Never Do These 7 Things That Annoy Your Webinar Attendees
So you’ve spent all this time coming up with the perfect topic or theme for your webinar, promoted the heck out of it and gotten a nice big chunk of registrations. Once your attendees sign in on the day of your webinar, they are prepared to spend the next 30-60 minutes with you, hoping you can provide them with valuable information in an interesting way.
There are a few things, however, that annoy your webinar attendees. Some are tolerable – things they’ll put up with for the sake of learning something new – others will send them right to the exit button.
For your next webinar, make sure you bear these things in mind to minimize the number of attendees leaving mid-session.
A whopping 92% of webinar audiences anticipate and welcome a Q&A session (Source: Citrix). Some of your audience members have unique issues that they believe your expert can solve. Others will want to clarify statements or get sources for things mentioned during the session. So it’s important that you include time for this in your webinar.
If you’re conducting online training sessions or a tutorial of some sort, it’s even more important to include time for questions during frequent intervals to make sure audience members are on track.
Action Item: At the start of the webinar, ask audience members to submit questions in a moderated chat and indicate at what intervals questions will be answered. Also share an email address or social media location where questions can be answered outside of the chat (if you’ve run out of time).
Are you not entertained?! No, not if your presenter speaks in a constant monotone, repeatedly uses cliché phrases and outdated examples, or spends the whole session reading from slides.
People come to a webinar to hear about an exciting topic from someone who is passionate about the subject matter. They must have new material or bring a different, most interesting viewpoint to an existing debate.
Action Item: Vet your speakers before asking them to appear on your webinar. Check out their other appearances, have conversations with them and do a run-through before the live presentation.
Some people have long, impressive resumes, we get it. Knowledge of your guest expert’s accomplishments and experience in the field is probably what brought us here in the first place. Those who hadn’t heard of them before probably read about them on your webinar promotion page.
So is it necessary to read out your entire LinkedIn page before getting to the reason we’re all here? We only have a limited time to cover the material and I’m sure attendees will have questions, so let’s get to it.
Action Item: Limit guest introductions to their names, current position and one-liners about the top three achievements related to the topic at hand. Refer attendees to their website or LinkedIn page if they want further information.
This is the one topic that has been stressed to death, yet it’s amazing how many people still copy and paste their whole presentation on slides. PowerPoints are called visual aids for a reason – they are supposed to be visually-oriented and aid in your presentation, not do all the work for you.
Action Item: Make a slideshow that complements your presentation using visual elements you can’t communicate orally, such as diagrams, pictures and videos. Simplify words into lists with minimal wording – they should be just enough to jog the audience’s memory of your presentation, not repeat it. Use the presentation below to help (you can also view it here).
If your audience signs up to your webinar based on your super-exciting topic, only to find out 15 minutes in that you are not actually covering the topic discussed, don’t be surprised to see your attendee drop like it’s hot.
Action Item: This one is simple. Stick to the advertised topic and make sure you can deliver as promised.
There is a time for making ‘notes to self’ on your Dictaphone (shout out to the Louis Litt fans). A webinar broadcasted live to (typically) over 100 people is not one of those times. If you’d rather just speak for an hour, instead of interacting with the audience, it’s best to make a YouTube video instead of a webinar.
Action Item: Engage in a two way discussion with your audience and use the tools available to you. Let them give feedback or share sentiments through polls. Break up speaking with videos and other interesting content. Allow them an open chat to discuss the topic during the presentation. If you don’t, they’ll usually head over to Twitter and do it anyway.
Webinars are usually held during the work day, which most likely means we have to get back to other things when this is over. Hence, you can understand our frustration when you delay the start of a webinar until ‘sufficient’ attendees are present or end up going over the end time you specified due to a long presentation. Five minutes to the expected end time, we’re probably already prepping for the next thing on our to-do list, so we’ll probably miss the rest anyway.
Action Item: Start on time – train your webinar audience to log in early for future sessions. Do a test run of with your speaker to ensure their presentation is kept under time, including any anticipated pauses or poll time. Add a little buffer (2-3 minutes) just in case there is a technical issue.
So, to summarize, keep your audience engaged and entertained, stick to the topic at hand, and make sure you answer their questions. Opt for a good webinar service with recording and embedded social media sharing abilities, as it will make your life easier post webinar. Do these things and they’ll be happy to return and bring friends. Ignore these things, and be prepared to have a snoozefest on your hands.
Teacher and students sleeping – depositphotos.com
Louis Litt and dictaphone – usanetwork.com
Reason To Choose Comodo SSL Certificate To Secure Your Website
It should be clear by now that for your website to survive in this modern era, hacker ridden internet era, it is important for all the information that go on it or through it to be encrypted. To have a website without SSL protection is…
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
Your Business Needs These 13 Digital Security Solutions – Here’s How To Get The Most Out Of Each
How would you characterize your organization’s digital security posture? If you’re not sure how to answer this question, or perhaps would prefer not to answer it at all, you’re not alone. Countless decision-makers, from uber-competent CTOs and CISOs to CEOs and COOs who couldn’t code…
Louisiana And Oklahoma Introduce Digital Identification To Prevent Fake ID Use
Digital ID in Louisiana Utilizing digital IDs has been a commonly broached topic for a while now. Although most states are only either deliberating their helpfulness or in the utmost initial stages, Louisiana has moved forward. The primary introduction of this technology was done back…
ScanGuard Review – Here is What You Should Know
Doesn’t it sound good and satisfying to have a goop-performing antivirus that is reliable enough? Yes, it is. For that reason, you need to be extra careful when you are in search of a good antivirus. Put all the necessary factors into consideration so that…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
Why Restaurants Have To Set Up Online Ordering
Online ordering platforms have become so popular in the past couple of years. There was a time when users had to call a restaurant and wait until their delivery process was completed. But that’s just past! At this point, there are a lot of people…
Why Your Business Should Use Newsletters
Newsletters are very effective in maintaining a strong bond between a business and its clients. A closer look at big multinationals reveals that they use a lot of time and resources to make perfect newsletters for brand management. Therefore, you should also not let the…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…
Businesses Need To Be Proactive When It Comes To Cyber Security
For business of any size, making sure they are not only compliant with security regulations but continually improving and adjusting the measures they have in place is vital. Quite often the factor which determines how a business approaches cyber security is the mindset of the…
How To Become A Cyber Security Analyst
What is Cyber Security? Cyber security is the practice of protecting a system or network from digital attacks. These attacks are generally aimed to retrieve or destroy sensitive information and it is a serious threat to all the organizations. Who is A Cyber Security Analyst…