window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORTLunch & Learn

TaylorWorks Blog

How to Mitigate Unhappy Online Opinions

How to Mitigate Unhappy Online Opinions

As nice as it would be to always please everybody with your business services, it just isn’t going to happen. Sooner or later, you’re going to encounter someone who isn’t pleased, and they’re going to have the capability to do some damage to your reputation. Fortunately, there is a way you can mitigate this damage.

The first thing you need to remember is that, while your unhappy customer or client may not be correct, they are always right. What does this mean? Simple - even if they misinterpreted what they were entitled to through your services, you have the obligation to make them happy. This is not to say that you kowtow to every demand a customer makes, regardless of how ludicrous it is… you just need to make sure they stay happy.

How can you do this? It all boils down to communication.

How to Communicate With an Unhappy Client

Chances are, you’re going to find out that a client was unhappy by reading a review that they leave somewhere online - perhaps on Facebook, or on Google, or on a third-party review website. What they will have to say may upset you. That’s fine. Nobody likes to hear that there is something wrong with one of their endeavors. You have every right to be a little upset - just don’t let that upset seep into your conversation with your unhappy client.

After all, in their eyes, they have every right to be upset as well.

Therefore, once you’ve regained a cooler composure, you need to respond directly and politely to the negative review. While this initial interaction should be public, offer to continue your conversation in a less public way, in an offline forum. If the reviewer accepts, try to come to a mutually beneficial compromise with them. This will help to insulate you from a rash decision.

This brings up another important point - while you may really want to, you should never just remove a negative review. Not only will that make it look like you are hiding something (not good), it also squanders the opportunity to make lemonade out of your reviewer’s lemons. Again, try to make whatever issue your reviewer had right, and ask them to revise their review once things have been settled. If you play your cards right, the result could be a much better review, describing the care you put into fixing their issue.

Reviews Can Be Good, Too!

Whenever they are, you have another opportunity to embrace by responding to them.

I can almost hear you now: “Wait, if a reviewer is happy, doesn’t that mean I’ve done what I had to do?”

In a way, yes. If someone is willing to leave a positive review of your services, you clearly were able to strike a chord with them. However, while responding to a negative review could be somewhat accurately seen as damage control, responding to a positive review has a very different motivation to it.

Look at it this way: anyone who is willing to take the time out of their day to speak highly of you online is an invaluable ally to have. Positive reviews and negative reviews are very different things, especially in that people are generally more inclined to leave negative feedback if they have the opportunity.

Reflecting on this, it only makes sense to take the time and respond to positive reviews as well. A positive review is more or less a confirmation of a successful onboarding process - to keep these contacts engaged, you need to continue communicating with them beyond the point that their invoice is settled.

Are you happy with our services or our content? If so, we’d love to hear about it. Leave us a review or drop us a line in the comments!

