social network

Results 326 - 340 of 340Sort Results By: Published Date | Title | Company Name
By: uberVU via HootSuite     Published Date: Nov 08, 2012
Social media has grown out of it's infancy and is no longer an optional task for brands. Emerging with audiences on established social networks is now a key part of business interaction. Learn to tap into social leads with hootsuite.
Tags : hootsuite, social media, interaction, social media leads, tips and tactics
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Don’t look far. Your best potential social advocates are actually your own employees.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
     uberVU via HootSuite
By: uberVU via HootSuite     Published Date: Apr 23, 2013
Today’s B2B buyers are socially sophisticated and informed. Do you have the tactics, tools and training to leverage social media for sales success? Find out how to use social media to relate to customers, identify opportunities for engagement, establish credibility, and stay visible and valuable at every stage of the purchase process.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
     uberVU via HootSuite
By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : sage, social media, human resources, recruit, risk, intellectual property
     Sage
By: Kaseya     Published Date: Jul 24, 2013
BYOD, cloud computing, MAC adoption and social networking security will dominate IT organizations this year.
Tags : kaseya, byod, cloud computing, mac adoption, social networking, data, it solutions, it concepts
     Kaseya
By: TIBCO     Published Date: Oct 28, 2013
In an IT landscape dominated by big data, mobility, social networking and cloud computing, integration will not only grow in importance, its very nature will change. This paper will discuss the 21st Century IT landscape as it relates to the new integration, and argue that the need for a comprehensive integration strategy has never been more urgent.
Tags : tibco, big data, integration, integration strategy, data management
     TIBCO
By: SocialChorus     Published Date: Mar 28, 2014
Employee advocates are your brand’s best resource to expand existing marketing programs. In fact, content shared by employees on social networks receives 8x the engagement of content on a brand’s own channel. By powering employees to experience, create and share authentic content, brands can increase social engagement, reach new customers, and drive more web traffic. Hear DeShelia Spann, Digital Marketing Strategist at Eaton, share how Eaton is mobilizing their employees to promote marketing initiatives and share brand content.
Tags : socialchorus, employee advocate channel, marketing, branding, marketing strategy, marketing programs, social networking, social engagement
     SocialChorus
By: Gigya     Published Date: May 14, 2014
This guide takes an in-depth look at 3 of the main hurdles facing IT today and the solutions that can be used to better navigate this new identity ecosystem.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: Gigya     Published Date: May 14, 2014
In this guide, we’ve outlined some strategies that integrate Pinterest’s value offering to boost conversions and user engagement.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: Gigya     Published Date: May 14, 2014
Learn 3 keys to gaining an actionable view of consumer identity that facilitates data-driven decision making, provides measurable results and drives unique KPIs.
Tags : social login, gamification, social plugin, rating and review software, user management tool, social user management software, social customer tool, social consumer data
     Gigya
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Trapit     Published Date: Nov 17, 2014
Download this webinar to learn how marketers can successfully build brands by giving employees an easy and fun way to share content to their social networks.
Tags : employee advocacy, brand advocacy, social media marketing strategy, plan social media, social marketing, company advocacy, motivating employee, software social media
     Trapit
By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
     Mimecast
By: Microsoft Azure     Published Date: Apr 10, 2018
Help your sellers work smarter and build stronger relationships Sales teams work so hard, they can burn out quickly. It’s tough when customer contacts, sales goals, productivity tools, and social networking are all separated and siloed. Instead of working in separate systems that make day-to-day selling complex, you can help simplify the way your sellers work. And empower your team to be more productive and efficient. Our e-book, “The Savvy Seller’s Guide to Building Profitable Relationships,” is packed with advice for making selling much less painful—and more profitable. Did you know if your lead has had prior exposure to content from your company’s brand, that they’re 25% more likely to respond to your InMail? You’ll find this and more helpful facts in the e-book, including actionable insights to help your team: Identify the right leads—including pinpointing who’s on the buying committee Capture buyers’ attention Use insights and predictive intelligence from AI and machine learni
Tags : 
     Microsoft Azure
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14     Next   End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.