facebook linkedin twitter

Computerware Blog

How to Successfully Manage Your Reputation

How to Successfully Manage Your Reputation

In the business world, it’s easy to step on someone’s toes without realizing it until it’s too late. Nowhere is this more true than with anyone you provide goods or services. Managing your online reputation is especially important, as anyone could get on their social media accounts and slander your organization or write up a bad review of their experiences. We’ll show you how to mitigate the damage done.

Have you ever heard the phrase, “The customer is always right?” Well, this is true. The meaning behind this is that you’re still obligated to help your customers, even if they may have misinterpreted or misunderstood the extent of your services. We don’t mean to bow to every wish of your customers--merely provide them with customer service or something to placate them and soothe their anger. To this end, communication is key.

How to Communicate with an Unhappy Client

Let’s say you are reading reviews for your product on a website. You find an unhappy review, be it a scathing indictment of your company’s failure to please them or a simple Facebook comment complaining about something-or-other. You might be upset about it, and you don’t have to like it, but it’s still your responsibility to make things right. You just have to make sure that this unhappiness doesn’t translate into your interactions with the client moving forward, as it makes “peace negotiations” more challenging. Go into this process understanding that the client has every right to be upset.

Retain a cool composure and respond both directly and politely to any negative review. This initial contact should be public so that others can see you trying to make amends. Offer to make it right in a less-than-public way, too. If the reviewer accepts, try to create a situation that is mutually beneficial to each of you.

While it might be tempting to just remove the negative review, think again--if you delete it, you might appear to be hiding something. You should use this opportunity to resolve an issue and encourage a user to revise their review to include how promptly you addressed the issue.

Reviews Can Help You Out

If you find new reviews that are good, you can always respond to them and use them as a jumping off point for keeping an established connection with a valued customer strong. Think about it this way; if a customer notices that you only respond to negative reviews on your public profiles or website, they will think you are in a perpetual damage control mode with no appreciation for the people who take the time to leave a nice review. In its most basic form, a good review is a result of a successful onboarding process, meaning that contacts have been engaged and satisfied beyond the services rendered.

While managing your reputation can be challenging, it’s a necessary part of your organization’s success. Computerware can help your organization have an easier time of it by managing your technology. To learn more, reach out to us at (703) 821-8200.

