Email

is the medium of choice for communicating with clients. Our servers automatically filter spam and viruses and back up all emails, both sent and received. We also have Tessian, which scans incoming and outgoing emails and provides you with warnings as to possible issues that you must heed.

You should refer to the Getting Started Guide in relation to email set-up and to File Maintenance and Naming below in relation to filing emails.

If you don't have access to your laptop or phone, then you may wish to access your email account through the Internet. You can go to http://outlook.office.com and sign in with your Keystone email account and be prompted for your 2-factor authentication as you sign in. This can be accessed from any popular browser including Chrome, Safari, Edge and Firefox. This will give you very similar access to your Outlook folders, contacts and appointments.

Your Keystone email address should not be used for personal correspondence or business correspondence that does not relate to Keystone. This email account can, and if necessary, will be accessed by Central Office. See our IT Usage Policy for further details. You should also note the sections in the IT Usage Policy dealing with phishing and security. It is vital you do not click on links or open attachments where there is some doubt as to their probity and that you check all email addresses and attachments when sending emails. We advise against sending material emails on a mobile device where errors are harder to avoid.

There are email distributions lists that can be used to email colleagues and Central Office.

We use the following email groups in Central Office:

Document Upload System