Welcome!

News Feed Item

Information Workers Becoming ‘Inbox Workers’ as Reliance on Business Email Grows

Information workers’ reliance on email is turning them into ‘Inbox Workers’ who spend the majority of their time on email and shun social media at work, according to new research launched today by Mimecast®, the leading supplier of cloud-based email archiving, continuity and security for Microsoft Exchange, Hosted Exchange and Office 365.

The research – the second in Mimecast’s Shape of Email series – surveyed 2,500 information workers in the U.S., U.K. and South Africa to explore the average employee’s attitudes to, and frustrations with, email. The report found that on average an information worker will use email for four hours per day; equivalent to more than 37 full 24-hour days over a working year, 111 working days, or 888 working hours.

However, users are also frustrated by the limitations of email. Just one in four users report high levels of satisfaction with their email functionality and one in three expect email and social media to converge in the next five years. It is clear that email needs to evolve if it is to cope with the demands of modern day Inbox Workers, who see email not just as a communications tool but as a file store, search engine and collaboration platform.

So, what is an Inbox Worker? And how can you tell if you are one? Here are a few tips:

  • You use your inbox as a default file server and search tool – No longer just a tool for sending and receiving messages, an Inbox Worker’s email account is their default way of storing, filing and searching for documents or information:
    • Eighty-six percent of email users surveyed rely on email as a search tool to find documents or information from within their inbox or archive
    • However, with email systems rarely designed for rapid searching, these searches take two minutes on average, suggesting that a lack of intelligent search capability is contributing to the huge amount of time spent using email every day
    • Despite this, one in two (49 percent) believe that email is reducing the need for other file storage systems
  • Your use of work email has been unaffected by social media – Inbox Workers use social media, but it is primarily for personal use. The rise of social media has had little impact on their reliance upon work email:
    • Shape of Email found that email is preferred over social media for all forms of workplace collaboration, including documentation exchange (preferred by 91 percent of respondents), arranging a meeting (89 percent), requesting information (88 percent) and sharing views and opinions (72 percent)
    • Seventy-eight percent of email users say that social media has not reduced their reliance on email for dealing with customers and 76 percent say that it has not reduced the need for email when communicating with colleagues
    • Seventy-four percent of information workers believe that information shared in an email is taken more seriously than information shared through social media
  • Your love of email can lead to bad habits – With Inbox Workers relying on email for so much of their working day, their dependence can give rise to bad corporate behavior:
    • While 39 percent of information workers regularly send and receive workplace email outside of working hours, 25 percent of email users admit that they have sent emails late in the evening purely to “show commitment”
    • Seventy-five percent say that they have sent emails they have later regretted, with 40 percent having deleted emails they shouldn’t have
    • Even more worrying, 10 percent of those surveyed admitted to having read emails in other people’s inboxes
  • You like to be kept in the loop – Inbox Workers like to be copied on emails, even if they are non-essential messages:
    • Nearly half (45 percent) of email users believe that it is useful to be copied on emails internally with 35 percent saying that they find “CC” email a really useful way of staying on top of external communications. Just one in five (21 percent) believe that “CC” email is overused within their company
    • This might explain why 40 percent of all emails received are considered to be functional, or of low value and just 14 percent of all emails received are considered business critical
    • On average, email users receive 32 emails a day, containing 4.5 megabytes of data in total
  • Also, IT teams overestimate the impact of social media on email usage:
    • One in three IT decision makers thought that the use of social collaboration tools had reduced employees’ reliance on corporate email when surveyed for Mimecast’s first Shape of Email report. However, this is not borne out by the experience of employees
    • While 32 percent of IT teams thought that social tools had reduced the need for email when communicating with colleagues, only 24 percent of information workers agreed
    • And while 30 percent of IT managers thought that social media has impacted the need for email when dealing with customers, just 22 percent of users felt the same

“The research shows that the way the average employee uses email at work has changed,” commented Peter Bauer, CEO and co-founder, Mimecast. “For many people, email is no longer just a messaging system. It has become the primary tool for storing, sharing and searching for information. This is why we are seeing information workers increasingly becoming Inbox Workers; they rely on email for all aspects of their job and spend, on average, 50 percent of their working day using email.”

“What is clear is that, despite the huge number of specialist collaboration and social tools that have come to market in recent years, email remains the first choice for the majority of business users,” Bauer continued. “While email is not perfect, it seems that information workers are reluctant to adopt other, more social, tools if it means they have to leave their inbox behind. Therefore, rather than trying to entice users away from email and on to other platforms, IT teams should look for ways to make their email more efficient by introducing new, inbox-friendly collaboration tools and making the data stored within the archive more accessible.”

For further information on Mimecast’s Shape of Email Report, please visit: www.mimecast.com/shapeofemail

About the research

The research surveyed over 2,500 information workers from the UK, USA and South Africa. The research was conducted by Loudhouse on behalf of Mimecast in Summer 2012.

About Mimecast

Mimecast (www.mimecast.com) delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 6,000 customers and 1.5m users worldwide and has offices in Europe, North America, Africa and the Channel Islands.

Mimecast social media resources

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...