Logging Support Requests with CCS

Logging Support Requests with CCS.

At CCS, we always to try to respond to support requests in a timely manner. In order to do this, we need your assistance as follows:

  1. How to contact CCS.

Phone Number: 800-672-4806/425-672-4806

mail Address: support

During normal business hours, the phone will be answered by a dispatcher. However, if the support call volume is unusually high at the time of your call,

It may go directly to voicemail.

  1. Information needed for CCS to properly respond to any support requests are:

Name – First name (Minimum), and last name.

Company – The name of the company that we have on record

Location/Store – The physical location/store that the user is calling from, and/or the location/store that is having the issue.

Contact Phone Number – Store Phone number, cell phone number

Contact email address – If you are not immediately available, include the best time and day for CCS to re-contact you.

The nature and severity of the issue.

What you did before contacting CCS.

Who else in your organization did you attempt to contact first, before calling CCS?

  1. Here are some examples of support requests:
  1. Voicemail Message:

Poor Example:

“Hi, this is Mary, we are having a problem…” click!

In this particular case, the call came in from an unlisted, back-office number that no one monitors. When that number was called, no one answered, and the number didn’t go to any king of the voicemail system. So at this point, we had no idea which company this was, what location is involved or any other details.

Best Example:

“Hi, this is Mary Smith from Bob’s Widgets, Lynnwood Washington location. The store number is: 425-672-1234. If no one answers or if it goes to voicemail, please call me on my cell phone: 360-123-4567.

I just tried to log into the software when coming back from my lunch break, and I’m getting the following error message when I try to log into the Touch screen Ticket Entry:

“Invalid Login”

I kept trying different passwords, and nothing worked. I can’t ring up customers, please help!

I’m unable to get hold of a manager to help out.

We close the store at 6:00 PM tonight, but I’ll be here until 6:30 PM.”

In the above example, the contact information is clearly stated, and so is the nature of the support issue. Also, information as to what other attempt attempts were made to resolve the issue before contacting CCS. This allows CCS to quickly respond to both the call and to address the specific issue.

  1. Email message sent to CCS:

Poor Example:

“We are having a problem… “

The source email is for a personal email associated with a user’s personal cell phone: mary1234

In this case, the person who sent the message is not monitoring their email, so when a reply is sent requesting more information, CCS gets no reply.

Best Example:

“Hi, this is Mary Smith from Bob’s Widgets, Lynnwood Washington location. The store number is: 425-672-1234. If no one answers or if it goes to voicemail, please call me on my cell phone… 360-123-4567. If you send any emails, please address them to all of the following:

lynnwood

msmith

accounting

I just tried to log into the software when coming back from my lunch break, and I’m getting the following error message when I try to log into the Touch screen Ticket Entry:

“Invalid Login”

I kept trying different passwords, and nothing worked. I can’t ring up customers, please help!

Here’s a picture of the error taken with my cell phone.

Also, I called and texted our manager, but she’s on vacation in Maui and isn’t responding. Also, I couldn’t reach our Assistant Manager, by phone this afternoon, but she’s supposed to be in tomorrow morning at 8:30 AM.

We close the store at 6:00 PM tonight, but I’ll be here until 6:30 PM.”

Again, in the above example, the contact information is clearly stated, and so is the nature of the support issue, and includes an image of or print screen of the error. Also, information as to what other attempt attempts were made to resolve the issue before contacting CCS.

John

Keeping Customers Returning

Keeping Customers Returning

Have you ever thought about why you return to the same retail stores again and again? Most of us do not stop to analyze this, but should! The reasons why you shop at your favorite stores are the same reasons customers come to your place of business.

Here are some of my reasons:

  • Good parking facilities
  • Friendly, helpful employees who can answer my questions about products
  • Clean atmosphere (floors, counters, windows, restrooms)
  • Good management of unsupervised children in the store
  • Adequate inventory to provide choices
  • Good prices, clearly marked on easily seen labels
  • Efficiency at checkout – no long lines
  • Adequate staffing to prevent long lines
  • Monitors, so I can see prices as they are scanned
  • Receipts that I can read and understand
  • Good return policy, with clear information on receipt
  • Ease of using my preferred debit/credit cards
  • Loyalty benefits

Want your customers to come back? Make sure you consider the above and make changes accordingly. We at CCS can’t help you with all of these factors, (we don’t do windows, parking lots, or supervision of children) but we can help you with many of them.

Do you need assistance with inventory, labels, receipts, use of debit/credit cards, loyalty points, scanners, monitors, registers, or training employees on the use of your Counterpoint software? We can provide excellent service on all of these things and much more. Call us at 425-672-4806 or email us. We can help you help your customers!

Marlene

Purging History to Update Faster

 

Preparing To Update From CPSQL 8.5.3 and lower.

If you are planning to update your NCR Counterpoint System and are running version 8.5.3 or lower and have a lot of sales history, purging some of that history will make the update take less time.

I get asked quite a bit on how long an update will take. For most systems that keep up to date, it can be anywhere from 1 to 2 hours. But, if you have skipped a couple of updates, this can turn into 3 to 4 hours to complete to the whole process.

The reason for this is that during the upgrade, your history files go through a conversion process to add/remove changed fields. Although the main system itself will be useable after the initial update, the history will not be there right away.

Depending on how much history you keep on file will determine how long the rest of the update will take. If you rely on sales history to do validated returns, or to help make decisions about purchasing or running reports, this will unavailable until the conversion process is complete.

So, when you decide to upgrade your system, take a look at how much sales history you have on file and purge (there are utilities that make this easy) whatever is not necessary. As a reference, most companies keep about 3 years’ worth of history, but you should check with your accounting team for how much may be required.

-Bryan

Security Concerns of Phishing Attacks

Security Concerns of Phishing Attacks

I am re-visiting the security concerns of phishing attacks in this posting. These remain the largest vector for delivering malicious software, such as ransomware attacks. The reason that it remains the preferred method of attack in many cases is that it works: People are still opening those phishing emails, and clicking on those links.

Training employees to recognize phishing emails should be an ongoing process for all companies. By periodically reminding them of the dangers, and what to look for, it keeps the idea fresher in their minds, and hopefully, they will be more on the alert for these dangerous attacks. Also, as those conducting such attacks are getting evolving, also, and getting more sophisticated. These attacks are increasingly using more targeted approaches, and are less obvious that they are not legitimate.

Many use such things as having links to websites that are only a letter, or so, off from the legitimate site. If the legitimate site is a “.com”, for example, the nefarious site may be a “.co”. Or, if the site is something like “mybank.com”, then the fake site might be “mybank-info.com”.

By making data security an ongoing process, your employees will not only have it kept fresh in their minds, but they can also be trained on how to spot the increasingly sophisticated attack emails. The more likely that they are to think about it before opening an email, or clicking on a link, as well as being better able to spot emails that just are not quite right, the safer your data is. The bad guys are not taking it easy, so that means that the rest of us have to constantly keep our guard up.

Dave.