sb-au logo
Story image

How to independently track the performance of your campaign

24 Feb 2020

Modern marketing is about measurement.

Ultimately driving traffic to your new products, announcements, promotions, registration forms, online stores or other pages is the name of the game. That way you can acquire or activate the client in your systems and the full marketing loop is achieved.

At Techday we have a number of different product offerings that drive traffic.

While we can provide our internal tracking for these clicks, best practice is that you have another independent source of tracking these clicks also. We do see little variance between the two systems, but its a good safety net.

We recommend a service called Bit.ly and the good news is that it is free!

Bit.ly links work by redirecting the visitor to another page. So the reader clicks on a link on the Techday website in either a story or on a sponsored link, it takes them to the Bit.ly website and they are then redirected to your final landing page. All of this is done in microseconds so the reader never even knows that they hopped to bit.ly and onwards.

It also tracks the date and the location of each click, which are conveniently graphed.

Example:

Recently Bit.ly have changed how their reporting works.

The crucial element is that you need to have registered for a free account with them, before making the bit.ly link. As the reporting is only available to a registered user that actually created the Bit.ly link. Techday can't do it on your behalf. It's also impossible to connect old Bit.ly links to an account, they must be created inside a current account.

It's free, really simple to do, registration takes a few seconds here. Then creating each link only takes seconds also.

Then when you are providing your material to Techday, you provide the Bit.ly link instead of the original link for us to market. Alternatively, we can provide links to the content as it appears on the Techday network, which you can then use to create your own Bit.ly links.

If you have any additional questions, we would be happy to assist, contact your digital account manager or contact us here.

Story image
APAC parents hide internet activity from children more than cyber attackers
A new report from Kaspersky has turned a modern trope - that teens have things to hide in their internet history - on its head, by proving the opposite is also true.More
Story image
Prevasio unveils threat analysis sandbox for containers
New SaaS solution aims to prevent breaches by automating dynamic threat analysis for docker containers.More
Story image
Okta, CrowdStrike, Netskope and Proofpoint create shared zero trust security strategy
Okta, CrowdStrike, Netskope and Proofpoint have joined forces to develop and launch an integrated, zero trust security strategy, stating that this is crucial for today’s digital and remote working environments.More
Story image
Top 10 riskiest IoT devices for enterprises, according to Forescout
IoT devices can become attack vectors for hackers to gain access to enterprise networks, and recent Forescout research shows businesses need to be aware of this and put adequate security measures in place.More
Story image
Investment in Digital Trust crucial for Australian economy, study finds
Digital Trust is playing an increasingly important role in the Australian economy, both in terms of enabling more investment and jobs, and reducing the risk of disruption to businesses around the country. More
Story image
Attack volumes, breach levels and security investment all rise in Australia
94% of 250 high-level executives around Australia surveyed in a report released today from VMware have noticed a surge in attack volume, which has, in turn, prompted increased investment in cyber-defence.More