social techniques

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
Published By: InsideView     Published Date: Aug 17, 2015
Whether you’re a marketer, a salesperson, or otherwise contributing to revenue growth, learning a few social selling techniques will help you fill your deal funnel with more–and better–leads. But it’s not as simple as creating a few tweets and browsing through LinkedIn. Put social media at the core of your lead-to-revenue process and get real tips you can use to grow revenue in our webinar, “5 Steps to Using Social Selling to Fill Your Funnel.” This short 30 minute webinar will show you how social selling will help you: Find the best targets Recognize “I’m ready to buy” signals Uncover relevant, real-time insights
Tags : 
    
InsideView
Published By: Socialbakers     Published Date: Aug 05, 2015
The benefits of running a truly social business are many - driving shorter sales cycles, improving customer care, innovating your talent recruitment strategies, and improving how you coordinate your organization from top to bottom in pursuing unified goals.
Tags : 
social media, social business, customer care, recruitment, recruitment strategies, marketing tools, social techniques, social media strategy, social media marketing
    
Socialbakers
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: ITinvolve     Published Date: Apr 16, 2013
Most assets in IT are governed by one or more policies, yet there is usually no quick and easy method to determine which policies apply to which assets and what specifically those policies govern. This means that IT teams are often making changes to assets that violate the policies meant to govern them. Read this use case document to understand how social knowledge collaboration techniques can help you to easily assign and track the policies that govern your assets to avoid out of compliance situations.
Tags : 
itinvolve, policies, it teams, compliance situations, social knowledge collaboration, techniques
    
ITinvolve
Published By: InsideView     Published Date: Apr 27, 2015
This guide is written to show sales teams how to increase productivity by using Social Selling techniques powered by InsideView.
Tags : 
social selling, insideview, prospects, traditional data, social media, engagement, win rates, traditional marketing, sales
    
InsideView
Published By: Trapit     Published Date: Jan 21, 2015
Are you ready to build your business case for social selling? Do you need some help? Download this PowerPoint deck so that you feel prepared speaking to your executive committee about social selling.
Tags : 
social selling, b2b buyers, prospecting techniques, lead generation, internal social selling, emerging marketing, marketing research, sales
    
Trapit
Published By: AtTask     Published Date: Feb 11, 2012
In this free case study Forrester Research explains how the melding of task management with social networking is increasing transparency and team member buy-in for projects - dramatically increasing projects delivered on time and within budget.
Tags : 
task management software, task tracking software, task software, task project management, business task management software, task it, task tracking, task tracker, online task tracking, task tracking system, task tracking tool, knowledge management
    
AtTask
Search      

Add Research

Get your company's research in the hands of targeted business professionals.