If you were a customer on the telephone calling your place of business with a question or complaint and were ready to make big purchase, which of the following phrases by your employee would make you feel welcome and want to complete your transaction? Which would drive you away?
By the way, smart small business owners make this call annonymously to test the customer relationship managemnt style and effectiveness of their employees. It should not be used as a trick by which to fire erring employees but as a foundation upon which improvements can be made, both to the employee, and to the customer relationship management system.
Now, which of the follow would drive you away and which would invite you to want to do more business?
By now you can certainly see and feel the advantage that using positive phrases creates for your organization, your customer, your organization, and yourself. Positive phrases cause positive outcomes for everyone involved.
When you're positive with your customers, they'll be positive with you. After all, isn't that what doing business is all about?
Be courteous and professional with others and watch the benefits fall into your lag. It's guaranteed.
Remember: When you maximize your potential, everyone wins. When you don't, we all lose. Copyright © Etienne A. Gibbs, MSW, The Master Blog Builder, all rights reserved.
PERMISSION TO REPUBLISH: Although this article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link, email notice of intent to publish is required. Mail to: execandgroup-consulting@yahoo.com
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.