Social Media: Measure, Monitor and Mean It - Slide 16

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16
Next Next

Our Ann All commented extensively on the Burson-Marsteller's Global Social Media Check-up earlier this month, so we wanted to bring you the highlights of the study (which you can download in its entirety here in PDF format).

Burson-Marsteller found a somewhat different twist to this strategy problem of exactly how many folks at your company to get involved in social media. Rather than not including enough folks in their social efforts, as other sources had described to Ann, many companies include too many -- and don't provide a unifying strategy to guide them.

Specifically, Burson-Marsteller found 65 percent of Global 100 companies have active Twitter accounts, 54 percent have Facebook fan pages, 50 percent have YouTube video channels and 33 percent have corporate blogs. Seventy-nine percent of the companies use at least one of these social media platforms, but just 20 percent utilize all four channels, suggesting they are missing opportunities for deeper interactions with customers. While just about a third of the companies blog, Burson-Marsteller says blogs are "ideal venue[s] for a more in-depth interactive discussion." (You can only say so much in 140 characters, right?)

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AVTEST2014Awards0x AV-TEST Identifies the 10 Best Security Products of 2014

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented in five categories, including protection, performance, usability, Android security and best repair. ...  More >>

Security58-190x128 Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. ...  More >>

MenloSecurityMalware0x Five Cyber Attacks that Made CISOs Rethink Security

Security today is based on the premise that one can detect whether something is good or bad. This premise is fundamentally flawed as malware continues to evade even the latest security technologies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date