Learning on how to build a successful and highly profitable store is usually the first thing on my mind when talking about e-commerce and the recently held #ecomsummit increases the chances of having one.
We learned valuable niche and attributes on where we should be investing money to get significant website traffic. Spotting suppliers, improving logistics, assessing techniques, relying on search engine results, using appropriate social media tools and enhancing brands are the few things to consider.
It is about asking oneself the importance of e-commerce to a business. #ecomsummit has unfolded answers, maybe not all but mostly. It is not only getting the best practices because not all of us can afford it but if we focus on what we do best, we can still achieve the benefits of selling online.
I also had fun celebrating my birthday at the conference. I practiced note-taking to help me gather and shape sensible ideas during the summit. Below are my notes from the event, hope you’ll find these relevant too.
1. The average Filipino internet user spends around 5.27 hours a day which means a great opportunity for sellers, online influencers and advertisers online. I’ve seen amazing wealth of data and infographics presented by Dr. Nick Fontanilla (I-Metrics Asia-Pacific) and Jay Bautista (Strategic Consumer and Media Incites, Inc.).
2. Consumers prefer e-commerce because mobile phones have become part of the media landscape. 85% of the age group of 10-19 years old, young people rely on social media for their online consumption.
Mobile devices have become a staple in everyday living around the world. It is important that websites must be optimized for mobile devices. Mobile optimization can increase sales, generate more traffic, and boost customer engagement.
3. Create and update your LinkedIn. LinkedIn has become an essential personal branding tool and is widely known as the key networking tool for professionals in any field morphed from an online resume and networking site to a comprehensive personal branding resource.
4. The challenge is to be able to come up with a great design that complements each aspect to help achieve your end goals.
a. Look and feel
b. Relevant content
c. Functionality & Usability
d. Call to action
5. Mannix Pabalan (Hashtag Digital) discussed about earned, owned and paid media. It gives opportunities to influence customers. It poses questions about how best to measure the returns from social media and set the investment at the right level. “It’s not about digital marketing, it’s about marketing in the digital age.”
a. Google defines how to find answers to questions
b. Facebook defines what you discover in social media
c. The size of your iPhone screens defines how you view your contact
d. Amazon defines what you buy
6. Marketing methods include:
a. Letting your customers be your brand advocates
b. Avoid over-selling
c. Use visual content
d. Measure and analyse
e. Sweeten the deal
f. SEO and content marketing work together
7. B2B & B2C defined.
a. B2B is a shorthand for business to business. The products and services of the business are marketed to other businesses.
b. The final customer is the consumer with a B2C business. Housecleaning services, restaurants and retail stores are examples of B2C companies. Websites that offer consumer products are B2C. Online must compliment the offline. Let’s work together to make customers happy.
8. NTC seals and trust badges can help increase your conversion rate. You should know which badges work and don’t work.
9. Isaac Sabas (Pandora Security Labs) and Louie Delostrico (Global Sign Technology) discussed issues of technology threats, the concept privacy, complexities of processing personal and private information and the security analyses and risk management issues to protect our site from these threats.
a. Key points why online attackers attempt to assault you:
ii. System resource
b. Penetration testing includes
i. Website’s URL lets you know your connection is encrypted
ii. Business continuity strategies are about responding to the attack, predicts resources and storing backups off-site
iii. There is no such thing as completely secured website.
iv. An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
v. Practical threat management, security monitoring and incident response
Special thanks to Ms. Janette Toral and digitalfilipino.com for letting us learn, empower and improve our own skills and knowledge from the industry’s best resource persons. It is also best to engage with their work, ask questions and perhaps meet them after the panel. I am entirely grateful to my friend, Mary Jane Gonzales, for inviting me to accompany her in this educational event. Group photo credits to the owner.
Enjoys capturing, editing, and sharing content across social media platforms alongside music photography. The birth of this blog is a testament of my credence on the power of images in conveying stories.