Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Mitigate Unhappy Online Opinions

How to Mitigate Unhappy Online Opinions

As nice as it would be to always please everybody with your business services, it just isn’t going to happen. Sooner or later, you’re going to encounter someone who isn’t pleased, and they’re going to have the capability to do some damage to your reputation. Fortunately, there is a way you can mitigate this damage.

The first thing you need to remember is that, while your unhappy customer or client may not be correct, they are always right. What does this mean? Simple - even if they misinterpreted what they were entitled to through your services, you have the obligation to make them happy. This is not to say that you kowtow to every demand a customer makes, regardless of how ludicrous it is… you just need to make sure they stay happy.

How can you do this? It all boils down to communication.

How to Communicate With an Unhappy Client

Chances are, you’re going to find out that a client was unhappy by reading a review that they leave somewhere online - perhaps on Facebook, or on Google, or on a third-party review website. What they will have to say may upset you. That’s fine. Nobody likes to hear that there is something wrong with one of their endeavors. You have every right to be a little upset - just don’t let that upset seep into your conversation with your unhappy client.

After all, in their eyes, they have every right to be upset as well.

Therefore, once you’ve regained a cooler composure, you need to respond directly and politely to the negative review. While this initial interaction should be public, offer to continue your conversation in a less public way, in an offline forum. If the reviewer accepts, try to come to a mutually beneficial compromise with them. This will help to insulate you from a rash decision.

This brings up another important point - while you may really want to, you should never just remove a negative review. Not only will that make it look like you are hiding something (not good), it also squanders the opportunity to make lemonade out of your reviewer’s lemons. Again, try to make whatever issue your reviewer had right, and ask them to revise their review once things have been settled. If you play your cards right, the result could be a much better review, describing the care you put into fixing their issue.

Reviews Can Be Good, Too!

Whenever they are, you have another opportunity to embrace by responding to them.

I can almost hear you now: “Wait, if a reviewer is happy, doesn’t that mean I’ve done what I had to do?”

In a way, yes. If someone is willing to leave a positive review of your services, you clearly were able to strike a chord with them. However, while responding to a negative review could be somewhat accurately seen as damage control, responding to a positive review has a very different motivation to it.

Look at it this way: anyone who is willing to take the time out of their day to speak highly of you online is an invaluable ally to have. Positive reviews and negative reviews are very different things, especially in that people are generally more inclined to leave negative feedback if they have the opportunity.

Reflecting on this, it only makes sense to take the time and respond to positive reviews as well. A positive review is more or less a confirmation of a successful onboarding process - to keep these contacts engaged, you need to continue communicating with them beyond the point that their invoice is settled.

