Never Do These 7 Things That Annoy Your Webinar Attendees
So you’ve spent all this time coming up with the perfect topic or theme for your webinar, promoted the heck out of it and gotten a nice big chunk of registrations. Once your attendees sign in on the day of your webinar, they are prepared to spend the next 30-60 minutes with you, hoping you can provide them with valuable information in an interesting way.
There are a few things, however, that annoy your webinar attendees. Some are tolerable – things they’ll put up with for the sake of learning something new – others will send them right to the exit button.
For your next webinar, make sure you bear these things in mind to minimize the number of attendees leaving mid-session.
A whopping 92% of webinar audiences anticipate and welcome a Q&A session (Source: Citrix). Some of your audience members have unique issues that they believe your expert can solve. Others will want to clarify statements or get sources for things mentioned during the session. So it’s important that you include time for this in your webinar.
If you’re conducting online training sessions or a tutorial of some sort, it’s even more important to include time for questions during frequent intervals to make sure audience members are on track.
Action Item: At the start of the webinar, ask audience members to submit questions in a moderated chat and indicate at what intervals questions will be answered. Also share an email address or social media location where questions can be answered outside of the chat (if you’ve run out of time).
Are you not entertained?! No, not if your presenter speaks in a constant monotone, repeatedly uses cliché phrases and outdated examples, or spends the whole session reading from slides.
People come to a webinar to hear about an exciting topic from someone who is passionate about the subject matter. They must have new material or bring a different, most interesting viewpoint to an existing debate.
Action Item: Vet your speakers before asking them to appear on your webinar. Check out their other appearances, have conversations with them and do a run-through before the live presentation.
Some people have long, impressive resumes, we get it. Knowledge of your guest expert’s accomplishments and experience in the field is probably what brought us here in the first place. Those who hadn’t heard of them before probably read about them on your webinar promotion page.
So is it necessary to read out your entire LinkedIn page before getting to the reason we’re all here? We only have a limited time to cover the material and I’m sure attendees will have questions, so let’s get to it.
Action Item: Limit guest introductions to their names, current position and one-liners about the top three achievements related to the topic at hand. Refer attendees to their website or LinkedIn page if they want further information.
This is the one topic that has been stressed to death, yet it’s amazing how many people still copy and paste their whole presentation on slides. PowerPoints are called visual aids for a reason – they are supposed to be visually-oriented and aid in your presentation, not do all the work for you.
Action Item: Make a slideshow that complements your presentation using visual elements you can’t communicate orally, such as diagrams, pictures and videos. Simplify words into lists with minimal wording – they should be just enough to jog the audience’s memory of your presentation, not repeat it. Use the presentation below to help (you can also view it here).
If your audience signs up to your webinar based on your super-exciting topic, only to find out 15 minutes in that you are not actually covering the topic discussed, don’t be surprised to see your attendee drop like it’s hot.
Action Item: This one is simple. Stick to the advertised topic and make sure you can deliver as promised.
There is a time for making ‘notes to self’ on your Dictaphone (shout out to the Louis Litt fans). A webinar broadcasted live to (typically) over 100 people is not one of those times. If you’d rather just speak for an hour, instead of interacting with the audience, it’s best to make a YouTube video instead of a webinar.
Action Item: Engage in a two way discussion with your audience and use the tools available to you. Let them give feedback or share sentiments through polls. Break up speaking with videos and other interesting content. Allow them an open chat to discuss the topic during the presentation. If you don’t, they’ll usually head over to Twitter and do it anyway.
Webinars are usually held during the work day, which most likely means we have to get back to other things when this is over. Hence, you can understand our frustration when you delay the start of a webinar until ‘sufficient’ attendees are present or end up going over the end time you specified due to a long presentation. Five minutes to the expected end time, we’re probably already prepping for the next thing on our to-do list, so we’ll probably miss the rest anyway.
Action Item: Start on time – train your webinar audience to log in early for future sessions. Do a test run of with your speaker to ensure their presentation is kept under time, including any anticipated pauses or poll time. Add a little buffer (2-3 minutes) just in case there is a technical issue.
So, to summarize, keep your audience engaged and entertained, stick to the topic at hand, and make sure you answer their questions. Opt for a good webinar service with recording and embedded social media sharing abilities, as it will make your life easier post webinar. Do these things and they’ll be happy to return and bring friends. Ignore these things, and be prepared to have a snoozefest on your hands.
Teacher and students sleeping – depositphotos.com
Louis Litt and dictaphone – usanetwork.com
How To Keep Your Personal Information Anonymous And Secure While Using A Web Browser
Browsing the web or checking Facebook a few times a day has recently become something natural as breathing and eating. People wake up, immediately reaching for their phones to be up to date. Is it already an addiction to the Internet? Of course, it depends…
How To Stay More Secure When Using Kubernetes
Kubernetes is an open-source system for automating deployment of new apps and software, and is becoming increasingly popular due to its utility in going back to previous versions. But while lots of developers are excited to take advantage of the benefits and convenience offered by…
If Online Privacy Is Dead, Is There Anything We Can Do?
The online world is both wonderful and frightening in equal measure. On the one hand, we have access to unlimited information and resources, but on the other, we have zero privacy. For most adults, the internet is a part of every aspect of their daily…
Reason To Choose Comodo SSL Certificate To Secure Your Website
It should be clear by now that for your website to survive in this modern era, hacker ridden internet era, it is important for all the information that go on it or through it to be encrypted. To have a website without SSL protection is…
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Appliance
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Self Improvement
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
Key Ways IT Services Can Help Your Business Thrive
IT services can be vital in setting up your business for success. They provide valuable solutions that improve your relationship with customers promoting the level of customer satisfaction. With increased automation, most of the fundamental business processes have been simplified by these IT services. An…
Guide For Sourcing Office Furniture
It can be exciting to start your own office and rent furniture for the same. You can choose these tips for renting office furniture that will not burn your pockets. As you can rent cross trainer or rent gym equipment, appliances, home furniture, so can…
Online Security Tips You Might Not Know About
Technology is now playing a major role in our daily lives. From how we work to how we spend our leisure time; it is central to us all now. Of course, a tech advance that has transformed our lives the most is the internet. While…
Here’s How Proxies Can Aid Email Protection
Are you concerned about your email protection measures? If that is the case, then this is for you. It all began in November 2014 with leaked emails from Sony Movie Pictures. After this leakage of emails went viral all over the world, people, organizations and…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…