facebook linkedin twitter

Computerware Blog

How to Successfully Manage Your Reputation

How to Successfully Manage Your Reputation

In the business world, it’s easy to step on someone’s toes without realizing it until it’s too late. Nowhere is this more true than with anyone you provide goods or services. Managing your online reputation is especially important, as anyone could get on their social media accounts and slander your organization or write up a bad review of their experiences. We’ll show you how to mitigate the damage done.

Have you ever heard the phrase, “The customer is always right?” Well, this is true. The meaning behind this is that you’re still obligated to help your customers, even if they may have misinterpreted or misunderstood the extent of your services. We don’t mean to bow to every wish of your customers--merely provide them with customer service or something to placate them and soothe their anger. To this end, communication is key.

How to Communicate with an Unhappy Client

Let’s say you are reading reviews for your product on a website. You find an unhappy review, be it a scathing indictment of your company’s failure to please them or a simple Facebook comment complaining about something-or-other. You might be upset about it, and you don’t have to like it, but it’s still your responsibility to make things right. You just have to make sure that this unhappiness doesn’t translate into your interactions with the client moving forward, as it makes “peace negotiations” more challenging. Go into this process understanding that the client has every right to be upset.

Retain a cool composure and respond both directly and politely to any negative review. This initial contact should be public so that others can see you trying to make amends. Offer to make it right in a less-than-public way, too. If the reviewer accepts, try to create a situation that is mutually beneficial to each of you.

While it might be tempting to just remove the negative review, think again--if you delete it, you might appear to be hiding something. You should use this opportunity to resolve an issue and encourage a user to revise their review to include how promptly you addressed the issue.

Reviews Can Help You Out

If you find new reviews that are good, you can always respond to them and use them as a jumping off point for keeping an established connection with a valued customer strong. Think about it this way; if a customer notices that you only respond to negative reviews on your public profiles or website, they will think you are in a perpetual damage control mode with no appreciation for the people who take the time to leave a nice review. In its most basic form, a good review is a result of a successful onboarding process, meaning that contacts have been engaged and satisfied beyond the services rendered.

While managing your reputation can be challenging, it’s a necessary part of your organization’s success. Computerware can help your organization have an easier time of it by managing your technology. To learn more, reach out to us at (703) 821-8200.

