From the category archives:

Database

The Good, the Bad and the Ugly of Marketing Database Creation.

At some point in every database marketing project the ‘build vs. buy’ decision must be made. As a marketing practitioner I was tasked with building the marketing databases at two different companies. I then spent the bulk of my career on the provider side building marketing databases for clients, and I’ve seen the good, the bad, and the ugly of database marketing creation. As a Marketing Information Manager tasked with building a marketing database for a large regional bank, my first thought was to build it in house. After all, not many companies in those days had more computers or programmers than banks and I’d only need a small team to build and maintain the database. After pursuing this course for a while, I determined that the only way to get this accomplished in any sort of reasonable time frame and within budget was to contract with an outside database supplier.

Read the full article.

Pareto’s Law or the Long Tail Theory? What Marketers Must Measure Now.

The foundational concept of all database marketing is the Pareto Principle, that 80% of your sales and profitability will come from about 20% of your customers. When we have analyzed our clients’ customer bases to prove out this theory, we often find that the distribution is even more uneven– that 100% or more of customer profitability comes from an exceedingly small group—because clients are actually losing money from some part of their customer population. The 80/20 theory often holds true for product sales as well – 80% of sales often comes from just 20% of the products offered by a manufacturer. This concept has driven everything in database marketing from audience identification to campaign structure, sales strategy etc.

Read the full article.

Understanding the Five Customer Relationship Stages to Full Engagement With Your Brand

As our clients juggle new channels, new technology and new media, we realize that their relationships with their customers and prospects have to be 24/7 and “always on”. How we help them with Analytics, strategy and marketing technology today really goes beyond just the marketing process, but helps them deliver a consistent and relevant brand experience across the entire consumer relationship.

Read the full article.

The 7 Features You Must Include in Your B2B Sales Playbook

An effective B2B Sales Playbook can energize your sales team and make them more productive in closing new sales. With a playbook they will have fewer unproductive calls and reduced time spent in pre-call planning efforts. The sales playbook is an important tool that Marketing often uses to provide invaluable marketing information and sales tips.

Sales playbooks exist in many styles and forms, selected are key features that are common to those that are the most successful.

Read the full article.

Improving Health Care Member Engagement on the Web with Marketing Analytics.

Many of the nation’s top health insurers and health care organizations are looking to engage members and customers in a more meaningful way using available technologies such as interactive websites and mobile applications. The challenges we find when working with these organizations are that many are not tracking the right engagement information or, even worse, don’t have access to the information in the first place. Most organizations that have robust website will use some sort of web analytics as a component of their interactive offerings, but how are they using this analytic information to improve member engagement and reduce expense?

Read the full article.

Marketing Data Security: 3 Tips to Maintain Email Security

Email has become the modern day communication business tool. We use it for everything from selecting a lunch spot to passing contract signatures. Did you know that sending email across the internet is not secure? Your email message can be, and often is, read by other people. What do you think might happen if you attached a report containing customer data to an email and sent it? You have possibly published that information to the world! There are several things you should do to protect your email…

Read the full article.

Marketing Data Security: Accessing Corporate Resources From Offsite Securely

Suppose a hacker really wanted your corporate data; how would they go about trying to access it? Would they try to hack into your company? Probably not. Your company has an IT group dedicated to keeping data secure. Instead, the hacker will get a company listing of employees and attempt to hack the employee home computers. It is less likely that a home computer or home network is secure. The following are some things you can do to stay safe while accessing corporate resources from offsite…

Read the full article.

Marketing Data Security: FTP and Data Shipping Security

Marketing data, including customer and sales information, is some of the most valuable information within an organization. It is paramount that this information remain secured from tampering and theft. Companies that have experienced data loss have experienced large fines and loss of reputation, and some have gone out of business.  In this series of short [...]

Read the full article.

Marketing Data Security: 5 Tips To Secure Your Laptop

Marketing data, including customer and sales information, is some of the most valuable information within an organization. It is paramount this information remain secured from tampering and theft. Companies who have experienced data loss have experienced large fines, loss of reputation, and some have gone out of business. In this series of short articles, we’ll provide tips for securing your data on various devices and at data connection touch points. In this article we’ve provided tips to secure the marketing data on your laptop.

Read the full article.

Marketing Data Security: Securing Your Cell Phone or Mobile Device

Today’s business cell phones are more than just a phone, they are smart phones. Whether you use an iPhone, Droid, Blackberry, or other smart phone for business, you probably have corporate email, contacts, and other data on the phone. Essentially, cell phones are becoming smaller versions of our laptops and have unique security concerns. The following are some things to keep cell phones secure…

Read the full article.