{"id":781,"date":"2021-09-15T04:52:44","date_gmt":"2021-09-15T04:52:44","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=781"},"modified":"2022-06-17T09:20:19","modified_gmt":"2022-06-17T09:20:19","slug":"four-risky-corporate-email-mistakes","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/","title":{"rendered":"Four Risky Corporate Email Mistakes"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\" alt=\"10 biggest email mistakes for business pros to avoid - TechRepublic\" \/><\/p>\n<p>Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage. They usually state that email should only be used for business correspondence and not for personal correspondence.<\/p>\n<p>Is it acceptable to use your work email address to complete a transaction or should you use your personal email if you travel frequently for work?<\/p>\n<p>This question \u2014 and the aftermath of not making the right choice \u2014 can create a complex situation and security risk that most employers ignore. Sadly, they have no way to manage or mitigate the risk. Consider today&#8217;s real-world business scenarios:<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#1st_Scenario\" >1st Scenario<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#2nd_Scenario\" >2nd Scenario<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#3rd_Scenario\" >3rd Scenario<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#4th_Scenario\" >4th Scenario<\/a><\/li><\/ul><\/nav><\/div>\n<h4><span class=\"ez-toc-section\" id=\"1st_Scenario\"><\/span>1st Scenario<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>An employee uses the company email to register on an airline&#8217;s website. This address is used to log in and book flights or other travel arrangements.<\/p>\n<p>Any notifications or future flight bookings are tied to the suspended business email account. If your company auto-forwards emails to peers or managers, an identity theft risk has been created. One of the former employee&#8217;s coworkers can simply select &#8220;forgot password&#8221; and own the account. This is especially true if there are no security questions or two-factor authentication. If the same email address is used for verification, the game is over.<\/p>\n<p><strong>Recommendation:<\/strong> Instead of allowing employees to book travel on their own using a corporate email account, organizations should enforce the use of an approved corporate travel service. Allow and encourage individuals to book travel using personal email accounts, even if they pay with a corporate credit card. It is their account.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"2nd_Scenario\"><\/span>2nd Scenario<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Some employees use personal email for group correspondence, such as school correspondence.<\/p>\n<p>Consequences for security: Receivers of forwarded emails may be exposed to highly personal information, possibly in violation of FERPA, HIPAA, or other regulations.<\/p>\n<p><strong>Recommendation:<\/strong> Corporate email addresses should only be used for business purposes. The results can be interesting legally, especially if removing an address from a group is not simple.<\/p>\n<p>Today, the lines between work and personal life are increasingly blurred, benefiting both employers and employees (more flexibility, higher productivity, etc.). Strict corporate email policies will only increase risk as employee turnover occurs and our reliance on electronic communication grows.<\/p>\n<p>Organizations that support mobile devices should consider allowing personal email addresses for the same reasons. Employee termination policies must clearly define acceptable personal usage, when it is acceptable and when it is not.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"3rd_Scenario\"><\/span>3rd Scenario<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Some organizations accept payments via PayPal or Apple Pay. Some employees (like marketing team members) require these to do their jobs. It is not recommended to use a user&#8217;s corporate email address. They should create a group or alias for business email addresses.<\/p>\n<p>As with the first scenario, a personal account used for services can be used against an individual if they leave and cannot change their email address.<\/p>\n<p><strong>Recommendation:<\/strong> In these situations, a dedicated account name is preferred over an email address. Account owners can change their email addresses, but this option is risky if the account is shared. Inadequate privileged access controls and shared accounts continue to be threats to former employees.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"4th_Scenario\"><\/span>4th Scenario<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Most companies have an email schema. First initial, last name, or first name-dot-last name<\/p>\n<p>What happens when an employee leaves and a new employee starts with the same name or initials? Unsolicited email from the former employee may be received by the new employee. Depending on the new employee&#8217;s role, the email may not be appropriate (e.g. PII and financials). Increasingly, names and initials will likely overlap in growing organizations.<\/p>\n<p><strong>Recommendation:<\/strong> Never use former employees&#8217; email addresses for new employees. To avoid future issues, consider appending a number like \u201c01\u201d to new email addresses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage. They&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,22,1],"tags":[],"class_list":["post-781","post","type-post","status-publish","format-standard","hentry","category-email-marketing","category-mobile-marketing","category-tech-how-to"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"description\" content=\"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T04:52:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-17T09:20:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"Four Risky Corporate Email Mistakes\",\"datePublished\":\"2021-09-15T04:52:44+00:00\",\"dateModified\":\"2022-06-17T09:20:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\"},\"wordCount\":611,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\",\"articleSection\":[\"Email Marketing\",\"Mobile Marketing\",\"Technical How-To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\",\"url\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\",\"name\":\"Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\",\"datePublished\":\"2021-09-15T04:52:44+00:00\",\"dateModified\":\"2022-06-17T09:20:19+00:00\",\"description\":\"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage\",\"url\":\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\",\"contentUrl\":\"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Four Risky Corporate Email Mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog","description":"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog","og_description":"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.","og_url":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2021-09-15T04:52:44+00:00","article_modified_time":"2022-06-17T09:20:19+00:00","og_image":[{"url":"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"Four Risky Corporate Email Mistakes","datePublished":"2021-09-15T04:52:44+00:00","dateModified":"2022-06-17T09:20:19+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/"},"wordCount":611,"commentCount":0,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"image":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg","articleSection":["Email Marketing","Mobile Marketing","Technical How-To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/","url":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/","name":"Four Risky Corporate Email Mistakes - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg","datePublished":"2021-09-15T04:52:44+00:00","dateModified":"2022-06-17T09:20:19+00:00","description":"Onboarding typically includes signing an employee handbook that includes acceptable technology usage policies and guidelines. Details often contain policy restrictions regarding unacceptable email usage.","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#primaryimage","url":"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg","contentUrl":"https:\/\/www.techrepublic.com\/a\/hub\/i\/r\/2019\/07\/25\/7ead1942-fbb6-4fbd-83ed-8209da13a181\/thumbnail\/770x578\/38932072008deeeb9ae3488e84e5925a\/email-istock-1025157898-suwareetangbovornpichet.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2021\/09\/15\/four-risky-corporate-email-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Four Risky Corporate Email Mistakes"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=781"}],"version-history":[{"count":2,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/781\/revisions"}],"predecessor-version":[{"id":1036,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/781\/revisions\/1036"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}