Welcome to the First Column IT Tech Blog

HomeBlog
Organizing Your Emails Can Be Pretty RAD

Organizing Your Emails Can Be Pretty RAD

July 23, 2024

Struggling to manage your overflowing email inbox? You're not alone. Many professionals find it challenging to achieve the elusive "inbox zero." If you're ready to transform how you handle your emails, consider adopting the RAD method. This approach, developed by Nick Sonnenberg, founder and CEO of Leverage, could revolutionize your email management.

Understanding Inbox Zero

"Inbox zero" refers to having no visible emails in your inbox—not just no unread emails. Even read emails clutter your inbox, making it hard to find important messages. Achieving inbox zero involves archiving messages so they're out of sight but still accessible when needed. Sonnenberg suggests archiving emails older than 30 days, as they're likely irrelevant or will be followed up on if still important.

Introducing the RAD Method

The RAD method simplifies email management into three actions: reply, archive, and defer.

Reply to Messages

Respond to emails that require your attention, then archive them immediately. If the conversation continues, the email will reappear in your inbox, so there's no harm in archiving it right away.

Archive Messages

Archive emails that don't need a response. These messages can be easily searched if needed later, keeping your inbox clutter-free.

Defer Messages

For emails that need a response but not immediately, defer them. Use Gmail's "snooze" feature or the Boomerang plugin for Outlook to temporarily remove the email from your inbox and have it reappear at a specified time. This is useful for reminders or delaying a response until you're ready.

Learn more about Nick Sonnenberg's strategies in his book, Come Up for Air: How Teams Can Leverage Systems and Tools to Stop Drowning in Work, and on his website.

Simplify Your Business Communications

A well-managed inbox can make your business operations smoother. We offer email management systems with secure, searchable, encrypted archives. Contact us at (571) 470-5594 to learn more.

Previous Post
February 27, 2026
Your Eight-Character Passwords are Truly Obsolete
For literal decades, we heard that a good password required a few key traits to be secure: a capital letter, a number, and eight characters. How times have changed, right?
February 25, 2026
3 Simple Cybersecurity Lessons for the Modern Business Environment
Sometimes the toughest lessons that hurt the most are the ones we need the most, as is the case with anything cybersecurity related. You don’t want to experience a data breach, regardless of how it’s caused, but preventing them is a bit more challenging than you might at first expect. If you want to avoid losing time, money, and reputation needlessly, then take these three cybersecurity lessons into consideration today.
February 23, 2026
What to Do Before (And After) a Data Breach
One of the biggest myths out there related to cybersecurity is that criminals only go after the big enterprises. Why should they care about your small operation, anyway? In reality, cybercriminals love to attack small businesses to take advantage of their weaker security infrastructures. If you’re not careful, this could lead to serious losses for your business stemming from a loss of trust, legal fees, and operational downtime.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here