Tag Archives: twitter

Running a Tweetchat: Best Practices for Success

Social media is an extremely powerful tool for any business to utilize. The use cases for it are increasing, and businesses are starting to find new and innovative ways to utilize the most popular platforms.

A Tweetchat is one of the trendiest social media campaigns one can run for their client. Short for Twitter chat, a Tweetchat is a public discussion that takes place on Twitter around a specific hashtag. These discussions are led by a moderator—an individual or company—who asks questions and facilitates the conversation.

Although a very rewarding project to run, these Tweetchats can also require a string of best practices to ensure a smooth and successful campaign.

Find Your Purpose
It is essential for you to identify the purpose of the Tweetchat before you begin. This could entail multiple planning meetings with your client beforehand to accurately identify the perfect goals. Due to the amount of planning this program can take, having a clear-purpose can make the campaign easier to organize and accomplish. Pinpointing your goals also allows you to clearly set up a sound foundation for you to build your Tweetchat atop. Set up your goals, a planned messaging approach, and more to ensure the program will run smoothly and create flexibility of your posts.

Research and Identify
Take your time to dig into research, and identify a topic or trend that is relevant to your client’s industry and audience. It’s best to try and understand what would be interesting or important from your audience’s perspective. Not only this, but it’s also important to research and identify potential attendees for your Tweetchat. Who are big influencers not only in your industry, but to your specific topic? Who do you believe would have the largest audience as well as the most social influence? Also, research the best time to hold the chat. Your chat should fall within the most active hours for your followers, which can be found by using tools like Followerwonk. Anchoring your Tweetchat around an event can easily increase engagement as well as the reach of your posts by attaching the specific hashtags.

Promote Your Tweetchat
To avoid a quiet Tweetchat, you should start promoting the chat at least two weeks ahead of the discussion. Promoting the Tweetchat across multiple social platforms helps reach a broader audience. Your client, their participating partners, the moderator and at least one person from the 10Fold team should be on the line until the Tweetchat ends. Encourage your Tweetchat’s moderator and your client’s partners to promote the Tweetchat. Providing them with content to share makes it easier for them to share details about the chat to their audiences. You can use a content planning spreadsheet to easily share your promotional content with others.

 

RELATED: A Few Best Practices for B2B Social Media

Host Your Tweetchat
When the big day comes around, it’s important to kick things off on the right foot. Make sure everyone is on the same page by dialing into a conference call line at least 15 minutes before the chat begins. The company’s representative, their participating partners, the moderator and yourself should be on the line until the Tweetchat ends. The moderator should welcome participants to the Tweetchat, and ask them to introduce themselves.

After introductions, it’s time for the questions and answers. Here are some best practices to follow:

  1. Questions and answers should use the Q1/A1 structure to make it easy for people to follow along (Note: we did not do this for the smart cities chat, and it made it slightly difficult for people to follow.
  2. Ask a question every five to 10 minutes
  3. Ask at least six questions, but no more than 12
  4. If needed, tailor the number nature and tone of your questions for your audience
  5. If more than one person is replying from your client’s account, use the respondent’s initials with their answer
  6. Retweet the best answers to keep the conversation going
  7. Allow time for participants to discuss their answers with each other

Deliver Results
Be sure to always capture your results. Within a day of the Tweetchat, use a tool like Storify to capture and organize the conversation from the Tweetchat. By archiving the chat with Storify, you can easily curate the chat and share it on other platforms to reach a broader audience. Also, don’t forget to report your results to your client within a week of the chat. These reports should highlight, key learnings, significant engagements, as well as statistics from Twitter Analytics and Tweet Reach.

Following these tips can set your Tweetchat up for success, not only making the process easier, but also improving your results!

By Nathan Zaragosa and Katrina Cameron

Gain some good insights from this piece? Check out some of our other content here

Security Never Sleeps- Playstation Hack, IoT Security

PlayStation Hack Affects Twitter Account

“What happened with PlayStation security”

The official PlayStation Twitter account has been subject to a security breach today, with hacking group OurMine supposedly taking responsibility. The only real evidence thus far comes from the affected account itself, with messages from the social feed allegedly coming from the group posted on the PlayStation Twitter. One also claimed that the PlayStation Network had been compromised, so any users may want to change passwords and other sensitive information.

