Skip navigation

Web

  • A Web Page Call to Action (CTA)

    A Web Page Call to Action (CTA)

    Taking a step back, why do people land on a particular web page? Likely it is because they were searching on Google, and clicked through to a particular page. Or perhaps they clicked a link, be it from an advertisement, a link on Social Media, an email, a QR code, [More]

  • Building Trust with Marketing Automation for Lead Magnets

    Building Trust with Marketing Automation for Lead Magnets

    In case this is completely new to you, "Funnel 101" for lead magnets can be simplified to three steps: A prospect downloads your lead magnet - they're now in your funnel. You send them stuff. Then they buy. Or, if you're in the B2B world, you have an interaction or [More]

  • Killing the Trust Killers

    Killing the Trust Killers

    Unnecessary web and app trackers: Minimize the use of the trackers, and when they are used, only request the absolute minimum of data that you need. Step one is to see what is embedded. Location tracking: Does your corporate app or website REALLY need to know the location of your [More]

  • Six Levels of Website Security

    Six Levels of Website Security

    The six levels of website security: Secure the network: Configuring Cloudflare, which helps prevent denial-of-service attacks, and provides DNS-related protection. A side benefit is that the Cloudflare CDN can also speed up the site dramatically. Secure the server: Hosting the site on a commercial-strength hosting provider, such as WPengine or [More]

  • Building an SEO-focused Website

    Building an SEO-focused Website

    Yes, there are technical things that should be done, and yes, you can hire people to do that work, but this must really happen only after you do the heavy lifting yourself. And for the majority of organizations, it starts with remembering one key truth: Your prospects (and clients) don't [More]

  • When You Get Hacked

    When You Get Hacked

    While every situation is different, these action points will help you both recover… and reduce the risk going forward. Use this list as a checklist for when it happens, or as the basis for a plan you put together in advance.• Immediately change all of your passwords to strong passwords, [More]

  • Fourteen Digital Trust Killers

    Fourteen Digital Trust Killers

    Here are fourteen: Unnecessary web and app trackers: These ostensibly exist to allow better evaluation of marketing effectiveness at the macro level, and user behavior at the micro level. But as privacy — and transparency — are becoming more important with individuals (and regulators), these trackers are quickly being seen [More]

  • Bloated Websites: Transparency vs. Accessibility

    Bloated Websites: Transparency vs. Accessibility

    How often are you frustrated by bloated websites that have so many pages, it is impossible to actually find anything?  Unfortunately, this is all to common of a complaint. Websites are often used as dumping grounds for every bit of information from every new initiative, often spanning backwards into the [More]

  • Websites: strategic assets or the newest commodity?

    Websites: strategic assets or the newest commodity?

    There is an old "joke" in the web development world that is both funny and sad:  What is the difference between a $20,000 website, a $200,000 website, and a $2 million one?  Answer:  The gullibility of the client. In 27 years of building websites, I have NEVER met a gullible [More]

  • Brand Building: Strong On the Inside

    Brand Building: Strong On the Inside

    How much does your organization spend on your brand? Usually, this question yields answers in the following spending categories: research, logo design, collateral production, messaging, and ads. And maybe content,  Social Media, and a few other things. While all of these are important, this list is missing the two fundamental delivery mechanisms [More]

CATEGORIES

Back to top