Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Mitigate Unhappy Online Opinions

How to Mitigate Unhappy Online Opinions

As nice as it would be to always please everybody with your business services, it just isn’t going to happen. Sooner or later, you’re going to encounter someone who isn’t pleased, and they’re going to have the capability to do some damage to your reputation. Fortunately, there is a way you can mitigate this damage.

The first thing you need to remember is that, while your unhappy customer or client may not be correct, they are always right. What does this mean? Simple - even if they misinterpreted what they were entitled to through your services, you have the obligation to make them happy. This is not to say that you kowtow to every demand a customer makes, regardless of how ludicrous it is… you just need to make sure they stay happy.

How can you do this? It all boils down to communication.

How to Communicate With an Unhappy Client

Chances are, you’re going to find out that a client was unhappy by reading a review that they leave somewhere online - perhaps on Facebook, or on Google, or on a third-party review website. What they will have to say may upset you. That’s fine. Nobody likes to hear that there is something wrong with one of their endeavors. You have every right to be a little upset - just don’t let that upset seep into your conversation with your unhappy client.

After all, in their eyes, they have every right to be upset as well.

Therefore, once you’ve regained a cooler composure, you need to respond directly and politely to the negative review. While this initial interaction should be public, offer to continue your conversation in a less public way, in an offline forum. If the reviewer accepts, try to come to a mutually beneficial compromise with them. This will help to insulate you from a rash decision.

This brings up another important point - while you may really want to, you should never just remove a negative review. Not only will that make it look like you are hiding something (not good), it also squanders the opportunity to make lemonade out of your reviewer’s lemons. Again, try to make whatever issue your reviewer had right, and ask them to revise their review once things have been settled. If you play your cards right, the result could be a much better review, describing the care you put into fixing their issue.

Reviews Can Be Good, Too!

Whenever they are, you have another opportunity to embrace by responding to them.

I can almost hear you now: “Wait, if a reviewer is happy, doesn’t that mean I’ve done what I had to do?”

In a way, yes. If someone is willing to leave a positive review of your services, you clearly were able to strike a chord with them. However, while responding to a negative review could be somewhat accurately seen as damage control, responding to a positive review has a very different motivation to it.

Look at it this way: anyone who is willing to take the time out of their day to speak highly of you online is an invaluable ally to have. Positive reviews and negative reviews are very different things, especially in that people are generally more inclined to leave negative feedback if they have the opportunity.

Reflecting on this, it only makes sense to take the time and respond to positive reviews as well. A positive review is more or less a confirmation of a successful onboarding process - to keep these contacts engaged, you need to continue communicating with them beyond the point that their invoice is settled.

