Thursday, May 28, 2009

Embracing Social Media Means Protecting Your Online Identity

Consider the recent example of Pittsburgh Steelers quarterback Ben Roethlisberger, whose digital doppelganger created false identities spanning a range of social media sites and even claimed he had been diagnosed with skin cancer. ESPN advised in its NFL Rumor Central, "Not real, folks. In fact, if you see an athlete with a Twitter, you should assume -- at least at first -- that it's fake. Assume it's a Twitter twerp."

What happens to celebrities happens to brands too. Identity hijacking is prevalent in social media largely because it's easy to set up accounts and find an audience. The potential for the reach is enough of a lure. When I recently asked Facebook's Chris Pan who Facebook's audience is, he said something to the effect of, "Pretty soon it'll be everyone." He's not that far off. Here are Ten Steps Designed to Protect you and your firm's Web identity.

1) Run an audit of where your brands are. Note the usernames you use. If you have one flagship brand that's also your company name, then it's easy. If you have a stable of brands, this could be a long list.

2) Prioritize the usernames. In the Sal's example, the business may be Sal's Ristorante but it's known as Sal's Pizza, so salspizza (which is also easier to spell and type) would be the preferred name.

3) Use a site such as usernamecheck.com or knowem.com to enter see if your usernames are taken across scores of sites. Also check for other brand terms. Prioritize usernames that are both memorable and widely available -- that's the sweet spot.

4) For any sites that you know are priorities, register your key usernames. If you're not sure which sites to prioritize, start with the ones you've heard of.

5) Eliminate any sites that are only for consumers and are off-limits for marketers or brands. For this and the next steps, call on the most social-media-savvy person you know, ideally someone you work with closely in your company, at an agency, or elsewhere.

6) Now you need to review all the other sites and prioritize further. If you're at a total loss, use Compete or Quantcast's free tools to see how much traffic the sites get, and pick a threshold. 7) For any of these sites, if you don't plan on using them right away, fill in the minimal information required, post a link back to your homepage or the hub of your social marketing program, and adjust the privacy settings (where possible) so that's they're visible to the smallest audience. You don't want to set false expectations for engaging consumers, and you don't want to publicize a brand presence that falls short of your standards.

8) Check where competitors are. One easy way to do so is look for their most obvious usernames and visit those accounts to see if they're really competitors or squatters. If you can't find much, run some basic searches. Consider whether it's worth joining competitors on those sites if you haven't signed up already.

9) Share the list of registered usernames and passwords with a few trusted colleagues so you're not the only one with the information.

10) Don't be a jerk. You'll find opportunities to undermine competitors throughout this process. Be one of the good guys. Try believing in karma.

No comments: