Social Media: Measure, Monitor and Mean It

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Previous Next

Click though to see highlights and suggestions from Burson-Marsteller's Global Social Media Check-up.

Our Ann All commented extensively on the Burson-Marsteller's Global Social Media Check-up earlier this month, so we wanted to bring you the highlights of the study (which you can download in its entirety here in PDF format).

Burson-Marsteller found a somewhat different twist to this strategy problem of exactly how many folks at your company to get involved in social media. Rather than not including enough folks in their social efforts, as other sources had described to Ann, many companies include too many -- and don't provide a unifying strategy to guide them.

Specifically, Burson-Marsteller found 65 percent of Global 100 companies have active Twitter accounts, 54 percent have Facebook fan pages, 50 percent have YouTube video channels and 33 percent have corporate blogs. Seventy-nine percent of the companies use at least one of these social media platforms, but just 20 percent utilize all four channels, suggesting they are missing opportunities for deeper interactions with customers. While just about a third of the companies blog, Burson-Marsteller says blogs are "ideal venue[s] for a more in-depth interactive discussion." (You can only say so much in 140 characters, right?)

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

infra86-190x128.jpg Top 5 Places Your Enterprise Data Is at Risk

The top five areas exposing your sensitive data to risk and tips for minimizing security vulnerabilities. ...  More >>

Security99-290x195.jpg 5 Ways to Keep Cybersecurity on Track While on Vacation

Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ...  More >>

Security98-190x128 5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.