Blog

Social Media & Government: Increase Citizen Engagement

Engaging citizens on social media these days isn’t a novelty but a civic duty.

Social media has brought a drastic change in the way citizens interact with the government. It has given the public a direct platform to connect with their elected leaders, civic officials & local government bodies.

Although social media & government might not seem like a natural mix, certain government agencies & officials have proved otherwise & built highly engaging user communities on social.

From sharing information about the ongoing COVID-19 crisis to entertaining and educating the public, several government bodies are doing fantastic on social media.

In this post, we’ll walk you through the benefits of social media for government agencies, along with tips & best practices to keep the citizens engaged.

Click here to download detailed infographic on tips to increase citizen engagement.

Benefits Of Social Media In Government

Here are some of the benefits of social media for government bodies.

Information Sharing

The COVID-19 pandemic has made people anxious & glued to their screens looking for information all day. Any wrong message can be potentially dangerous and could worsen things.

It has become essential for government agencies to step up in this crisis and get important information out in a calm & clear manner.

Putting government officials at the forefront can help convey important information in a controlled & reassuring way.

CDC (Centers for Disease Control and Prevention) & NIAID Director Dr. Fauci have been at the forefront of sharing important information regarding the spread of COVID-19.

#COVID19 spreads mostly through close contact between people, but it is possible to be infected by touching surfaces covered w/ germs. Protect yourself & others: wear a mask, wash your hands, & clean high touch surfaces w/ soap & water or detergent. More: https://t.co/XPZRd7Pmizpic.twitter.com/1EhCaYVRAG

— CDC (@CDCgov) April 5, 2021

At a more local level, Orange County, Florida is actively using Twitter to share information about vaccination drives with its citizens.

👋 OCCC Vaccination Appointment Opening 👋

COVID-19 vaccination appointments for the @OCCC will reopen on TODAY, April 6, 2021, at 10:30 a.m. for Florida residents 16 and older.

👉 Visit https://t.co/5hXVu8Gfjz to make an appointment.@CDRMaguire @DohOrange pic.twitter.com/gigHKHqMlr

— Orange County FL (@OrangeCoFL) April 6, 2021

Citizen Engagement

The most important aspect of social media for government bodies is public participation or citizen engagement.

Social media can play an important & decisive role in motivating & empowering citizens. It can help build trust with the public.

Here are some examples of some local governments using social media to increase citizen engagement

The City Of Brighton In The UK

They use Twitter to connect and keep citizens updated on ongoing issues & initiatives along with answering questions on the same.

SPEAK (Suicide, Prevention, Education, Awareness and Knowledge) Week will kick off April 26 — The Brighton Youth Commission will be hosting a series of virtual and socially distanced events April 26-30, ending with a SPEAK Walk on May 1. Learn more here: https://t.co/i5FmwYJhXO pic.twitter.com/BTT7ulV3SA

— City of Brighton (@CityofBrighton) April 2, 2021

The City Of Edmonton In Alberta, Canada

The city of Edmonton collaborated with IBM to find more innovative ways to use social media as part of information sharing & decision making.

This collaboration helped the local government disseminate real-time information on social media channels such as Facebook & Twitter with citizens.

Now that we have gone through some of the benefits of social media for government agencies, here are some tips & best practices for effective use.

Social Media Tips For Govemernt Agencies

Social media for government agencies is miles apart from using social media for a brand or a business. Your goals aren’t oriented towards selling a product or a service.

Instead, here are some standard social media goals for government bodies:

  • Sharing up-to-date information
  • Building trust within the community
  • Responding to queries from citizens

Here are some tips that’ll help you achieve these goals.

Listen To Your Constituents

Before you move ahead and create a content plan, it’s essential to understand your audience, which in this case, are your constituents.

Dig deep and understand what they want and what are their pain points.

Here are some tips for creating a social media monitoring plan for government agencies.

  • Set up a listening session: Use general keywords such as the name of the city/region, etc. & set up a listening session
  • Segment the audience: Define the main citizen/citizen groups you would like to follow (e.g., Elderly, tourists, cyclists, etc.)
  • Understand your reputation: Using a social media listening tool such as DM Channels can help you understand public sentiments

With highly trained AI for human interaction and language, DM Channels instantly marks each listening conversation as positive, negative, or neutral. Using DM Channels’s Keyword reports, you get an aggregated analysis of the sentiment behind these conversations

If you’d like to try out DM Channels for your business, you can sign up right now & start your free trial.

 

Share Latest News & Updates

Once you understand your audience, the first and foremost part of your social media strategy should be serving as a source of community news & updates.

Being a government body, you have access to a massive amount of information & the public perceives you as a credible source.

This means that they are already looking up to you for the latest news & information.

In the wake of the COVID-19 pandemic, social media has been dominated by grim news worldwide, but this doesn’t mean it has to be just news & news.

You can share celebratory posts, success stories, and other local uplifting updates that’ll give your community something to look forward to beyond the news.

