Top 10 social networking tips for enterprise - part two

We conclude our two-part look at what the big social networking sites had to offer businesses.

top 10

6. Tap into Twitter with social CRM software

Andrew Yates, chief executive of Artesian Solutions suggests that the enterprise would be foolish to ignore social media as a source of sales intelligence. After all, as Yates points out, the average customer today expects you to know a lot about them so it's imperative that your sales team can leverage the social web to actively listen, engage and add value.

"Consider how a business could tap into Twitter with its 150 million net contributors to find a mention of a company, assess whether the sentiment was good or bad, understand the context of the subject matter, and then decide whether this was in some way relevant to their business, product or service?" Yates says, adding "The ability to filter the web and social media for this kind of 'inside' sales intelligence is essential".

Which is where a whole new category of social CRM software comes in, making it possible to sift through this content by intelligently deciphering what is relevant.

Advertisement - Article continues below
Advertisement - Article continues below

"By harnessing the power of social media in this way, it will be easy for companies to accelerate their sales by tracking their customers and competitors every minute of the day" Yates says.

"In a time when a single customer complaint from someone with influence can have more impact on a company's reputation than its best marketing," Rishi Dave, executive director of online marketing at Dell concludes "social media enables businesses to listen and respond instantly to customer queries, problems and comments".

7. Consider buzz monitoring software

Jonny Rosemont, head of social media at DBD Media (and previously responsible for setting up and managing the social media strategy at John Lewis) has a good tip for businesses looking to dip a toe into the social media water: do your research first. "The most important thing to do is to embark in some audience analysis to identify where your customers congregate online" Rosemont says, adding "if you are a business trying to attract consumers then the likelihood is that the most popular social networks (such as Facebook and Twitter) will be areas you will need to build up a dialogue on". But, as Rosemont told IT Pro, if you are targeting a specific niche or group of individuals such as business leaders or IT buyers for example, then there might be other avenues worth considering. "There are some great buzz monitoring solutions (e.g. Radian6) that can help you find your audience" Rosemont concludes "and you could always seek agency support to help you define your priorities".

8. Update your policies

Ensure that your current policies are updated to apply content control to social media usage. Which means making sure there are guidelines in place to cover both what your staff post and what they look at. Good policy helps mitigate the risk of bad practise such as the wrong information being published on a social network or accessing content that could impinge upon the health of your network.

Advertisement - Article continues below

"You need to make sure you have clear policy and usage rights in place for both employees posting in a business and personal capacity" Greg Day, security CTO and director of security strategy at Symantec for Europe, the Middle East and Africa (EMEA) reminds us, adding that it's also important to "understand the legalities behind ownership of posted comment. You need to implement data controls and have a plan in place for any occasion that may see you needing to revoke content".

9. Know the dangers

There are some pitfalls to avoid when doing business in the social networking sphere. Knowing what they are is vital in order to be able to avoid them. Jesse Engle, vice president of social media with ExactTarget, advises that you can actually lose followers (and therefore potential customers) by "spamming or posting boring information too often" or end up in court through posting confidential information.

This is why Engle insists that employees should be "educated in the art of social conversation". Nir Zuk, CTO of Palo Alto Networks, argues that responsible use alone is not always enough.

Advertisement - Article continues below

"Companies also need to be able to monitor social network traffic in order to detect threats" Zuk told IT Pro "this can be achieved by installing a next generation firewall system which can classify and protect all application traffic on corporate networks, unlike legacy firewalls. This can be thought of as a safe enablement model, which is ultimately about striking a balance between security and user independence".

10. Don't forget the four rule of social media engagement

Advertisement - Article continues below

And finally, Manish Sablok, head of marketing for North Europe at Alcatel-Lucent, reminds us not to forget the four basic rules of social media engagement: listen, prioritise, engage, integrate.

"Through true integration, companies gain the ability to listen to consumer sentiment about their brands and to prioritize customer sentiments to determine the appropriate actions, engaging with consumers as never before" Sablok says, concluding "Good social media practice integrates the resulting interactions across marketing, customer service, and other customer touch points to deliver a truly satisfying customer experience".

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020