If you were on the customer end of a telephone conversation and were ready to place a large order, which of the following phrases would make you feel welcome?
* I'm sorry. I didn't get that. * I can't understand what you're trying to say.
* Yes, Mr. Jones, I'll be happy to do that for you.* All right. I'll see what I can do about it.
* It will take a few minutes. Would you like me to call you back? * Hold on. I'll be right with ya.
* Thank you for waiting. I have that information now.* You're out of luck. We don't sell that any more.
* Would you spell your name please?* What did you say your name was?
* Thank you. I'll check for you.* Okay. Let me see if I can find out about it from someone.
* I'm sorry. Mr. Smith is away from his desk. May I help you?* He's still out to lunch. I don't know when he'll be back.
By now you can certainly see and feel the advantage that using positive phrases creates for your organization, your customer, your organization, and yourself. Positive phrases cause positive outcomes for everyone involved.
When you're positive with your customers, they'll be positive with you. After all, isn't that what doing business is all about? Be courteous and professional with others and watch the benefits fall into your lag. It's guaranteed.
Remember: When you maximize your potential, everyone wins. When you don't, we all lose.
This article may be republished in newsletters and on web sites provided attribution is provided to the author, and it appears with the included copyright, resource box and live web site link. Email notice of intent to publish is appreciated but not required. Mail to: eagibbs@ureach.com
Living in the Age of the Internet Gangster, Part Three of Three: Sleeping with the Phishes . . .
One of the newest phishing trends to emerge has almost everybody in the security industry concerned: Trojan phishing. So-called Trojan programs, named after the horse of mythology that put the Greeks inside Troy's city walls, disguise themselves as beneficial files, but actually enable hackers to gain access to computers from remote locations to steal account information directly from a computer.Living in the Age of the Internet Gangster, Part Two of Three: An Evolution of Professional-class ..
Members of the hacker community throughout that region now are adapting to take advantage of the latest phishing scams. As a natural transition is taking place, "phishing" is the term applied to online schemes that attempt to lure people into giving up sensitive information, such as passwords or credit card numbers, by masquerading as trustworthy sources.Your Child's First Year at College: Prime Target for Identity Theft?
If your son or daughter is a recent high school graduate and college freshman, he or she is the ideal target cybercriminals are looking. "Why?" you might ask. For cybercriminals the answer is easy and highly profitable.