k_Street Consulting, LLC Blog

How to Mitigate Unhappy Online Opinions

How to Mitigate Unhappy Online Opinions

As nice as it would be to always please everybody with your business services, it just isn’t going to happen. Sooner or later, you’re going to encounter someone who isn’t pleased, and they’re going to have the capability to do some damage to your reputation. Fortunately, there is a way you can mitigate this damage.

The first thing you need to remember is that, while your unhappy customer or client may not be correct, they are always right. What does this mean? Simple - even if they misinterpreted what they were entitled to through your services, you have the obligation to make them happy. This is not to say that you kowtow to every demand a customer makes, regardless of how ludicrous it is… you just need to make sure they stay happy.

How can you do this? It all boils down to communication.

How to Communicate With an Unhappy Client

Chances are, you’re going to find out that a client was unhappy by reading a review that they leave somewhere online - perhaps on Facebook, or on Google, or on a third-party review website. What they will have to say may upset you. That’s fine. Nobody likes to hear that there is something wrong with one of their endeavors. You have every right to be a little upset - just don’t let that upset seep into your conversation with your unhappy client.

After all, in their eyes, they have every right to be upset as well.

Therefore, once you’ve regained a cooler composure, you need to respond directly and politely to the negative review. While this initial interaction should be public, offer to continue your conversation in a less public way, in an offline forum. If the reviewer accepts, try to come to a mutually beneficial compromise with them. This will help to insulate you from a rash decision.

This brings up another important point - while you may really want to, you should never just remove a negative review. Not only will that make it look like you are hiding something (not good), it also squanders the opportunity to make lemonade out of your reviewer’s lemons. Again, try to make whatever issue your reviewer had right, and ask them to revise their review once things have been settled. If you play your cards right, the result could be a much better review, describing the care you put into fixing their issue.

Reviews Can Be Good, Too!

Whenever they are, you have another opportunity to embrace by responding to them.

I can almost hear you now: “Wait, if a reviewer is happy, doesn’t that mean I’ve done what I had to do?”

In a way, yes. If someone is willing to leave a positive review of your services, you clearly were able to strike a chord with them. However, while responding to a negative review could be somewhat accurately seen as damage control, responding to a positive review has a very different motivation to it.

Look at it this way: anyone who is willing to take the time out of their day to speak highly of you online is an invaluable ally to have. Positive reviews and negative reviews are very different things, especially in that people are generally more inclined to leave negative feedback if they have the opportunity.

Reflecting on this, it only makes sense to take the time and respond to positive reviews as well. A positive review is more or less a confirmation of a successful onboarding process - to keep these contacts engaged, you need to continue communicating with them beyond the point that their invoice is settled.

Are you happy with our services or our content? If so, we’d love to hear about it. Leave us a review or drop us a line in the comments!

