LinkedIn tip: How businesses can target status updates
- 22 June, 2012 21:45
LinkedIn has extended a new feature, called "Targeted Status Updates" to all companies that have LinkedIn Company Pages. This feature first launched in April, but was available to only a few businesses.
Targeted Status Updates "aims to make it easier for members to receive relevant information from companies they follow," says LinkedIn project manager Mike Grishaver. "In turn, companies can now communicate with their followers in a very personalized way and provide content tailored to specific audiences."
When users follow a company on LinkedIn, information and updates such as company news, industry trends and job opportunities are pushed to the activity stream. LinkedIn says that the more you engage with a company, the more you'll find relevant content.
Here's a rundown of the features and how your businesses can use this to your advantage.
Businesses: How to Target Status Updates
Any company page administrator can target a status update to a particular audience. To do this, log into your company's LinkedIn page, type the text of an update and click the drop-down menu next to "Share with:" for the "Targeted audience" option.
In the next window that pops up, you can choose from a number of targeting options, including company size, industry, function, geography or geography.
Followers who match your criteria will see your update on their homepage, in their activity streams. The update will also be visible to anyone who visits your company page directly.
Another feature of "Targeted Status Updates" is analytics for each post, 24 hours after if was posted. These analytics, which appear under each of your posts, is available only to business page admins and includes the number of impressions the update received, how many clicks it generated, how many times it was shared and the engagement percentage.
LinkedIn also recommends keeping an eye on your follower statistics, which will help you hone your messages to ensure you're reaching the appropriate audience. You can find this tab at the top of your LinkedIn business page between "Products & Services" and "Page Statistics."
Additional information you'll see here includes your follower demographics, updates and engagement levels. You'll also see information about which updates your followers find more interesting,
[Want more LinkedIn tips, tricks and analysis? Check out CIO.com's LinkedIn Bible.]
Kristin Burnham covers consumer technology, social networking and enterprise collaboration for CIO.com. Follow Kristin on Twitter @kmburnham. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Kristin at firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.