Tip of the Week: Your Phone Can Work as Your Secur...
Shrug Off Downtime with Managed IT Services
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, May 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Email Data Recovery Productivity Internet Innovation User Tips VoIP Mobile Devices Data Google Outsourced IT Communications Internet of Things Microsoft Tech Term Efficiency IT Services Cybersecurity Backup Hardware Cloud Computing Software Business Continuity Business Communication BDR IT Support Artificial Intelligence Android Workplace Tips Saving Money Business Management Smartphones Small Business Gadgets Disaster Recovery Managed IT Services Ransomware Windows 10 Smartphone Mobile Device Router Cybercrime Phishing IT Support Network Applications Collaboration Browser Chrome Server Encryption BYOD Windows Law Enforcement Managed IT Spam Training Computer How To Business Intelligence Users Office 365 Information Blockchain Proactive IT Data Security Access Control Save Money Social Media Computers Data Protection Avoiding Downtime Mobile Device Management Two-factor Authentication Virtualization Passwords Word Holiday Money Mobility Servers Document Management Productivity Alert Machine Learning Automation Compliance Operating System Firewall Bandwidth Social Engineering Paperless Office Miscellaneous Redundancy IT Management Upgrade Analysis Managed Service App Voice over Internet Protocol Remote Monitoring Business Technology Vulnerability Facebook Software as a Service Wi-Fi Settings Manufacturing Identity Theft Private Cloud Telephone Systems Connectivity Education Apps File Sharing Keyboard Credit Cards Hacker Update Budget Meetings Botnet Microsoft Office Spam Blocking Content Management Work/Life Balance Fraud Save Time Big Data Data loss Website Value Mobile Computing Health Google Docs Smart Tech Display Virtual Reality Scam Help Desk Networking Human Resources Wireless Unified Threat Management Employer-Employee Relationship Virtual Private Network Workers IT Plan Google Drive Cryptocurrency Windows 7 Infrastructure VPN Flexibility Staff Healthcare Comparison Solid State Drive OneNote Telephony Password Unsupported Software Information Technology Virtual Assistant Business Owner Data Storage Government Augmented Reality Remote Computing Cables Bring Your Own Device Telephone System Data Breach CES Sports Business Mangement Marketing E-Commerce Database Conferencing Public Cloud Enterprise Content Management The Internet of Things Social Millennials Cortana Unified Communications Devices Line of Business File Versioning Network Congestion Search Engine Samsung Excel Employee Downtime Start Menu Wireless Charging Smart Office Printer OLED Charger Physical Security Lifestyle Inventory Computer Fan Flash Gmail Addiction Camera Data Warehousing WiFi Managed Service Provider IoT Password Management Vendor Tip of the week Workforce Theft Thought Leadership MSP Multiple Versions Patch Management Electronic Medical Records IT Consultant Travel End of Support Strategy YouTube Bing Risk Management Digital Signage Mobile Mouse Cabling FENG Amazon Office Tips Recycling Cache Distribution PDF NIST Windows Server 2008 Telecommuting Technology Tips Quick Tips Google Apps Streaming Media Remote Worker Restore Data Leadership Screen Mirroring Windows 10s Authentication Google Search Black Market Content Filtering Professional Services HaaS Students Administrator Default App Netflix HBO Instant Messaging Sync Amazon Web Services eWaste Wireless Internet Logistics Hacking Insurance Windows 10 Security Cameras Remote Work Content Filter Wiring Backup and Disaster Recovery Worker Commute Cast Shortcuts HIPAA SaaS Fiber-Optic Nanotechnology Proactive Net Neutrality Battery Current Events Tools Microchip Legal Entertainment Cleaning Outlook USB Online Shopping Criminal Wire Project Management Multi-Factor Security Hard Drives Practices Safe Mode Employee/Employer Relationship Audit Regulations Password Manager Storage GDPR Cryptomining webinar Accountants HVAC eCommerce Remote Monitoring and Maintenance ISP Knowledge Root Cause Analysis Computing Infrastructure Digital Signature Electronic Health Records Wireless Technology 5G Computer Care Frequently Asked Questions Specifications Smartwatch Recovery Skype Evernote Warranty Biometric Security Data Management Vendor Management Emails Software Tips Trending Hosted Computing Scalability Assessment Humor Twitter Smart Technology Bluetooth Emergency Internet Exlporer Regulation Customer Relationship Management Shadow IT Hosted Solution User Error Competition Webinar Experience Television IP Address Analytics Hybrid Cloud Customer Service Content IT solutions Hiring/Firing Music Public Computer Printers Mobile Office Worker Fun Internet exploMicrosoft Company Culture Domains Politics Loyalty Audiobook Wearable Technology Files Rootkit Office Transportation Employer Employee Relationship Advertising Managing Stress Public Speaking Video Games Books Colocation Presentation How to History Lithium-ion battery Automobile Relocation Benefits Computer Accessories Search Tech Support Two Factor Authentication Utility Computing Best Practice IBM Troubleshooting CrashOverride Techology Safety

Mobile? Grab this Article!

QR-Code dieser Seite