CR-T Blog

CR-T has been serving the Orem area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Company Social Media Policy Part 1

Social media has revolutionized the way people communicate online. Social media is where discussions are had and information is shared. Over the past few years, the world has seen a remarkable shift in the way people socialize and it is not going away.

It's not whether you use social media, it's how you use it.

Every second, one hour of video is uploaded to YouTube (More video is uploaded to YouTube each month than the 3 major US television networks were able to create over 60 years). Facebook is rapidly nearing 1 billion active users (1 out of 7 of all humans aren't just on Facebook, but are on it regularly). Each day on Twitter, the world writes a 10 million-page book of tweets.

Social media isn't just about people - it's about the things in our lives, the businesses we deal with, the organizations we work for, and virtually every aspect to our daily lives. We take social media to work with us, it follows us to the store, and it's there every time we go out to eat.

Ignoring social media is one of the worst possible things a business can do.

Businesses should not only leverage social media for their marketing, but need to acknowledge that the majority of their employees use multiple forms of social media. It's important for businesses to establish a social media policy.

There are two basic ways to approach the creation of your social media policy:

  1. Establish a clear, precise set of rules on how to conduct communication across social networks.
  2. Organically grow your social media policy while experimenting with the various opportunities your company can leverage and react to situations as they arise.

Both methods are completely viable; the first sets up the rules employees are to follow while the second drives innovation but offers potential risk. Regardless, you'll need to define some basic principles for your company social media policy.

How does your business handle social media? How 'official' is your policy on social media? Let us know in the comments!


No comments yet
Already Registered? Login Here
Tuesday, 25 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Microsoft Business Management Tip of the Week Internet Saving Money Privacy Small Business Workplace Tips Managed Service Provider Backup Hardware Software Quick Tips Mobile Office Productivity Cloud Data Social Media Gadgets Hackers Best Practices Email Business Computing Google Users Malware Mobile Devices Network Virtualization Hosted Solutions Windows Business IT Services Upgrade Microsoft Office IT Support Computer Smartphones Communication VOIP Passwords WiFi Business Continuity Windows 10 Miscellaneous Smartphone Efficiency Innovation Disaster Recovery Holiday Mobile Device Management Marketing User Tips Server Vendor Management Facebook Best Practice Office Remote Computing Android Current Events Alert Apple Operating System Bring Your Own Device Browser Outlook Mobile Computing App Health Spam Going Green Lithium-ion Battery Remote Monitoring Trending The Internet of Things History Wireless Technology Apps Information Technology Ransomware Tutorials Big Data Windows 8 Gmail Printer Humor Content Filtering Customer Relationship Management IT Solutions Maintenance Save Money IT Consultant Avoiding Downtime Application Computer Repair Saving Time Office Tips BYOD Social Password Robot Artificial Intelligence Excel Automation Unified Threat Management Internet of Things Fax Server Retail Network Security Google Analytics Education Hard Drives Hacking Computers Hacker Sports Business Growth Money The Cloud Antivirus Digital Payment Proactive IT Twitter Data Management Customer Service User Error PowerPoint Tech Support Presentation Administration Router Virus Firewall iPhone Inbound Marketing Phone System Cortana Chrome Augmented Reality Samsung Employer-Employee Relationship Laptop Touchscreen Mouse How To Competition Risk Management Mobile IBM Data storage Upgrades Point of Sale Safety Bandwidth Phishing Printing VPN Net Neutrality Hosted Solution Recovery Computing Wi-Fi Settings Social Networking User Tools End of Support Business Owner Tablet Running Cable Search Video Surveillance Display LiFi Analyitcs Cybercrime Downtime Legal Piracy Website Social Engineering Webcam Encryption Java Web Marketing SaaS Typing Public Speaking Google Drive Bluetooth Knowledge Managed IT Services YouTube Help Desk Crowdfunding Licensing Update Cryptocurrency Google Docs Online Currency Mobile Device Experience Save Time Chromebook Word Bitcoin Co-managed IT IP Address Training eWaste Virtual Desktop Memory Hiring/Firing Emoji Hacks Storage Phone Systems Company Culture 3D Printing Environment People Gadget ebay Gaming Console Black Market Wireless Dark Data Document Management Unsupported Software Admistrator Troubleshooting File Sharing Outsourcing Text Messaging Processors Keyboard Shortcuts Wearable Technology Alerts PC Care Mobile Data communications Conferencing Statistics USB Notifications Refrigeration Google Wallet 5G Scheduling Halloween Remote Support Leadership Physical Security Unified Communications Scam Managed Service Providers Crowdsourcing Drones Macro Two-factor Authentication Network Congestion Consumers Scary Stories Work Station Skype Personal Information IT service Value Debate Print Server Collaboration 3D Government Undo Budget Office 365 Monitors Recycling LinkedIn Electronic Medical Records Deep Learning Streaming Media Law Firm IT It Issues Intranet Work/Life Balance Fun Writing Specifications Buisness Trojan Best Available Virtual Reality Entrepreneur Alt Codes Webinar Business Intelligence Programming Domains Disaster Computer Accessories Windows 8.1 Update Law Enforcement

Latest Blog Entry

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were...

Latest News

  • Private Screening of The Hobbit III

    By invitation only

    CR&T’s 18th annual client appreciation event: THE HOBBIT III. This is a private pre-screening before the world premiere.

    Location: Thanksgiving Point Theater
    Time: December 16th 8:30AM (REMEMBER THIS IS 1 DAY PRIOR TO THE WORLD PREMIERE) seating is first come.


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#