Tip of the Week: File Management Tips
What Happens When Your Microsoft Office 365 Subscr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 26, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Computer Google User Tips Small Business Innovation IT Support IT Support Data Backup Smartphones VoIP Collaboration Mobile Devices Quick Tips Network Business Continuity communications Microsoft Office Gadgets Android Data Recovery Social Media Disaster Recovery Upgrade Cybersecurity Mobile Office Server Communication Virtualization Smartphone Miscellaneous Phishing Mobile Device Management Vendor Management Ransomware Holiday Passwords Windows 10 Outsourced IT Operating System Tech Term Windows Mobile Device Managed IT Services Apps Facebook Internet of Things Users Remote Monitoring Unified Threat Management Automation BDR Analytics Data Management BYOD Remote Computing Mobile Computing Apple Managed IT services Windows 10 WiFi Cloud Computing Marketing History Artificial Intelligence The Internet of Things Browser Save Money Firewall Training Help Desk Alert App Big data Encryption IT Consultant Office Bandwidth Office 365 Two-factor Authentication Spam Health Information Technology Business Technology Government Hard Drives Cybercrime Bring Your Own Device Antivirus Maintenance Access Control Managed IT Printer Budget Content Filtering Windows 7 Gmail Going Green Hiring/Firing Recovery Employer-Employee Relationship Retail Saving Time Computers Information Outlook Wireless Technology Windows 8 VPN Cost Management Search Healthcare Virus Tech Support Managed Service Lithium-ion Battery Best Practice Data Loss IBM Networking Document Management Phone System Augmented Reality Project Management Computing Travel Hacking Education Humor Update iPhone It Management Customer Service Money Blockchain Legal Storage Website Hard Drive Customer Relationship Management Current Events Computer Repair Running Cable Mobility Regulations Proactive IT PowerPoint Data Breach Value SaaS Password Twitter Administration Intranet Hacker Law Enforcement Solid State Drive Risk Management Avoiding Downtime Compliance Data storage Covid-19 Flexibility Applications Data Security Save Time Wireless Downtime Conferencing File Sharing Patch Management Comparison Tablet Company Culture Google Maps Scam Monitoring Voice over Internet Protocol Paperless Office Word Social Networking Social Engineering Sports Digital Disaster Management Cortana Hosted Solution Meetings Websites End of Support Fax Server Robot Vulnerabilities Private Cloud Wi-Fi Securty Cooperation Telephony Software as a Service Remote Work Vendor Machine Learning Net Neutrality Telephone Systems User Black Market Virtual Desktop Business Intelligence Cryptocurrency Social Digital Payment Laptop Router Excel Business Growth DDoS Cleaning Monitors Trending Office Tips Integration Virtual Reality User Error Politics Co-managed IT Redundancy Smart Devices Mouse Emails Gaming Console YouTube Automobile Unified Communications Settings eWaste Statistics Chromebook Managed Services Provider Evernote Programming Multi-factor Authentication Computing Infrastructure Hack Webcam Network Congestion Text Messaging Virtual Assistant Telephone Lifestyle How To Tech Terms Download Managed Services Employee/Employer Relationship Start Menu Managed IT Service Mobile Technology Streaming Media IT service Processors USB Uninterrupted Power Supply Microchip Taxes Presentation Inbound Marketing Processor Distributed Denial of Service Vulnerability Bluetooth Bitcoin Specifications Safety Chrome Data Protection Distribution Pain Points Public Cloud Licensing Documents Google Docs Memory Identity Theft Downloads Experience Teamwork Heating/Cooling Professional Services Entertainment Computer Accessories Corporate Profile Virtual Private Network Multi-Factor Security Cost GDPR Notifications Managing Risk CCTV Upselling Time Management Freedom of Information Software License Trends SQL Server Flash PDF LinkedIn Devices Tech Business Metrics Hypervisor Computer Malfunction Assessment SharePoint CIO Fraud Tactics Reliable Computing Video Surveillance Development Advertising Fileless Malware Hybrid Cloud In Internet of Things Saving ZTime Google Calendar Staffing Google Wallet Best Available Keyboard Holidays Tip of the week Windows XP UTM Content VoIP Procurement Society Skype Legislation Error Modem Webinar Strategy Touchscreen News Displays Domains Archive IT Plan Enterprise Resource Planning Proxy Server Azure Accountants A.I. Term Motion Sickness Harddrive Consultation Micrsooft Public Speaking email scam Addiction Electronic Medical Records Transportation Scalability Debate Knowledge Video Conferencing Directions Display Technology Tips Drones Shortcut Point of Contact Recording Messenger Optimization Tracking GPS Communitications External Harddrive Audit Supply Chain Management Entrepreneur Wireless Headphones SSID Rental Service How To Fake News Troubleshooting Migration Connected Devices Dark Web Free Resource Internet Service Provider Permissions Language Environment Equifax Fleet Tracking Processing Web Server Data Warehousing HIPAA Network Management Health IT Cabling Device security MSP Best Practives Wasting Time Administrator Thin CLient Access Competition Analytic Logistics Books Virtual Machines Workers 3D Ebay Emergency IT Assessment Hard Drive Disposal Electronic Payment Recycling Smart Phones Computer Care Remote Working Music Product Reviews Nanotechnology Social Network Cyber security Supercomputer Microsoft Excel switches Writing Business Owner Desktop Finance Bookmark Startup Asset Tracking Google Play Telephone Service Google Drive Windows Server 2008 Upgrades IP Address Read Business Cards Service Level Agreement Employer/Employee Relationships Microserver Worker Human Resources Username Managing Costs Leadership Spyware Mobile Payment Application Unified Threat Management Backup and Disaster Recovery Microsoft 365 Reading Samsung Adminstration Pirating Information Electronic Health Records LiFi Browsers Get More Done G Suite Electricity Printing Screen Reader Customer Resource management Medical IT Trend Micro Employer Employee Relationship Memes Device Management Gamification Managing IT Services Work/Life Balance Business Managemenet Smart Tech Security Cameras Hacks Printer Server Threats Physical Security Deep Learning Content Management Piracy Upload User Tip Proactive Maintenance Turn Key HTML Navigation Banking Trojan Virtual Machine Botnet cache Television Digital Signature Fiber-Optic Database Solutions Relocation Tablets Surveillance Visible Light Communication Data Analysis Employees Sync WannaCry Remote Workers Telephone System Organize eCommerce IT IT consulting online Currency Mobile Security Printers Regulation CrashOverride Capital Personal Information Productuvuty Financial 3D Printing Managing Stress