How to improve IoT security

“Security and privacy risks always increasing”

A recent study from researchers at the technical University of Denmark, Sweden and many more, titled ‘Internet of Hackable Things’, have outlined the new privacy issues that surround the devices. Industries of particular concern include smart devices in healthcare, smart homes, and building operation faculties.

50% of Ex-Employees Can Still Access Corporate Apps

“Businesses drive risk of breaches”

Often times when employees are terminated or move to new roles elsewhere, firms forget to end access to corporate applications. Researchers at OneLogin have polled 500 IT managers to learn how they terminate staff login information and credentials in-house. Initial results trend towards administrators are not doing enough to protect against the potential breach risk from ex-employees.

Enjoy your read? Check out our other content here.

PR Intern’s Guide to the Galaxy: Making Relevant Media Lists

Media lists can be considered the secret weapon of the PR pro. While they’re a relatively simple tool, they’re arguably the most important to PR success. Without an updated, accurate and beat-tailored media list — sucess is hard to come by. Your reputation as a PR practitioner can also be tarnished if you constantly are pitching the wrong media contacts (you might also find your misguided email screenshotted on Twitter under #PRFails).

Media lists are used to:

  1. Secure media coverage for your client
  2. Reach a target audience
  3. Keep a history of dialogue between your client and a reporter to ensure pitches/conversations are more useful for both parties

Audience – The first thing to consider when building a media list is your client’s target audience, this will help you determine the types of publications that need to be included based on their readership. It’s also important to identify the coverage of your clients competitors. It is likely that media covering your client’s competitors will be interested in covering your client as well. A well rounded media list will include trade reporters, reporters from vertical outlets (government, healthcare, retail, etc.) and bloggers.

Keywords – When searching for the right media to include, it is crucial that you search the right keywords. In some cases, it is easy to only include the phrases categorizing your clients technology, but only if it is unique enough that your search results will bring back specific, relevant coverage. It is rarely that easy. More likely, there are instances where your client’s keywords are very generic and search results for the technology classification alone will bring back irrelevant results. Other keywords include the name of your clients competitors.

Tools – The tools most commonly used when searching for media are Google, Cision, Meltwater, IT Database. You will want to use these tools to search multiple combinations of your clients keywords as well as your clients previous coverage, and competitors previous coverage. Once you find the coverage, you will need to organize the information and create your media list using Excel.

Organize – Media lists can sometimes get very long but no matter the size, keep them organized! This ensures that you will be able to find the right contact, the first time, every time. Begin by opening an excel sheet and in the first row, place a filter on publication, first name, last name, title, email, phone number, twitter handle and a link to the reporters most relevant/timely story. Under each column, you will either fill in the information by hand or copy and paste it in from an Excel sheet generated by one of your previously used tools. Once you have all of the information filled in, check for duplicates and fill in anything that might be missing. Finding this missing information consists of research and can sometimes be time consuming.

Update – Keeping an updated media list is important, because there are many reporters who move from one publication to another and sometimes, a media contact will even change the topic that they report on, known as their beat. When you have a media list that is up to date and accurate, you avoid situations where reporters get frustrated with you because you mistakenly pitch them a story that they aren’t covering. Reporters are easier to work with if they know that you are paying attention to their current beat and reading their most current stories. Pitching the wrong media is a waste of their time, yours and the client’s.  

By Kory Buckley

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 130

Hacker group takes over Netflix Twitter account

“Showcases the lack of security in twitter systems”

A hacking entity by the name of “OurMine” has recently breached one of the Netflix twitter accounts (@netflix). After the initial hack, several tweets were sent out from the compromised account, including; “World Security is shit. We are here to prove this.” Most of these tweets were deleted within minutes, but highlights the concerns of businesses and users of popular internet sites.

Panasonic Inflight Entertainment System Vulnerable To Attack

“In-flight displays compromised on several major airlines”

Panasonic Avionic IFE’s has recently been found to contain several vulnerabilities that allow hackers to access audio and visual systems of passengers devices. Airlines affected include Virgin Atlantic, American Airlines, United Airlines, among many others.

The 10 biggest hacks, breaches, and security stories of 2016

“Yahoo takes the cake, again”

Millions of hacked IoT devices allowed for a massive internet attack, Russians look like they had some level of breach into influential aspects of the United States Presidential election. Was John Oliver right about 2016?

