The 22 Must Haves of Secure Enterprise Social Media Deployments
In our personal lives, we talk about things like security and privacy all the time. Last week’s uproar on Facebook is only the latest example.
But most large enterprises seem to be missing the boat…by a nautical mile.
According to the Altimeter Group, “almost two-thirds of companies…say that social media is a significant or critical risk to their brand reputation.”
And Forrester Research tells us that 64% of large companies ‘have no social media policy in place, or if they do, they lack tools to sufficiently enforce and support the policy.”
Why is this?
In the rush for engagement, conversation, and reach, critical issues that protect the integrity of the brand like security, risk, and compliance can get left by the wayside.
Sprinklr works with some of the world’s largest, most social brands. Companies like Dell, Samsung, Cisco, Hearst, and Virgin America- among 100 others.
Based on our experience, we’ve assembled a list of the 22 Must Haves for a Secure Enterprise Social Media Deployment.
It covers topics such as:
· rules to flag unacceptable outbound content
· enterprise-wide, single point password control?
· ability to retract social messages from a central location?
· Ability to differentiate influencers?
And 18 more.
You can view or download the list of best practices for a secure enterprise social media deployment here.
Jeremy Epstein is VP/Marketing and Social Navigator at Sprinklr.
Sprinklr enables large companies to be Social at scale (Social@Scale)
The Altimeter Group calls Sprinklr “the most capable” Social Media Management System to serve the needs of large organizations. The company is the SaaS platform of choice for over 120 global brands including Cisco, Dell, Virgin America, Hearst, and DuPont.