Are you happy with our services or our content? If so, we’d love to hear about it. Leave us a review or drop us a line in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Social Media Saving Money Holiday Tech Term Chrome Gadgets Virtualization Managed Service Microsoft Office Managed IT Services Automation Computers Artificial Intelligence Cybercrime Operating System Facebook Wi-Fi BYOD Health Mobile Device Management Networking IT Support Hacking Internet of Things Covid-19 Information Spam Managed Service Provider Office 365 Telephone Systems Remote Alert Information Technology Recovery Employer-Employee Relationship Bandwidth Router Social Engineering BDR Mobility Mobile Computing Password Money Human Resources Application Encryption Applications Remote Monitoring Big Data Law Enforcement Data Breach App History Blockchain VPN Paperless Office How To Apps Remote Computing Data Storage Patch Management Mobile Office Government Private Cloud Office Tips Training Managed IT Bring Your Own Device WiFi Data Security Gmail Data Management IT solutions Work/Life Balance Entertainment Settings Website Budget Two-factor Authentication Infrastructure Voice over Internet Protocol Google Drive Mouse HaaS Vulnerability Windows 7 Word Avoiding Downtime Servers Wireless Flexibility Marketing Vendor Managed Services Cleaning Software as a Service Display Telephone System Staff Firewall Machine Learning USB Connectivity Remote Work End of Support Virtual Reality Employee/Employer Relationship Apple Education Physical Security RMM Safety Social HIPAA Sports Redundancy Conferencing User Error Keyboard Scam Meetings Data Protection Risk Management Vendor Management Hacker Save Time The Internet of Things Lithium-ion battery Virtual Assistant Current Events Authentication Database Telephony Printer Customer Service Samsung Computing Infrastructure Environment Going Green Bluetooth Remote Workers Fax Server Value Processor Update Spam Blocking Battery Electronic Medical Records SaaS Hard Drive Shadow IT Google Docs IT Consultant Legal Hiring/Firing Identity Theft Internet Exlporer Humor Network Congestion Computing eWaste PDF Augmented Reality Fraud Business Intelligence Proactive IT Digital Signage Remote Worker Wearable Technology Audit Worker Best Practice YouTube IT Management Cryptocurrency Retail Hard Drives Instant Messaging Black Market Botnet Robot Excel IT Plan Procurement Biometrics Comparison Net Neutrality Workplace Strategy Virus Document Management Virtual Desktop Help Desk Wireless Technology Unsupported Software CES Solid State Drive Printing How to Downtime Unified Threat Management Computer Accessories DDoS Charger Business Technology Content Management SharePoint Access Control Compliance Data storage OneNote Automobile Computer Care Managed Services Provider Analyitcs Monitoring Batteries Netflix Digitize Programming Two Factor Authentication Workforce Monitor Virtual Private Network Windows 8.1 Root Cause Analysis Cables Windows Server 2008 R2 Music HBO Customer relationships Knowledge Antivirus Nanotechnology IT Assessment Telecommuting Manufacturing Reputation Streaming Media Skype Project Management Email Best Practices Printer Server Data loss Content Cortana Windows 8 Tech Support Troubleshooting Security Cameras Laptop Outlook Computer Tips IT service Leadership Digital Signature Managed IT Service Techology OneDrive Biometric Security Customers Start Menu Warranty Virtual CIO Screen Mirroring HVAC Peripheral Audiobook Loyalty Google Apps Tablet Books Touchpad Frequently Asked Questions Digital Security Cameras Domains Analysis Using Data Windows 10s Devices Copiers 5G Mobile Administrator IaaS Cast Enterprise Content Management Quick Tip Politics Maintenance Advertising Bloatware Emergency Smartwatch Tip of the week MSP Ergonomics webinar Accountants Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Notifications Professional Services Microchip Password Management PCI DSS Assessment Password Manager Virtual Machine Tablets Entrepreneur Multi-Factor Security Employee Windows Server 2008 2FA Fiber Optics Tools Search Engine Twitter Messaging Cabling Relocation Consultant Analytics NIST Policy Shortcut Television Business Mangement Hypervisor Smart Tech Trend Micro Video Games Cost Management Trending Dark mode Addiction SMS Worker Commute Social Networking Amazon Default App Best Available WIndows 7 Procedure Experience Public Computer Recycling Saving Time Practices Shopping Scalability Transportation Google Search Regulations Wiring dark theme Running Cable Computer Fan Cache AI Business Owner Rootkit Amazon Web Services IT Infrastructure Bing NarrowBand Safe Mode FinTech Criminal Memory Workers Hosted Computing Social Network Search Benefits GDPR FENG Wireless Internet Online Shopping Investment iPhone User PowerPoint File Sharing Employees Windows Media Player IBM Employee/Employer Relationships Inventory Smart Technology Specifications ISP Flash Camera Windows 365 Wire Video Conferencing Evernote ROI Files Science Travel Shortcuts Chromecast Managing Stress Software Tips Sales Supercomputer Bitcoin Emails Personal Millennials Cryptomining Sync Printers Point of Sale Cameras Distributed Denial of Service Smart Office Supply Chain Management Customer Relationship Management Wireless Charging Colocation Uninterrupted Power Supply

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code