Are you happy with our services or our content? If so, we’d love to hear about it. Leave us a review or drop us a line in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Server Save Money Cloud Computing Office Windows 10 Passwords Gadgets Chrome Social Media Virtualization Tech Term Saving Money Holiday Automation Microsoft Office Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Cybercrime Computers Networking IT Support Wi-Fi Hacking Health BYOD Internet of Things Mobile Device Management Office 365 Alert Telephone Systems Managed Service Provider Remote Information Information Technology Covid-19 Spam Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR App History Password Big Data Money Encryption Applications Human Resources Mobile Computing Data Breach Law Enforcement Application Remote Monitoring Managed IT Blockchain How To Paperless Office Office Tips Apps Training VPN Data Storage Patch Management Remote Computing Government Mobile Office Private Cloud Data Security Bring Your Own Device Data Management Work/Life Balance Wireless Gmail Infrastructure Settings Voice over Internet Protocol Flexibility Google Drive Vulnerability Marketing Two-factor Authentication Windows 7 WiFi Word IT solutions Entertainment Website Avoiding Downtime Mouse Budget HaaS Servers Meetings Save Time Risk Management Hacker Cleaning Telephone System Staff Software as a Service The Internet of Things Machine Learning Lithium-ion battery Connectivity Remote Work End of Support Education Physical Security Safety Vendor Firewall Conferencing Sports HIPAA Managed Services Redundancy Display Scam Virtual Reality Keyboard Apple Employee/Employer Relationship Social Data Protection USB Vendor Management RMM User Error Wireless Technology CES Charger Solid State Drive How to Wearable Technology Downtime Hard Drives Humor Compliance Retail Business Technology Content Management Instant Messaging OneNote Computer Care Data storage Digital Signage Access Control Robot Excel Current Events Automobile Telephony Virtual Assistant Biometrics Samsung Authentication Virtual Desktop Computing Infrastructure Procurement Going Green Value Workplace Strategy DDoS Net Neutrality Spam Blocking Electronic Medical Records SharePoint Help Desk Update Battery Printing Hiring/Firing Shadow IT Google Docs Virus Legal Customer Service Identity Theft Environment Unified Threat Management Managed Services Provider Internet Exlporer Computer Accessories Database Fax Server PDF Remote Workers Augmented Reality Business Intelligence SaaS Fraud Proactive IT Audit Worker Processor Remote Worker IT Management Printer Bluetooth Best Practice Cryptocurrency Network Congestion YouTube Botnet Hard Drive eWaste Black Market IT Plan Computing Unsupported Software Comparison IT Consultant Document Management File Sharing Cost Management PCI DSS Virtual Machine 2FA Fiber Optics Camera Employee Inventory Social Networking Software Tips Specifications Supercomputer Evernote Emails Messaging Files Cabling Wire Sync Hypervisor Chromecast Travel Policy Dark mode Trend Micro Printers Running Cable Millennials Wireless Charging Memory Netflix Two Factor Authentication SMS Colocation Default App Smart Office Uninterrupted Power Supply Saving Time Root Cause Analysis Consultant Procedure dark theme Analytics Music Shopping Virtual Private Network Monitor Google Search HBO Workforce Knowledge Cables AI IT Infrastructure Skype Bing Data loss Best Available FinTech Troubleshooting Social Network Project Management Reputation Nanotechnology Streaming Media Outlook Telecommuting Science WIndows 7 Leadership Cortana Content Investment Tech Support Start Menu Employee/Employer Relationships Laptop Digital Signature Screen Mirroring Loyalty Employees Techology Windows 365 Books Warranty Distributed Denial of Service Customers ISP Customer Relationship Management Frequently Asked Questions Google Apps Analyitcs Windows 10s Audiobook Video Conferencing ROI HVAC Mobile Bitcoin Touchpad Shortcuts Analysis Programming Cast Sales Point of Sale PowerPoint Emergency Personal Windows Media Player Administrator Cryptomining Devices Tip of the week User webinar Public Cloud Employer Employee Relationship Politics Supply Chain Management Advertising Enterprise Content Management Professional Services Batteries MSP Antivirus Accountants Assessment Monitoring Windows 8.1 Digitize Microchip Thought Leadership Notifications Windows Server 2008 Credit Cards Windows 8 Managing Stress Tools Password Manager Windows Server 2008 R2 Password Management IT service Multi-Factor Security Television Customer relationships Cameras Email Best Practices IT Assessment Search Engine Relocation Manufacturing Twitter Tablet Business Mangement NIST Domains Video Games Managed IT Service Security Cameras Smart Tech Trending Public Computer Computer Tips Virtual CIO Transportation Worker Commute OneDrive IaaS Biometric Security Addiction Maintenance Regulations Amazon Recycling Bloatware Computer Fan Rootkit Experience Peripheral Printer Server Scalability Using Data Wiring Practices Digital Security Cameras Amazon Web Services Tablets Workers Benefits Business Owner Copiers 5G Cache Safe Mode NarrowBand Criminal Entrepreneur FENG Quick Tip Search GDPR Smartwatch Hosted Computing IBM Ergonomics Online Shopping Smart Technology Development iPhone OLED Wireless Internet Shortcut Flash

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code