Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Write an Email that Will Actually Get Replied To

Tip of the Week: How to Write an Email that Will Actually Get Replied To

Have you ever been in a situation where you’re watching your inbox, waiting for a response that probably isn’t coming? This is a problem that’s all too common, and it’s because the average business owner could very well be stymieing their own progress by sending emails that are too long, too wordy, or even too brief. A study by Boomerang suggests that there are four ways to make emails more viewer-friendly.

Keep it Simple
One of the easiest ways to improve your chances of a response is to keep your emails as simple as possible. Boomerang found that emails written at a third-grade reading level were more appealing (53 percent) than those written at a college reading level (39 percent). Using this information, you can hone in on the subject matter and make it both easier to understand and easier to read. Granted, the context of the email will largely determine what kind of content is found within, but regardless, the typical email (like those seen in an update or a follow-up) should be short, sweet, and to the point.

Tone it Up
Words are a great medium to convey emotion. Boomerang found that creating a slight sense of dissatisfaction or happiness can help to incite a response to an email. The difference could be anywhere between 10-to-15 percent compared to neutral or passive emails. In this situation, it’s more important than ever to make your enthusiasm or anger feel believable. Therefore, you should avoid being overly negative or positive, because if the receiver manages to read between the lines, they’ll realize that the email is actually quite empty and that you’re not being genuine with them.

Mind the Length
When typing up an email, consider its length. Would you want to stop what you’re doing during the day to read a mountain of text? You can’t expect to keep someone’s attention for that long, and considering how many emails business executives receive every day, you can bet that the super-lengthy ones get swept under the rug and forgotten about. If you want to maximize the chance of your email being responded to, try to keep it between 50 and 125 words. This will provide somewhere around a 50+ percent chance of receiving a response.

Keep the Subject Line Short
Long email subject titles are a sure sign of an email that’s just begging to not get read. Therefore, in order to achieve the highest chances of securing a response, you should attempt to limit your email subject headings to about three or four words. This provides a 48 percent chance of being responded to. Also, be sure to provide a subject, as messages without a subject heading only receive a response about 14 percent of the time.

These tips can help you craft emails that will have the highest chance of being replied to. You won’t have to worry about missing out on a great business deal due to a message slipping through the cracks and being ignored. What are your strategies for getting your colleagues to read your emails? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Holiday Automation Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail App WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Managed Services Voice over Internet Protocol BDR HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To Healthcare Operating System Big Data Router Virtual Private Network Risk Management Health Help Desk Computers Office Tips Analytics Augmented Reality Retail 2FA Storage Website Password Bring Your Own Device Managed IT Services Going Green Patch Management Save Money The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Cybercrime Windows 7 Social Physical Security Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Customer Service Monitoring Document Management Windows 11 Telephone Scam Data loss Excel Firewall Cooperation Remote Workers Safety Telephone System iPhone Robot Cost Management Settings Printing Vulnerabilities Wireless Content Filtering Data Privacy IT Management Images 101 VPN YouTube Meetings Multi-Factor Authentication Cryptocurrency Mobility User Tip Modem Computer Repair Mobile Security Processor Customer Relationship Management Virtual Desktop Data storage LiFi Employees Integration Hacking Smart Technology Outlook Presentation Machine Learning Money Saving Time Humor Wireless Technology Holidays Managed IT Service Maintenance Data Storage Antivirus Supply Chain Sports Downloads Video Conferencing Mouse Word Licensing Managed Services Provider Virtual Machines Professional Services Entertainment Administration Entrepreneur How To Microsoft Excel Net Neutrality Legal Data Analysis SQL Server Technology Care IT solutions Star Wars Business Growth Gamification Business Communications Notifications Staff Financial Data History IT Scams Travel Social Networking Legislation Smartwatch Cortana Procurement Techology Fileless Malware Azure Hybrid Work Undo Google Maps Alt Codes Content Tech Human Resources Wearable Technology Telework Cyber security CES Communitications Health IT Cables Downtime Unified Threat Management Motherboard Comparison Permissions Supply Chain Management Unified Threat Management Directions Hosted Solution Assessment Typing Term Google Apps FinTech IT Assessment IT Maintenance Application Network Congestion Specifications Knowledge Fraud Flexibility Google Drive User Error Microchip Value Business Intelligence Internet Exlporer IBM Username Shortcuts Organization Digital Security Cameras Smart Devices Ransmoware Point of Sale 5G Black Friday Experience Remote Working Google Docs Memory Vendors Unified Communications Database Data Breach Bitcoin Network Management Google Play Be Proactive Running Cable Tech Support IT Technicians Videos Electronic Health Records Google Wallet Proxy Server Workforce Cookies Monitors Cyber Monday Hotspot Wasting Time Threats Competition Tactics Trend Micro Windows 8 Security Cameras Workplace Strategies Laptop Websites Mirgation Software as a Service Drones Meta Nanotechnology Electronic Medical Records Language SharePoint Managing Costs Amazon Addiction eCommerce Management SSID User Halloween Chatbots Surveillance Lenovo Virtual Assistant Outsource IT Screen Reader Writing Distributed Denial of Service Media Virtual Reality Computing Infrastructure Virtual Machine Environment Service Level Agreement IP Address Hacks Server Management Medical IT Scary Stories Private Cloud Identity Reviews Development Superfish Bookmark Transportation Small Businesses Identity Theft Smart Tech Fun Deep Learning Download Twitter Alerts Hypervisor Displays Optimization PowerPoint Recovery Error Shopping Social Engineering Break Fix Browsers Employer/Employee Relationships Outsourcing Hard Drives Education Connectivity Upload Navigation Remote Computing PCI DSS Domains Mobile Computing Social Network Workplace Multi-Factor Security Gig Economy Search Dark Web Internet Service Provider Teamwork Hiring/Firing Refrigeration Tablet IoT Public Speaking Best Practice Trends Evernote Paperless Alert Regulations Compliance Memes Lithium-ion battery Managed IT Customer Resource management Co-managed IT Buisness File Sharing Regulations Dark Data Google Calendar

Blog Archive