VMware removes hard-coded root access key from vSphere Data Protection

“New hotfix unexpectedly allows for potential remote access”

A new VMware VDP patch has unintentionally given hackers an exploitable access to the appliance. The disk-based recovery product integrates with vCenter, providing centralized management of over 100 virtual machines.

Enjoy your read? Check out our other content here.

10Fold- Security Never Sleeps- 112

Chinese firm admits hacked products were behind Friday’s Internet Abnormalities

“Hangzhou Xiongmai Technology vulnerabilities led to attack”

Electronic component manufacturer based in China Hangzhou Xiongmai Technologies has conceded that hackers used its technologies to conduct a massive cyberattack on several substantial United States headquartered internet sites. Mostly known for its production on DVR’s and cameras connected to the internet, weak default passwords of users is noted as a major contributing factor to their vulnerabilities. Security researchers have claimed that the notorious malware Mirai has been infiltrating and using them as a jump off point for Friday’s DDoS attack.

DDoS Attack Shows Vulnerable Underbelly Cloud Technologies

“Can a DDoS attack break the internet?”

Friday saw a massive DDoS attack, which commentators have said led to the internet ‘breaking’ for several hours over the course of the early day. Vital corporate applications, business functions and inability to use big name sites, causing public outrage and firm loss. Dyn going offline brought the shutdown of the DNS server, the component that allows users to find sites without directly inputting the IP address.

Beware of Fraudulent BSOD Scammers’ Malware

“Microsoft notifies public of fake installer for Security Essentials”

Tech support scammers have added a new weapon in the cybercriminal bag of tools, now utilizing fake ‘Severe Warning’ notifications and blue screens of death in Windows devices. Hicurdismos, the nickname given to this new malware, disables Task Manager and hides the cursor to deceive the user and suggests the user to call a bogus call center and hoaxes users to give up sensitive information the scammer will exploit for profit.

$7,500 IoT Cannon Sold, Capable of Bringing Down The Web Again

“Worse DDoS attacks expected in the future”

The attacks we got a taste of Friday was bad, but experts are saying these disruptions will get worse in intensity and probably more frequent. This is due to hackers selling access to hacked IoT devices which give their customers the ability to launch cyber events comparable or potentially bigger than what the world had witnessed. Early October also saw the advertisement of a botnet cybercriminals had put up for sale on an underground market forum, a trend that before recently had been quite uncommon. To see a malware program for sale of that caliber has researchers predicting a growth in its usage and security concerns in the future.

 

 

10Fold- Security Never Sleeps- 107

A Security SSHowDowN:  IoT devices Targeted

“Over a decade long vulnerability found and exposed’

The emerging Internet of Things market (IoT) connects WiFi networked devices that operate many different systems automatically. While this is an incredibly simplifying and innovative process, the security of these devices becomes critical as they are integrated into more and more of our everyday life. The finding of a twelve-year-old vulnerability shakes the security confidence of the industry, and leaves our personal data at risk. The uptick in recent hacks has illustrated the need for more advanced security protocols in order to offset the risk that is now being posed.

Leaky IoT devices used by hackers to infiltrate e-commerce servers

“Millions of devices could be at risk”

Default administration settings on IoT capable device may allow hackers access to eCommerce accounts that leave them vulnerable to cyberattacks. This has been an issue for about a decade, when Akami Technologies observed cyber-attacks that challenged user’s basic username and password preferences.

Vera Bradley Payment System Breached

“Potential customer data theft causes delays and concerns”

Hackers may have gained credit card information, names and internal verification information on thousands of customers from July to September of this year. Website purchases have remained safe; however, in-store purchasers may have been compromised. An investigation by the firm has been launched to find where the hack may have originated.

Several Social Media Sites Deny Permission to Surveillance Program Used by Authorities

“Facebook, Instagram and Twitter among firms involved”

High profile social media sites have been giving police agencies information related to the monitoring of protesters. Geofeedia, the tool in question, harvests social media posts and surveils the account associated and reports it to over 500 agencies, according to an ACLU report.

 

Building Influence on Twitter

Recently we posted a few tips that covered the basics of growing your Twitter presence. This blog offers a few more ideas that will boost growth and build your influence.

