Social Media: Measure, Monitor and Mean It - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Next Next

For frequency of activity, Twitter wins again, with 82 percent of the companies posting tweets in the past week. Fifty-nine percent posted on Facebook, 68 percent uploaded videos to YouTube, and 36 percent created blog posts.

Our Ann All commented extensively on the Burson-Marsteller's Global Social Media Check-up earlier this month, so we wanted to bring you the highlights of the study (which you can download in its entirety here in PDF format).

Burson-Marsteller found a somewhat different twist to this strategy problem of exactly how many folks at your company to get involved in social media. Rather than not including enough folks in their social efforts, as other sources had described to Ann, many companies include too many -- and don't provide a unifying strategy to guide them.

Specifically, Burson-Marsteller found 65 percent of Global 100 companies have active Twitter accounts, 54 percent have Facebook fan pages, 50 percent have YouTube video channels and 33 percent have corporate blogs. Seventy-nine percent of the companies use at least one of these social media platforms, but just 20 percent utilize all four channels, suggesting they are missing opportunities for deeper interactions with customers. While just about a third of the companies blog, Burson-Marsteller says blogs are "ideal venue[s] for a more in-depth interactive discussion." (You can only say so much in 140 characters, right?)

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.