pitch
Hi, thanks for calling our company, what is your name?_____________________________
What is your email address________________________________
What is your office number just in case we get cut off ok, ___________________________
What is your cell phone number__________________
What is your company’s name______________________________
What city are you calling from________________________ and what state____________
What is the name of your website
____________________________________
How many employees do you have? ____________________
What type of business are you in exactly?_______________________________________
How many computers do you have? ____________________________________________
Are you the decision maker? Yes or no, then who
is? And what is his telephone number! Ok got it
With Cyber Secure Software you will have a Risk-Free
Partnership with Us!
At Cyber Secure Software, we understand that choosing a
software partner is a significant decision that involves trust, transparency,
and peace of mind. That’s why we’ve designed a unique, risk-free approach that
ensures you can embark on your software journey with confidence. Imagine a
partnership where your investment is protected, your vision is prioritized, and
your project is developed with your input every step of the way. With our
guarantee, you can focus on growing your business while we take care of your
software needs.
The journey begins with a simple 10% deposit, allowing us to
start transforming, your ideas into reality. Within a week, you’ll receive
access to our secure platform, giving you real-time visibility into the
project’s progress. This level of transparency means, you’re never left in the
dark. You can monitor development, provide feedback, and adjust as needed. If
at any point you feel that our direction isn’t aligned with your vision, you
can cancel the project and receive a full refund of your deposit—no questions
asked. This commitment to your satisfaction sets us apart from other software
providers and ensures you can invest without the fear of losing money. Does this sound good?
Three weeks into the project, we check in again with another
secure link for you to review our progress. This checkpoint is crucial because
it allows for open communication, ensuring that we’re meeting your
expectations. If you have new ideas or questions, we’re here to listen and
adapt. Should you choose to continue, we’ll ask for a second payment of 30% to
keep the momentum going. But remember, if you’re not satisfied, you can still
opt to cancel and get your money back, reinforcing our promise of a risk-free
experience.
As we reach the midway milestone, 5 weeks into development,
you’ll see tangible results. By this time, you’ll have a clearer picture of
your software’s functionality and may want to adjust the project’s scope. We
pride ourselves on our flexibility, accommodating any changes to better fit
your needs. If you’re happy to proceed, we’ll request another 30% payment. Yet
again, if you feel the project isn’t meeting your expectations, we’ll gladly
refund your money, ensuring you remain in control throughout the process.
Finally, after six weeks, we present the completed project for your review. This is your opportunity to ensure everything aligns perfectly with your business objectives. If you’re satisfied, at this point, we will ask you to finalize the payment of 30%. But if further adjustments are needed, we’ll continue working until you are 100% happy. Choose Cyber Secure Software and let’s create something exceptional together, risk-free! How close to the recomended amount of $25,000 for this project, can you come up with in the next 6 weeks, Be honest?
What I want you to do is, get a quote from Microsoft or IBM, we
will beet there quote by 50% guaranteed!
Rest assured you’re in good hands, not one single client has
ever lost a penny with me. And you won’t be the first one.
We don’t need your money, put your wallet away for now! You
must qualify for us just like we must qualify for you!
WHEN YOU BUILD A WEBSITE AND SOFTWARE, WITH OUR NEW CYBER SECURITY SOFTWARE - EVERY NANO SECOND OF THE DAY, YOUR WEBSITE AND SOFTWARE ARE SAVED AND BACKED UP TO OUR SERVER'S, IN THE CLOUD SO YOU WILL NEVER LOSE INFORMATION....
I am not a dentist, I don’t pull teeth, rest assured you’re
in good hands.
I would not be in this business if my customers were losing
money.
Sometimes you must tighten up your belt buckle, for quality
workmanship, our engineers each hold bachelor’s degrees, master’s degrees,
doctorate degrees in computer science. We build in every language Like
Python, Java, C++, JavaScript, HTML, PHP, SQL. and Quantum computing and AI as
well.
If you want a friend buy a dog, my job is to get you as my
new client! If you chose my company to build your software and website, I will
be there with you every step of the way with a 100% money back guarantee!
Let’s take off our professional hat, if you don’t mind.
What do you do out there for fun ? Are you married or still happy lol.
When you buy Cyber Secure Software, it is like taking an insurance policy out on your business, you will sleep securely knowing that your website and software are being backed up every nano second of the day 365 days per year, your safe against Ransomware, Trojan Horses, Worms, Adware, Spyware, Malware and about 32 other forms of malicious spyware. Your website and software will be bullet proof. Sound good? It's amazing!
All we need is a ten % deposit and we will start the
construction of your new software and if needed we can build you a new website
and we can integrate, your new website into your new software as well.
PayPal does our billing or would you rather do a bank wire?
If he says I am not sure? find out what his objection is?
We will send you an email from service@cybersecurity.cash with the paypal link or the bank wireing transfer instructions. ok?
Welcome abord to what I know is going to be a very rewarding relationship, you made a smart decision!
Again, welcome abord!!!!
I will contact the owner and get the email out to you ASAP.
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users through ransomware; or interrupting your normal business processes.
Comments
Post a Comment