... TO ... This article may be ... in ... and on web sites provided ... is provided to the author, and it appears with the included ... resource box and l
PERMISSION TO REPUBLISH: This article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link. Email notice of intent to publish is appreciated but not required. Mail to: eagibbs@ureach.com
Telephone courtesy makes the difference between creating an atmosphere in which satisfied customers return again and again versus one that chases them away.
Here are some techniques that are effective in satisfying incoming callers.
* Begin by having a pen and pad close to your phone.
* Keep a mirror by your telephone so that you can be reminded to put a smile on your face.
* Maintain a positive and friendly attitude.
* Listen more than you speak.
* Be alert, pleasant, natural, and expressive.
* Make yourself stand out as someone special who is interested in helping others.
* Establish rapport immediately. Use positive statements that will set the tone of the conversation.
When it comes to making outgoing calls for yourself or for your boss, here are some techniques to shoot for:
* Plan your agenda before calling. Ask yourself: Why ...?, What ...?, Who ...?, When ...?, Where ...?, and How ...? Then fill in the answers before calling. Planning your calls gives you the opportunity to decide the most effective way to phrase your ideas and statements. By planning your outgoing calls, you will:
* cover the important items,
* aid in managing your time,
* cut out rambling, and
* reduce your long distance telephone bill.
If a little bit of telephone courtesy goes a long way, imagine what deliberately planned telephone courtesy would do for you, your boss, your organization, and your customers.
Remember: When you maximize your potential, everyone wins. When you don't, we all lose.
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.