Tip of the Week: Your Phone Can Work as Your Secur...
Shrug Off Downtime with Managed IT Services
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Restore Data Managed IT Services Data Protection Internet Entertainment Mobility Transportation Computing Infrastructure Knowledge Operating System Productivity SharePoint Internet of Things Hard Drives IT Management Hacker Word Social Distribution Streaming Media Digital Signature Wireless Technology Thought Leadership Emergency Proactive IT Project Management Search Saving Money Android VPN Computer Business USB Root Cause Analysis Internet Exlporer Redundancy malware Analytic Microsoft Human Resources Cost Management Save Time Smartphones Shadow IT Product Reviews Application Data loss Robot Cleaning FENG webinar How To Camera Windows 10s Humor Content Filtering Flexibility Office 365 Chromecast CrashOverride IBM Outlook Virtual Assistant Network Congestion Utility Computing PDF Advertising Legal Business Owner Telecommuting Content Cables Maintenance Remote Monitoring Paperless Office Retail Recycling Machine Learning IT service Monitor Best Practice Cabling Hybrid Cloud Multiple Versions eCommerce Business Computing Software Antivirus Password Manager Uninterrupted Power Supply Archive Inventory Wire Two Factor Authentication Law Enforcement Virtualization Programming Remote Computing Statistics History Marketing Voice over Internet Protocol Data Recovery Chrome Cryptocurrency How to The Internet of Things Augmented Reality Disaster Recovery Software as a Service Excel File Sharing Virtual Reality Regulations Smartwatch Scalability Data User Error Customer Relationship Management Solid State Drive Help Desk Netflix Productivity Hiring/Firing Social Networking Recovery WIndows 7 Black Market IT solutions Information YouTube Mobile Device Fiber-Optic Settings Wireless Technology Telephone Systems Remote Work Samsung IT Support Hosted Computing Network Managed IT Services Risk Management Windows 10 Digital Signage Managed Service Frequently Asked Questions Hosted Solutions Cast Password Work/Life Balance avoiding downtime Big data Employer-Employee Relationship Current Events DDoS Digital Payment Managing Stress Cybersecurity HaaS Worker Health User Customer Service NIST MSP Colocation Tech Support Congratulations Blockchain Virtual Desktop Information Technology Mobile Office Files Cybercrime Business Technology Router Upgrade Public Computer Windows 8 IT Plan Audit Supercomputer Intranet Sync Accountants Safe Mode Wi-Fi Gmail Cortana Skype Start Menu Google Apps Outsourced IT Wireless Charging Proactive Maintenance Bing Database Browser Remote Worker Data Storage Saving Time Virtual Private Network Network Security Shortcut Phone System Scam Computers Server Software Tips Administration IT Services Company Culture Pain Points Telephony Online Shopping Vulnerability Employee Printers Unified Communications Innovation Millennials Relocation Search Engine Techology Efficiency Benefits Automobile Enterprise Content Management HBO Computer Repair Password Management Mobile Device Management VoIP Identity Theft Analyitcs Internet exploMicrosoft Trending Biometric Security Google Docs Backup Staff Alert Two-factor Authentication Patch Management Facebook Encryption Meetings Ransomware PowerPoint Notifications Tip of the week Social Engineering Windows Media Player Data Backup Fax Server Shortcuts Criminal Worker Commute Spam Email Smartphone Printer Phishing Data Management Touchpad Downtime E-Commerce Screen Mirroring Google Search Hacking Entrepreneur Sports Audiobook Music Tablet Managed Service Provider Vendor Management Thank You Computer Accessories Employee/Employer Relationship Troubleshooting Amazon HIPAA HVAC Printer Server Electronic Medical Records Social Media Amazon Web Services Tools Flash Video Games Security Holiday Google Drive App Healthcare Bring Your Own Device Online Currency LinkedIn Net Neutrality Hardware IT Solutions Cloud Google Keyboard Privacy Remote Monitoring and Maintenance Windows 10 Consultant Instant Messaging Hosted Solution Wiring Communication Customers Books Strategy Domains Tech Term Collaboration Connectivity Addiction Gadgets Cameras Distributed Denial of Service Workplace Tips Science Smart Tech Apps Fraud Manufacturing communications Spam Blocking Users NarrowBand Passwords Backup and Disaster Recovery Virus BYOD Website Value Evernote eWaste Line of Business Office Tips Read Touchscreen Private Cloud Firewall IaaS Money Office Security Cameras Networking Running Cable Unified Threat Management Comparison Access Control Safety Automation Authentication Mobile Computing Content Filter Gaming Console Workers Mobile Students Managed IT Bandwidth Loyalty Budget Professional Services Storage Conferencing Vendor Lifestyle Bloatware Artificial Intelligence Smart Technology Credit Cards Workforce Politics Point of Sale Bluetooth ISP iphone Microchip Insurance Webinar Government Windows 7 5G Botnet Reputation Twitter Memory OneNote Cache Cryptomining Assessment Practices Analysis Small Business Charger Update Experience Telephone System Biometrics Windows Server 2008 Specifications GDPR CES Miscellaneous Computer Care Emails Television Warranty Best Available Remote Maintenance Display Training Hring/Firing Smart Office Document Management Quick Tips Compliance Tablets Data Security User Tips Unsupported Software Laptop Theft Investment Tip of the Week travel Administrator IT Support Logistics Applications Lithium-ion battery Education Physical Security Computer Fan Data Warehousing Windows WiFi Business Mangement IT Infrastructure File Versioning Going Green Proactive Apple IoT Best Practices Regulation People SaaS Nanotechnology Data Breach Mobile Devices Leadership Devices Default App BDR Environment End of Support Mouse OLED Operating Systems ROI Save Money Data storage Battery Content Management Hackers IT Consultant Business Intelligence Wearable Technology Servers Business Management Public Cloud Electronic Health Records Infrastructure Microsoft Office Business Continuity Rootkit Wireless Internet analytics Cloud Computing Employer Employee Relationship Multi-Factor Security

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *