Why You Need A Website

As a website designer, I am frequently asking people to ask themselves this question – Why do I need a website? The answer obviously varies depending on the person, their business, what type of service or product they are selling, or how they want to be perceived online. Answer these simple questions yourself to see whether you need a new website.

Are you experiencing disappointing sales? Your website might be to blame.

Are your sales up? If you’re looking to continue to grow in 2016, your website could be a great place to start.

Why You Need A Website and Why Your Website Matters

Eighty percent of shoppers start their research online.

This is good news for companies with great websites. Four out of five new customers or clients will head to your website or search for you online. The bad news is that it means that you only have about three seconds to capture their attention.

In the end, all roads lead to your website.

But how can you tell if your current website is good or bad for your business? How do you know if you really need a new website?

Answer the following questions to find out.

Do you have goals for your existing website? Are you exceeding those goals?

The best way to tell whether or not you need to update your website is by looking at your current site’s performance.

If you don’t have any goals, start by deciding if your website is more like a brochure—i.e. a virtual business card for your company—or a sales tool.

For brochure sites, consider using these two goals:

  • Overall traffic
  • Time on site

If your website is a sales tool, consider including these goals:

  • Contact form submissions
  • Leads generated from the internet

Once your goals are set, it’s time to ask the big question:

Is your website reaching the goals you have set?

If the answer is no, or if you’re having trouble deciding your goals in the first place, then it’s probably time for a sit-down with your marketing team or a web professional.

How does your website compare to your competitors’ websites?

Google “[your key product or service] [primary geographic area].” For example,”catering Washington, dc”

catering-dc

Look at the top 10 results. Those companies are your online competition.

Compare your website to theirs. Does it look similar? Does it have the same number of pages? Which site is more modern? Which is the most out of date?

Remember that 80% of people begin researching purchases online. Right now, you’re seeing exactly what those 80% of shoppers see. So think like a new customer. Based on the websites, which company would you choose?

If your competitors’ websites are clear winners over yours and you are unbiased enough to see that, then chances are you are losing out on sales.

How much traffic is coming to your website?

Analyzing website traffic is one of the easiest ways to judge the effectiveness of your website. When considering a new website, take a look at your Google Analytics data as far back as you can. Now answer these simple questions:

  1. What is your total traffic?
  2. Is it trending upward?

Total traffic: Decreasing traffic means that your website is old—and it’s just getting older. This is a clear signal that back when your website was made, it was modern enough to help you generate traffic, but as these factors have changed over the years, your website has not kept pace. Now, traffic is going elsewhere, likely to your competition.

Does your website look good on a smartphone?

Mobile access is booming. You need to make sure your website works on a smartphone.

Without a mobile-optimized website, you could be losing 1 out of every 3 visitors.

Take out your phone and look at your website. Is everything in the right place? Can you read the font? Does everything fit onto the screen? Or did your regular website pop up with fonts and sizes too small to read?

Compare your mobile website to a mobile website like Apple’s to get feel for how a properly optimized website appears.

Do you notice a big difference?

Why You Need a Website – Conclusion

The online world mirrors real life – there are winners and there are losers. Someone has to show up first on Google and someone has to show up last. A new website is an inexpensive way to establish and boost your credibility. If your website is more than 5 years old, it probably needs an update! At Connect4 Consulting, we are happy to provide a free web presence analysis. Just contact us today by emailing gabe@connect4consulting.com or calling 202-236-2968.

Ten Tips For Spotting Phishing Emails

Every day millions of phishing emails are sent to unsuspecting victims all over the world. I know because I receive five or six myself in my spam folder every day. While some of these messages are so outlandish it’s obvious they are fraud, others can be a bit more convincing. So how do you tell the difference between legitimate emails and phishing emails? Unfortunately there is no single way, but this post provides ten tips for spotting a phishing emails.

Ten Tips For Spotting Phishing Emails

#1 URLs contain a misleading domain name

People who launch phishing scams often rely on victims who don’t know much about technology or how the DNS naming structure for domains works. The last part of a domain name is the most telling. For example, the domain name info.gabeseiden.com would be a child domain of gabeseiden.com because gabeseiden.com appears at the end of the full domain name (on the right-hand side). Conversely, gabeseiden.com.maliciousdomain.com would clearly not have originated from gabeseiden.com because the reference to gabeseiden.com is on the left side of the domain name.

This happens all the time, especially when the phishing criminal uses a trusting name like Microsoft or Apple or even the IRS. The resulting domain name looks something like this: Microsoft.maliciousdomainname.com.

#2 The message is poorly written with grammar and spelling mistakes

Whenever a company sends out a message on behalf of the company as a whole, the message is usually reviewed for spelling, grammar, and legality. So if a message is filled with poor grammar or spelling mistakes, it probably didn’t come from a major corporation’s legal department.

#3 The message asks for personal information

This is usually a major red flag. No matter how official an email message looks, it’s always a bad sign if the email asks for personal information. Your bank or credit card company already know your account number and social security number.

#4 The message contains a mismatched url

One of the first things you should check in a suspicious email message are any embedded URLs. Often the URL in a phishing message will appear to be perfectly valid but if you hover your mouse over the top of the URL, you see the actual hyperlinked address (at least in Outlook) and if the hyperlinked address is different from the address that is displayed, the message is probably fraudulent or malicious.

#5 The message looks too good to be true

If you receive a message from someone unknown to you who is making big promises, the message is probably a scam.

#6 You’re asked to send money to cover expenses

You might not get hit up for cash in the initial message. But sooner or later, phishing criminals will ask for money to cover expenses, taxes, fees, or something similar. If that happens, you can bet that it’s a scam.

#7 You didn’t initiate the action

If you get an email congratulating you on winning the lottery, but you never bought a ticket, you can bet that it’s a scam. If you didn’t do something to initiate the action, it is probably a scam.

#8 The message makes unrealistic threats

Most phishing scams try to trick people into giving up cash or sensitive information by promising instant money. However, some phishing scams use intimidation to scare victims into giving up information. If a message makes unrealistic threats, it’s probably a scam. Let me give you an example.

I once received an email from what looked like the IRS. Everything looked legitimate except for one thing. The letter said my account had been compromised and that if I did not submit a form (which asked for my social security number) along with two picture IDs, my assets would be seized.

I knew this was a scam because the IRS doesn’t send out emails like this. The IRS sends out its threats via snail mail.

#9 The message appears to be from a government agency

Government agencies in the U.S. don’t normally use email as an initial point of contact.

#10 Something is fishy

If you receive a message that seems suspicious, it’s usually in your best interest to avoid acting on the message. On the off chance that it’s a real message, usually the real person will find another way to contact you.

How to stay ahead of cyber criminals

It’s no secret that cyber attacks are becoming more increasingly sophisticated, stealthy, and, as a result, commonplace. We have seen high profile security breaches at Target, JP Morgan, Home Depot, and the US Government. Attackers can infiltrate practically any “secure” environment and maneuver undetected for months at a time while they scope out the best practice (for them) for a cyber attack. So the question for us is – how do we stay ahead of cyber criminals?

This is ultimately a cat and mouse game and it’s clear that the cyber criminals play the cat in this game. As cyber attackers become increasingly aware of cyber security measures, both large and small organizations must be on the defense and continuously learn about potential warning signs. Here are a few helpful tips to help you stay ahead of cyber attacks and reduce the risk of data breaches.

Constant Change

There’s one thing that cyber criminals and the rest of us have in common – none of us like change. We want to keep systems and processes static because it makes life and work easier. Attackers love static systems and processes because it makes it easier for them to study their subjects, learn the ins and outs, and figure out exactly how they can compromise your data. If you want to make it difficult for sophisticated cyber attackers, create a culture that thrives on change.

Monitor for Usage of Irrelevant Information

Cyber criminals do their homework before launching an attack. Sometimes their data is misinformed or incomplete. You should monitor for activity that doesn’t make sense for your organization.

A typical example of an irrelevant information scenario is the “former employee” situation. In this case, an attacker targets a specific user from your list of employees, not knowing that the person no longer works for your organization. Because the employee no longer works for you, that employee should not be taking actions within the company’s network and the network shouldn’t be contacting them. Spotting this suspicious activity can help you prevent data breaches.

Avoid Alarm Fatigue

Security appliances are more sensitive than ever to better detect potential threats, but the sharp increase in alerts leaves security teams running ragged.

It is impossible to launch a full-scale investigation every time your security appliances send a notification. Instead, you must monitor your organization for signs of alarm fatigue and resolve them as soon as possible. If you stop monitoring for serious notifications, you are sure to miss the real issues as they come up.

Invest in Cyber Security Education

Did you know that human error is the leading cause of data loss? Cyber security training and education teaches employees the importance of changing passwords and monitoring for suspicious activity to cut down on the amount of human errors.

One major part of training employees for better cyber security is preparing them for phishing schemes. In Phishing attacks, cyber criminals often send out seemingly legitimate emails, mimicking companies like PayPal or eBay in an attempt to lure readers to click on a fake link. While the link seems real and the landing page is set up with real logos, the site is built to filter sensitive data to cyber criminals. The email might mention an issue with the user’s account and lead them to a site that requests PIN numbers, credit card data and more. These can be tough to spot, but there are warnings to look out for.

All of the security solutions in the world can’t protect your network if your workforce is willingly (but unknowingly) giving cyber criminals access to it. Creating a truly secure workforce requires ongoing education and training.

 

Apple vs. The FBI – What’s At Stake?

Apple and the FBI spent more than five hours on Monday testifying before Congress over the ongoing San Bernadino terrorist iPhone saga. While there weren’t any conclusions, it was a chance for both sides to lay out their case.

To recap, the FBI wants Apple to help it unlock an encrypted iPhone tied to the San Bernardino case by building a customized version of iOS. Apple, on the other hand, argues that doing so would compromise security of every iPhone moving forward.

The problem is that allowing the government to unlock a single device has huge implications for the future of privacy. This case is not about the San Bernadino terrorists. I don’t even think the FBI thinks it will gain any new information pertinent to their case. This is all about establishing precedent for future cases.

The Department of Justice is not asking Apple to turn off the phone’s security or bypass the pin. It wants Apple to make it easier for the FBI to get into the device by guessing the passcode, without destroying the encrypted data on the phone. Specifically, the order signed by US magistrate judge Sheri Pym says Apple “shall assist in enabling the search” of the suspect’s iPhone by creating a special firmware that would only work on that particular device.

The firmware that the judge wants Apple to create would disable the security feature that erases the phone’s contents after 10 unsuccessful login attempts. It would also disable the time limits that grow longer after each failed attempt and allow authorities to connect the phone to a computer to “brute force” the passcode so that officials don’t have to tap it into the phone by hand.

Apple isn’t arguing about technical feasibility; it’s concerned with legal precedent. “The implications of the government’s demands are chilling,” Cook says in his letter. “If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data.” The company is afraid that once a backdoor is created, other agencies and governments will come demanding access in the name of global security.

Given what we now know about the government’s technological abilities, I find it hard to believe that the NSA or CIA doesn’t already have the capability to unlock the phone.

A hearing on Apple’s appeal is scheduled for March 22nd. It’s almost certain that the the decision will be appealed by the losing side. The case could go then to a district court judge, and if challenged there, to the U.S. Court of Appeals for the Ninth Circuit. Ultimately, as many legal experts have predicted, the case could end up in the Supreme Court.

Add up to 128GB of Storage to your iOS Device

Now you can expand the capacity of your iOS gadgets and easily transport data between your devices with the iKlips Flash Drive. This compact solid state flash drive adds between 32GB and 128GB of extra memory to your gadgets when you plug it into your Lightning port.

The pocket-sized iKlips iOS Flash Drive is now on offer from $65 via TNW Deals.

The iKlips iOS drive has a USB 3.0 connector at one end, and a Lightning connector at the other. To make files available on your iOS device, simply plug the drive into your PC or Mac, and start transferring. The iKlips offers exFAT formatting, meaning it can handle individual files over 4GB.

SEO Myths That Don’t Work in 2016

SEO – search engine optimization – has changed so much in the past couple of years that many marketers don’t know what’s outdated, what’s still important, what will actually have a positive impact, and what’s just wasted energy.

This post will point out common myths and assumptions about how SEO – search engine optimization – works in 2016, so you can use your energy and time wisely and productively.

Myth #1 – I must submit my website to Google.

The idea that you have to submit your website to Google directly is nonsense. While a brand new site can submit its URL to Google directly, a search engine like Google will still find your site without you submitting it. Whatever you do, don’t pay someone to do this for you.

Myth #2 – More links are better than more content.

In the past, SEO – search engine optimization – worked by building as many links to your site without analyzing the linking domain. It didn’t matter whether the site linked to your site had anything to do with your site content. Links are still a very important part of SEO, but how you build links is more important than the overall number of links. And if there is a choice between creating good content and building links, then you should spend your time and money creating good content. Why? Because people will naturally link to good content. When you invest in content, that content can be used for web pages, blog posts, lead generation offers, and guest posts on other sites – all content types that will bring more links with them over time.

Myth #3 – Having a secure (HTTPS encrypted) site isn’t important for SEO.

Some URLs start with “http://” and others start with “https://”? Maybe you have noticed that extra “s” when you were browsing websites that require giving over sensitive information, like when you were paying bills online. Put simply, the extra “s” means your connection to that website is encrypted so hackers can’t intercept any of your data. The technology that powers that little “s” is called SSL, which stands for Secure Sockets Layer.

In August of 2014, Google announced that it had started using HTTPS as a signal in their ranking algorithms, which means if your website still relies on standard HTTP, your rankings could suffer as a result. For now, however, HTTPS remains a small signal, affecting fewer than 1% of global queries (according to Google). So while it’s clear that Google wants everyone to move over to the more secure HTTPS protocol, don’t worry if you haven’t done it yet. Connect4 Consulting can help you transition to a HTTPS site. Contact us if you want to learn more.

Myth #4 – SEO – Search Engine Optimization – is all about ranking.

While there’s a strong correlation between search results placement and clickthrough rates, ranking is not the supreme end goal that it used to be. There is a big misconception — that higher rankings mean more search traffic. It is true that people will see your listing, but it does not mean you will get more click-throughs. There are a couple of reasons for this:

  1. You do not have the correct keyword strategy because you are trying to rank for keywords that are unrelated to your field.
  2. Your meta descriptions are not appealing and inviting for the user.

To solve these problems, try using Google Adwords to create a great keyword advertising strategy relating to your business, and be sure to use enticing meta descriptions to get people to the site. It is a good rule of thumb to think about what would entice you to click a link.

Myth #5 – Meta descriptions have a huge impact on search rankings.

Meta descriptions are HTML attributes that concisely explain the contents of webpages. Google announced, all the way back in 2009, that meta descriptions (and meta keywords) have no bearing on search rankings. That’s not to say, however, that these descriptions aren’t important for SEO. On the contrary: Meta descriptions present a major opportunity to separate yourself from the riff-raff and convince searchers that your page is worth navigating to. So – meta descriptions are critical for clickthrough rates but they don’t impact search ranking.

Myth #6 – Keyword optimization is THE FOUNDATION of Search Engine Optimization.

It used to be important that you write your content with the keyword incorporated exact match, but Google now uses something called latent semantic indexing (LSI), which was conceived in 2004. With this type of indexing, webpage contents are crawled by the search engine and the most common words or phrases are combined and identified as the keywords of that page. Latent Semantic Indexing also looks for synonyms that related to your target keywords.

Today, it’s important to optimize your page entirely for user experience; this means that you do not have to place your keywords word-for-word in the content. Write the content for the user. By using synonyms and related terms, the search engines will still understand what your goal is. It’s important to realize that Google has moved beyond keywords. Google is trying to understand the intent behind the keywords so it can match intent with relevant, authoritative content.

Myth #7 – Keywords need to be an exact match.

Keywords do not need to be repeated verbatim throughout a piece of content. In a headline, in particular, you only want to use a keyword (or keywords) in a way that makes the most sense to your audience. The goal should be to write a great headline (somewhere between 4-9 words) that clearly explains what a piece of content is about.

Myth #8 – The H1 is the most important element on the page.

It really doesn’t matter what header tag you use, as long as you present your most important concepts upfront and closer to the top of the page. Remember, you’re optimizing your page for users first and foremost, which means that you want to tell them ASAP what your page is about through a clear headline.

Myth #9 – My homepage needs a lot of content.

Think of your home page as the gateway to your business. It’s your chance to make a first impression on visitors and tell them what you are all about. Your home page content should be long enough to clarify who you are and what you do, where you’re located, what your value proposition is, and what visitors should do next.

Myth #10 – I need many pages of content.

Some people think that the more pages a site has, the more visitors they will get. Just like link building, creating content for content’s sake won’t get you anywhere. Make sure you focus on content quality and not quantity.

Myth #11 – Good user experience is not a requirement.

If Google sends you to a web page, they want to make sure you have a good experience on that page. They are after all a business too, and thus they want to delight their users. Think about it from the search engine’s point of view: they didn’t create the webpage themselves, but they are endorsing it. They need to ensure that users have a good experience on that page to keep people coming back to Google.

To improve user experience, you will want to focus on:

  • page load time
  • bounce rate
  • time on page
  • page views per visit
  • how far a person scrolls down a page

Myth #12 – Local Search Engine Optimization doesn’t matter anymore.

If you’re a local business, optimizing for local search won’t only help you get found, but it will help you get found by people who are nearby and more likely to buy from you. The bottom line is that local SEO matters more now than it ever has before.

Myth #13 – Google will never know if I have bad sites linking to me.

Google knows everything. Don’t try to fool them or you will be penalized.

Myth #14 – Images don’t require optimization.

For many years, it was okay to neglect the images on your site and still rank without using alt text and image file names to boost your page relevance. However, on-page SEO is more important than ever, so excluding images will prevent your website’s SEO from being the best it can be.

Search engines cannot see images on websites, so it is important to give the image an alt text and relevant file name to ensure Google knows what the image is about. If you don’t create this text, you lose a huge opportunity to be as visible as possible online.

It also helps Google if the text on the page where the image is located mentions the image, too, so always try to reference your images in your text, close to where it lives on the page, using keywords similar to the alt text/filename of the image.

Google also recommends providing descriptive titles and captions for your images, so consider adding those when relevant. Name your image files something that is indicative of what the image is itself, rather than something like IMG2394870.jpg. Yes, keywords matter here!

Myth #15 – I don’t need to optimize for a mobile users.

In the spring of 2015, Google had a algorithm update called “Mobilegeddon,” which expanded Google’s use of mobilefriendliness as a ranking signal. The update rewards mobile-friendly websites and penalizes those that aren’t fully optimized for mobile in mobile search results.

If your web presence screams 2009, you should be thinking about a comprehensive strategy to modernize your site and bring it in line with consumer expectations. The optimal experience for your visitors and your own performance is to implement responsive design. Responsive design makes your page adapt to the visitor and will display information that is sized and zoomed appropriately so it’s easy to read on whatever device he or she is using.

Conclusion – Search Engine Optimization is about the overall experience for a searcher.

If you can take one thing away from this blog post, it’s this: More than anything else, Search Engine Optimization is about the overall experience for a searcher, and that experience starts the moment they enter a search query.