Tip of the Week: File Management Tips
What Happens When Your Microsoft Office 365 Subscr...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Managed Service Provider Hardware Productivity Network Security Email Business Hosted Solutions Saving Money Malware IT Services Efficiency IT Support Google User Tips Small Business Computer Innovation Smartphones Mobile Devices Quick Tips Business Continuity Gadgets Social Media Network Microsoft Office Android Disaster Recovery VoIP Productivity Data Backup Mobile Office Server Virtualization Collaboration Communication Data Recovery Smartphone IT Support Upgrade Mobile Device Management communications Miscellaneous Phishing Cybersecurity Ransomware Tech Term Windows 10 Facebook Unified Threat Management Windows Holiday Passwords Apps Remote Monitoring Operating System Vendor Management Analytics Automation Mobile Computing BYOD Remote Computing Managed IT services Mobile Device BDR Users WiFi Marketing Outsourced IT Internet of Things The Internet of Things Apple Data Management Artificial Intelligence Firewall History Alert Managed IT Services Browser Save Money App Big data Cloud Computing Encryption IT Consultant Office Bring Your Own Device Help Desk Two-factor Authentication Gmail Antivirus Maintenance Spam Bandwidth Printer Windows 10 Health Content Filtering Going Green Office 365 Budget Business Technology Windows 8 Outlook Wireless Technology Search Cybercrime Virus Hiring/Firing Tech Support Managed IT Hard Drives Cost Management Training Lithium-ion Battery Saving Time Best Practice Information Technology Education It Management Update Blockchain Customer Service Healthcare Recovery Employer-Employee Relationship Money Document Management Hacking Computers VPN Access Control Phone System Networking IBM Travel File Sharing Hard Drive Regulations Augmented Reality PowerPoint Information Mobility Risk Management SaaS Administration Save Time Government Website Law Enforcement Humor Applications Compliance Data storage Password iPhone Managed Service Proactive IT Running Cable Legal Intranet Twitter Customer Relationship Management Data Security User Paperless Office Google Maps Management Patch Management Social Sports Wireless Social Engineering Disaster Data Loss Computing Fax Server Vulnerabilities DDoS Hosted Solution Scam End of Support Business Intelligence Robot Digital Payment Router Downtime Securty Data Breach Private Cloud Project Management Word Avoiding Downtime Comparison Tablet Digital Retail Solid State Drive Company Culture Websites Telephony Cortana Black Market Value Machine Learning Flexibility Computer Repair Social Networking Telephone Systems Cryptocurrency Laptop Hacker Business Growth Excel Current Events Bitcoin Office Tips Co-managed IT Presentation Identity Theft User Error Data Protection Streaming Media Windows 7 Virtual Desktop YouTube Gaming Console Specifications Safety Politics Virtual Reality Unified Communications Settings Documents Emails Webcam Net Neutrality Voice over Internet Protocol Automobile Lifestyle Text Messaging Chromebook Chrome Heating/Cooling Entertainment Redundancy Storage Computing Infrastructure Hack How To IT service Download Computer Accessories Evernote Inbound Marketing Virtual Assistant eWaste Distribution Trending Bluetooth Microchip Taxes Mouse Start Menu Tech Terms Cooperation Pain Points Conferencing Vendor Mobile Technology Distributed Denial of Service Programming Software as a Service Google Docs Statistics Processors Experience Uninterrupted Power Supply Public Cloud Network Congestion Cleaning Vulnerability USB Monitors Monitoring Enterprise Resource Planning Video Surveillance Navigation CIO Legislation Error Electricity Printing Solutions IP Address Sync Advertising Flash IT Plan Human Resources Notifications Staffing CCTV Google Wallet Webinar Accountants Saving ZTime A.I. Recycling Professional Services Application Windows XP email scam Addiction Analytic Data Analysis Business Metrics Computer Malfunction Society Multi-factor Authentication GDPR Reliable Computing Displays Product Reviews cache Television Migration Connected Devices Debate Read Tech Micrsooft Harddrive Wireless Headphones Telephone WannaCry Downloads Integration In Internet of Things Fileless Malware Freedom of Information Drones Equifax Fleet Tracking Corporate Profile Digital Signature GPS Network Management Time Management Motion Sickness External Harddrive Device security MSP Device Management Modem Teamwork Scalability Assessment Proxy Server SharePoint Desktop Finance Content Management Term Tip of the week Messenger Tracking Nanotechnology Social Network Business Managemenet Electronic Medical Records Google Calendar Transportation Permissions Language Best Practives Touchscreen Directions News PDF Rental Service Meetings Startup Thin CLient Asset Tracking VoIP Recording Business Cards 3D Service Level Agreement Ebay Web Server Music Smart Phones Username online Currency Knowledge SSID Best Available Keyboard switches Cabling Writing Microserver Unified Threat Management Backup and Disaster Recovery Consultation Dark Web Gamification Processing Books Workers Upgrades Screen Reader Customer Resource management Health IT Technology Tips Employee/Employer Relationship Domains Wi-Fi Administrator Managed IT Service Fake News Supercomputer Smart Tech Leadership LinkedIn Audit Logistics Public Speaking LiFi Get More Done Piracy Adminstration Upload Pirating Information Printer Server HTML Shortcut Worker Turn Key Fiber-Optic Database Bookmark Data Warehousing Work/Life Balance Trojan Mobile Security Archive Emergency Google Play Hard Drive Disposal Entrepreneur Reading Samsung Deep Learning Telephone System Skype Access Troubleshooting Processor Microsoft Excel Environment Employer Employee Relationship Organize Multi-Factor Security Cost Computer Care Microsoft 365 HIPAA G Suite Visible Light Communication Memory Software License Trends Electronic Payment Hacks Physical Security Devices Medical IT Competition IT consulting Licensing Fraud Tactics Point of Contact Google Drive Browsers Windows Server 2008 Botnet UTM Content Security Cameras Relocation Tablets Upselling Spyware User Tip Mobile Payment Business Owner Banking Printers CrashOverride Capital Managing Stress Productuvuty Regulation 3D Printing