready to transform how you handle your emails, consider adopting the RAD method. This approach, developed by Nick Sonnenberg, founder and CEO of Leverage, could revolutionize your email management.

Understanding Inbox Zero

"Inbox zero" refers to having no visible emails in your inbox—not just no unread emails. Even read emails clutter your inbox, making it hard to find important messages. Achieving inbox zero involves archiving messages so they're out of sight but still accessible when needed. Sonnenberg suggests archiving emails older than 30 days, as they're likely irrelevant or will be followed up on if still important.

Introducing the RAD Method

The RAD method simplifies email management into three actions: reply, archive, and defer.

Reply to Messages

Respond to emails that require your attention, then archive them immediately. If the conversation continues, the email will reappear in your inbox, so there's no harm in archiving it right away.

Archive Messages

Archive emails that don't need a response. These messages can be easily searched if needed later, keeping your inbox clutter-free.

Defer Messages

For emails that need a response but not immediately, defer them. Use Gmail's "snooze" feature or the Boomerang plugin for Outlook to temporarily remove the email from your inbox and have it reappear at a specified time. This is useful for reminders or delaying a response until you're ready.

Learn more about Nick Sonnenberg's strategies in his book, Come Up for Air: How Teams Can Leverage Systems and Tools to Stop Drowning in Work, and on his website.

Simplify Your Business Communications

A well-managed inbox can make your business operations smoother. We offer email management systems with secure, searchable, encrypted archives. Contact us at (571) 470-5594 to learn more.

Previous Post
December 30, 2025
How to Lock Your Screen in a Flash
You may leave the house door wide open when you step out to grab the mail. Sounds reasonable, but if a stray cat were to wander in, that was the risk you ran. The same logic applies to your digital life. Locking your computer, tablet, or phone screen is one of the simplest yet most effective steps you can take to protect your privacy and security.
December 24, 2025
Lessons About Shadow IT, Direct from the North Pole
Shadow IT is a big problem, no matter where it’s being used—even at the most famous toy manufacturer in history’s facility. Consider this a case study of why it is essential to listen to your IT department, especially when it comes to the tools they provide.
December 23, 2025
Protect Your Business from Stolen Credentials with Multi-Factor Authentication
The scariest threats out there are the ones that can crack your network without you even realizing it. That’s right, they’re using stolen credentials that they tricked your employees into handing over through a phishing attack. The good news, though, is that a simple multi-factor authentication solution (MFA) can be a significant step forward for your network security, and the simple act of having one makes your business much safer and less prone to cybersecurity breaches.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here