Listening to complaints, whether they're reasonable or not, is a part of every small business owner's job. Sometimes complaints can be overwhelming. However, when we take them in stride with an open mind, we can learn much from our employees' and customers' feelings about the workplace. After all, a complaint is nothing more that a person telling you that his (or her) needs have not been met.
As dissatisfied customers, they are giving you a second chance to correct something that should have been done properly the first time around. (In some cases the customer might happen to be your employee.)
If you listen to them patiently and attentively, their complaints will alert you to a real or potential problem, or tell you of a better way to handle a situation.
We are not use, however, to coping with complaints. We let our emotions rule our thinking usually. Consequently, we let complaints wear us out because we take on the complaint as a personal attack on us. It is not!
The next time you are faced with an irate employee, here are some steps to consider:
When you take the time to listen to your complaining customers or employee, you'll hear what he’s telling you. Then you’ll be in a better position to turn him into a satisfied customer.
Remember: When you maximize your potential, everyone wins. When you don't, we all lose.
Copyright © Etienne A. Gibbs, MSW, The Master Blog Builder
PERMISSION TO REPUBLISH: Although this article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link, email notice of intent to publish is required. Mail to: execandgroup-consulting@yahoo.com
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.