Use Nuvi, TrendKite, Zignal or Another Metric Tracking Application to Guide Your Strategy
Metric applications are a nuvi snapconvenient way to track how your audience is responding to your content, so that you can focus and prioritize your efforts. These tools most importantly allow you to analyze success or failures of your posts by measuring the impact your content had with your audience from an engagement (e.g. shares, likes, retweets) perspective. Most find that visuals, recognition of a person or a team, and the occasional personal picture or thought all enhance engagement.  But, every audience is different and the only way to find out what works for your “peeps” is to measure their responses.

Evaluate Your Follower Base
The point is that bigger isn’t always better.  It’s exciting to see growth in followers, but have you taken the time to see what type of people or companies are following you?  If you gather followers that look like bots or the followers link to inactive or spam accounts, remove them from your list. While reducing the number of followers you have may sound counter-intuitive, Twitter’s news feed algorithm explains that these non-user accounts can become a significant percentage of those that see your posts – meaning your posts were not seen by nearly as many people as you had planned. This is because Twitter allows only a select few of those who follow you to see your tweets without being directly on your page, and the greater amount of inactive followers you have the greater the chance that your tweets won’t reach the engaged portion of your follower base.

Keeping it Simple
unfollowLuckily, this can be remedied quite easily. Some applications such as ‘Unfollowers for Twitter’ have specific filters that allow you to find ‘Inactive Users’, which also typically capture the vast majority of fake or spam accounts. The filter allows for varying lengths of time to find and unfollow relevant followers. There is another way to remove these accounts as well. Simply find the follower you believe is inactive and click on the gear icon by the follow button and click the block button. This will remove the follower from your followers list, and can always be undone if you feel as though you have made a mistake.

Set Up an Auto-Messaging System
message snap Short messages to followers engage users personally in your content. This step is a basic, yet important step in making new followers feel welcomed. Constructing a personalized message sent when you receive a follower gives each new user a sense of your sincere gratitude and encourages them to return to your content because of a perceived personal connection to the content creator. There are many applications you can use with your Twitter account that will automatically send a message you draft yourself if you experience large quantities of new followers, but isolated drafts to individual followers of such messages work just as well!

There is no question that Twitter has become a very important publishing mechanism for many.  Everyone from Hollywood stars to corporate giants are using the social media platform to build influence and status.  There’s so much noise, it’s hard to know how to get ahead and build your own following.  Using these three simple tips:  measure, evaluate and respond – you too can become influential on Twitter.

Enjoy your read? Browse our other blogs as well!

 

3 Easy Steps to Maintain an Effective Twitter Strategy

Have you been trying to grow your Twitter presence with little success? You are far from the first, and absolutely not the last, to face such a challenge. Not to worry friends, Twitter can be a confusing place to be. 10Fold has a few quick and simple tips to help you build a consistent and growth oriented follower base.

1. Find the Right Time to Post to Your Audience

Hubspot recently released a report on social media best practices, including optimal times to post on Twitter. Weekdays on average are best during the lunchtime hours, where potential viewers are taking a break from the usual work activity and checking out their social media feeds instead.

best time to post twitterAdditionally, specifying times around hour and half hour marks (i.e., 12:03pm or 2:27) allows those just heading into or just leaving a meeting or appointment to catch your posts without having to scroll too far down their newsfeed. Applications such as Hootsuite allow you to plan content posting when desirable while also remaining user friendly and relatively simple to use.

2. Focus On Quality

While maintaining a steady supply of material is necessary to keep up a reliable base of viewers, releasing subpar material is a great way to chase away potential followers. Clickbait posts, misleading headlines and simply irrelevant topics are a signal to viewers that your content is not worth their time in the long term.

sme ex twitter growth Concentrated topics boost growth.

Additionally, rushing out material that is not fully fleshed out or is littered with factual or grammatical mistakes looks sloppy, and is more likely to put off those looking for consistent and insightful content.

3. Find Your Niche

Concentrating your efforts on a particular topic is paramount to building repeat viewers and audiences. Well rounded knowledge is an admirable trait, but is not consistent with the real world.  Your followers have specialized their skills to fit into a certain occupation, and expect the same level of professionalism in blogs or accounts that they follow to help advance their own careers. Social Media Examiner provides great examples of this, and they are rewarded with high interaction rates for each of their posts.

While Twitter may be a tough place to navigate, following the simple steps of focusing on timing, quality, and staying within your field of expertise will help to keep your voice heard and maintain a consistent and growth-oriented following.

Enjoy your read? Browse our other blogs as well!