Social Media: Measure, Monitor and Mean It - Slide 8

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16
Next Next

Our Ann All commented extensively on the Burson-Marsteller's Global Social Media Check-up earlier this month, so we wanted to bring you the highlights of the study (which you can download in its entirety here in PDF format).

Burson-Marsteller found a somewhat different twist to this strategy problem of exactly how many folks at your company to get involved in social media. Rather than not including enough folks in their social efforts, as other sources had described to Ann, many companies include too many -- and don't provide a unifying strategy to guide them.

Specifically, Burson-Marsteller found 65 percent of Global 100 companies have active Twitter accounts, 54 percent have Facebook fan pages, 50 percent have YouTube video channels and 33 percent have corporate blogs. Seventy-nine percent of the companies use at least one of these social media platforms, but just 20 percent utilize all four channels, suggesting they are missing opportunities for deeper interactions with customers. While just about a third of the companies blog, Burson-Marsteller says blogs are "ideal venue[s] for a more in-depth interactive discussion." (You can only say so much in 140 characters, right?)

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Risk9-190x128 Vendor Risk Management: Ten Frequently Asked Questions

As cyber threats become more sophisticated and complex, businesses need not only to ensure they are secure, but also that their vital partners, suppliers, and vendors are protecting themselves as well. ...  More >>

eCommerce9-290x195 How to Minimize Fraud this Holiday Season

Learn how your organization can improve its approach to fraud prevention and lower costs involved with fraud and ID theft this coming holiday season. ...  More >>

Security68-290x195 Five Common Data Encryption Myths

Data encryption seems to be the logical choice when it comes to implementing a sound security strategy, but there are still skeptics. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date