In-depth

Top 10 social networking tips for enterprise - part two

We conclude our two-part look at what the big social networking sites had to offer businesses.

top 10

6. Tap into Twitter with social CRM software

Andrew Yates, chief executive of Artesian Solutions suggests that the enterprise would be foolish to ignore social media as a source of sales intelligence. After all, as Yates points out, the average customer today expects you to know a lot about them so it's imperative that your sales team can leverage the social web to actively listen, engage and add value.

Advertisement - Article continues below

"Consider how a business could tap into Twitter with its 150 million net contributors to find a mention of a company, assess whether the sentiment was good or bad, understand the context of the subject matter, and then decide whether this was in some way relevant to their business, product or service?" Yates says, adding "The ability to filter the web and social media for this kind of 'inside' sales intelligence is essential".

Which is where a whole new category of social CRM software comes in, making it possible to sift through this content by intelligently deciphering what is relevant.

"By harnessing the power of social media in this way, it will be easy for companies to accelerate their sales by tracking their customers and competitors every minute of the day" Yates says.

Advertisement
Advertisement - Article continues below

"In a time when a single customer complaint from someone with influence can have more impact on a company's reputation than its best marketing," Rishi Dave, executive director of online marketing at Dell concludes "social media enables businesses to listen and respond instantly to customer queries, problems and comments".

Advertisement - Article continues below

7. Consider buzz monitoring software

Jonny Rosemont, head of social media at DBD Media (and previously responsible for setting up and managing the social media strategy at John Lewis) has a good tip for businesses looking to dip a toe into the social media water: do your research first. "The most important thing to do is to embark in some audience analysis to identify where your customers congregate online" Rosemont says, adding "if you are a business trying to attract consumers then the likelihood is that the most popular social networks (such as Facebook and Twitter) will be areas you will need to build up a dialogue on". But, as Rosemont told IT Pro, if you are targeting a specific niche or group of individuals such as business leaders or IT buyers for example, then there might be other avenues worth considering. "There are some great buzz monitoring solutions (e.g. Radian6) that can help you find your audience" Rosemont concludes "and you could always seek agency support to help you define your priorities".

Advertisement - Article continues below

8. Update your policies

Ensure that your current policies are updated to apply content control to social media usage. Which means making sure there are guidelines in place to cover both what your staff post and what they look at. Good policy helps mitigate the risk of bad practise such as the wrong information being published on a social network or accessing content that could impinge upon the health of your network.

"You need to make sure you have clear policy and usage rights in place for both employees posting in a business and personal capacity" Greg Day, security CTO and director of security strategy at Symantec for Europe, the Middle East and Africa (EMEA) reminds us, adding that it's also important to "understand the legalities behind ownership of posted comment. You need to implement data controls and have a plan in place for any occasion that may see you needing to revoke content".

Advertisement - Article continues below

9. Know the dangers

There are some pitfalls to avoid when doing business in the social networking sphere. Knowing what they are is vital in order to be able to avoid them. Jesse Engle, vice president of social media with ExactTarget, advises that you can actually lose followers (and therefore potential customers) by "spamming or posting boring information too often" or end up in court through posting confidential information.

This is why Engle insists that employees should be "educated in the art of social conversation". Nir Zuk, CTO of Palo Alto Networks, argues that responsible use alone is not always enough.

"Companies also need to be able to monitor social network traffic in order to detect threats" Zuk told IT Pro "this can be achieved by installing a next generation firewall system which can classify and protect all application traffic on corporate networks, unlike legacy firewalls. This can be thought of as a safe enablement model, which is ultimately about striking a balance between security and user independence".

Advertisement - Article continues below

10. Don't forget the four rule of social media engagement

And finally, Manish Sablok, head of marketing for North Europe at Alcatel-Lucent, reminds us not to forget the four basic rules of social media engagement: listen, prioritise, engage, integrate.

"Through true integration, companies gain the ability to listen to consumer sentiment about their brands and to prioritize customer sentiments to determine the appropriate actions, engaging with consumers as never before" Sablok says, concluding "Good social media practice integrates the resulting interactions across marketing, customer service, and other customer touch points to deliver a truly satisfying customer experience".

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020