{"id":1416,"date":"2018-03-20T09:17:17","date_gmt":"2018-03-20T14:17:17","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=1416"},"modified":"2018-03-20T09:17:33","modified_gmt":"2018-03-20T14:17:33","slug":"dos-and-donts-selling-your-clients-on-email-security-solutions","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2018\/03\/dos-and-donts-selling-your-clients-on-email-security-solutions\/","title":{"rendered":"Do&#8217;s and Don&#8217;ts: Selling your clients on Email Security Solutions"},"content":{"rendered":"<div id=\"attachment_1417\" style=\"width: 769px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1417\" class=\"wp-image-1417\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957-1024x739.jpeg\" alt=\"\" width=\"759\" height=\"547\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957-1024x739.jpeg 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957-300x217.jpeg 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957-768x554.jpeg 768w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/pexels-photo-872957.jpeg 1280w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\" \/><\/a><p id=\"caption-attachment-1417\" class=\"wp-caption-text\">Learn more about the do&#8217;s and don&#8217;ts when selling security solutions<\/p><\/div>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">Let&#8217;s face it, most IT solutions in the business process fail because users don\u2019t use them. They don\u2019t use them because they see it as another unnecessary time waster in the process they are already accustomed to and count on everything being yet another thing management will soon forget about because they don\u2019t work the same issues all day long. <em>Sound familiar?<\/em> All the new, cool, better, smarter ways of doing something will\u00a0always lose to users unwillingness and inability to change.\u00a0<strong>Until someone loses their job or the company gets sued for negligence. Oops!\u00a0 \u00a0<\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/p>\n<h2 style=\"padding-left: 30px;\"><span style=\"color: #000000;\">So, what should you be talking about with your clients?<\/span><\/h2>\n<p style=\"padding-left: 30px;\"><strong><span style=\"color: #0956a4;\">1.\u00a0 Don\u2019t talk about backups \u2013 talk about long term email archiving and ediscovery.<\/span><\/strong><br \/>\n<strong><span style=\"color: #0956a4;\"> 2.\u00a0 Don\u2019t talk about encryption \u2013 talk about safely getting data over without getting hacked.<\/span><\/strong><br \/>\n<strong><span style=\"color: #0956a4;\"> 3.\u00a0 Don\u2019t talk about SPAM \u2013 talk about fake senders, fake links<\/span><\/strong><br \/>\n<strong><span style=\"color: #0956a4;\"> 4.\u00a0 Don\u2019t talk about Phishing \u2013 talk about identity theft, compromised passwords and bank accounts.<\/span><\/strong><br \/>\n<strong><span style=\"color: #0956a4;\"> 5.\u00a0 Don\u2019t talk about Compliance \u2013 talk about setting business standards and avoiding lawsuits.<\/span><\/strong><br \/>\n<strong><span style=\"color: #0956a4;\"> 6.\u00a0 Don\u2019t talk about Web File Sharing \u2013 ask how they get important documents to their clients or vendors?<\/span><\/strong><br \/>\n<span style=\"color: #000000;\"><strong><span style=\"color: #0956a4;\">7.\u00a0 Don\u2019t talk about Malware \u2013 ask them what they currently do to protect their staff from taking down the whole office.<\/span><\/strong><br \/>\n<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">Your clients have been hearing about <span style=\"color: #0956a4;\"><strong>SPAM<\/strong><\/span> and <span style=\"color: #0956a4;\"><strong>Virus protection<\/strong><\/span> for over a decades now, they view it the same way they view every other software license cost \u2013 part of doing business. The problem in 2018 is that it\u2019s no longer just the technology complexity dictating business spending, regulatory bodies and government are getting involved in it too. Nearly every industry is subject to some new regulation, record keeping process, security audit, assessment or other \u201ctime waster\u201d that they will have to deal with. So\u00a0start clipping news articles\u00a0and send them headlines with the message <em>\u201cWe really need to set you up with ExchangeDefender so you don\u2019t end up in the next article\u201d <\/em>\u2013 and I don\u2019t mean it in a sarcastic or fear mongering way at all, nearly a quarter of my office time goes to time travel discussions and things businesses wished\u00a0they had in place before they got in trouble.<span style=\"color: #0956a4;\"> <strong>Talk to them now.<\/strong><\/span><\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\"><strong>The Bottom Line:\u00a0<\/strong><br \/>\n<\/span><span style=\"color: #000000;\">Businesses you are trying to sell technical solutions to are already dealing with a lot of nightmares related to technology. <u>They don\u2019t want another thing to manage, report, customize, tweak and learn: they want something that reduces all of that work<\/u>. That something is <span style=\"color: #0956a4;\"><a style=\"color: #0956a4;\" href=\"http:\/\/www.exchangedefender.com\"><strong>ExchangeDefender<\/strong><\/a><\/span>, all-in-one, end-user friendly email solution that removes things they don\u2019t need to look at and makes stuff they are looking for easy to find.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #000000;\">I encourage you to talk to your clients less from a technical solution standpoint\u00a0and more from the business process implementation. Yes, they may trust you because of your technical expertise but what you need them to understand (and what will ultimately earn you the business) is which business issues are going to be addressed by spending a few dollars a month. If they can identify with the problem, they will pay for it to go away because everyone is always trying to reduce costs and labor is the biggest one of them all. Help make them more productive.\u00a0<\/span><\/p>\n<p><a href=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1556 aligncenter\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-1024x215.jpg\" alt=\"\" width=\"1024\" height=\"215\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-1024x215.jpg 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-300x63.jpg 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2018\/03\/blog-post-footer-1-768x161.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,4,22,48],"tags":[55,54,39,40],"class_list":["post-1416","post","type-post","status-publish","format-standard","hentry","category-business-continuity","category-exchangedefender","category-pro-tips","category-security","tag-business-continuity","tag-cybersecurity","tag-encryption","tag-security"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=1416"}],"version-history":[{"count":81,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1416\/revisions"}],"predecessor-version":[{"id":1560,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/1416\/revisions\/1560"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=1416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=1416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=1416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}