Apart from the traditional platforms, government bodies can also use the Nextdoor app, which serves as a platform to encourage citizen participation in town hall meetings, events & other community-building activities.

It allows you to directly reach known residents in your community that want to connect with their neighbors, community members, and local leaders.

Proactively Engage With Your Community

Social media has made communication with government bodies & officials more accessible than ever.

While many government bodes have paused social media engagement due to the pandemic to focus on sharing information, we recommend you don’t.

Connecting with your constituents is especially critical in these times since many traditional methods of communication have been suspended.

Create a daily engagement schedule to reply to mentions, comments & questions posted to you via social.

If you manage a lot of social media accounts and have trouble keeping a tab on engagement for all of them, using a centralized social media engagement tool like DM Channels can help solve these troubles.

DM Channels delivers all your conversations and messages over the entire social portfolio into a single inbox. You can use advanced filters and conversation managing utilities to proactively engage with your constituents.

If you’d like to try out DM Channels for your business, you can sign up right now & start your free trial.

 

Consistent Posting Across Channels

Ensure that you consistently share relevant content with your audience across channels.

Using a social publishing tool like DM Channels, you can create, schedule, and publish content across Twitter, Facebook, Instagram, LinkedIn, and Google My Business at once with a single click.

There is no hard and fast rule when it comes to the type of content you need to share, but here are some general best practices:

Emphasize On Visual Content

Visual content such as images, infographics, videos, and memes are shared the most on social media, which holds for government bodies.

Visual content is also more accessible to those with reading disabilities.

The city of Toronto has been sharing short video content to inform users about different lockdowns.

On April 3 #Toronto joined Ontario in Shutdown under the @ongov #COVID19 response framework. Outdoor dining, outdoor fitness classes+training & personal care services are not permitted. Non-essential retail is permitted with reduced capacity. Info: https://t.co/2C7S9lEj5S pic.twitter.com/Yn213ySwwt

— City of Toronto (@cityoftoronto) April 6, 2021

Humanize Your Account

Although most government accounts’ overall tone tends to be formal, showing off your human side can help you connect better with your constituents.

Humorous captions, candid conversations, and playful comments are all common among government accounts today.

New Jersey’s Twitter account is credited for being sassy & fun with their bold & in-your-face tweets.

djeetyet? https://t.co/bbQJ2TFtrw

— New Jersey (@NJGov) February 19, 2020

While we don’t recommend putting out such tweets outright, sharing such fun posts occasionally can help humanize your account.

Stay Compliant

Lastly, all government bodies and representatives have to stay compliant with the Freedom of Information Act (FOIA), General Data Protection Regulation (GDPR), and other public records laws. These acts enforce access & accessibility of critical information.

Learn more about social media compliance for government bodies.

DM Channels will help you safeguard your accounts and efficiently govern your social presence with scalable and intuitive administrative control, security, and visibility. You can streamline the complex workflows and minimize risk by not sharing passwords, providing additional layers and permissions so only trusted members can access the account.

DM Channels is an all-in-one social media management team that supports Facebook, Instagram, Twitter, Linkedin, YouTube, and even Google My Business.

Social Media: The Pros, Cons, and the Security Policy

Risks & rewards of social media

Social media is a great tool in your organization’s communications toolbox. Many Americans have accounts on at least one platform and expect to find pages for their favorite brands and communities. If used correctly, it can have many benefits:

  • Providing real-time information. Social media enables organizations to provide information in real-time. This is especially useful if your organization needs to communicate important information quickly. For example, if your organization experiences a time-sensitive incident, such as a data breach, you can use social to share pertinent information and provide steps your followers can take to remediate the damage. Government entities can use social media to disseminate information about programs and public meetings, changes in schedules, road work, and other information that constituents need to know about.
  • Answering questions. Social media allows consumers to ask organizations questions and provide feedback. This means you know what information and product features they want, what you are doing well, and where you can improve. You can change your customer service processes, add new products or change existing ones, or keep doing what you do well. Most importantly, you can be responsive to your customers, which will help grow your image and your business.
  • Humanizing your organization. Consumers can get to know your brand and the people behind it, and vice versa. Because the conversation is person-to-person and not bot-to-person, a company can reach customers using social media in ways that other marketing and advertising can’t. For example, you can adopt a more human voice through social media than you would through traditional advertising. Even a simple “Please PM your information so we can look into your concern” can go a long way toward keeping a current customer happy and maybe getting some new ones.

Of course, the unicorn is the post that goes viral for the right reasons. However, not everything looks rosy when it comes to organizations using social media.

Building a security-focused social media plan

Privacy and security risks associated with social media platforms only increase as the number of users and platforms grow. Cybercriminals mine social media accounts to get valuable intelligence that they can use in malicious campaigns. All organizations should develop a social media policy that takes cybersecurity and privacy into account. The first step is to develop a social media policy that includes what can be posted, who can post, and on what devices (e.g., can they use their personal device, or does it have to be a company-owned device?), and who is responsible for keeping and changing passwords. These are just some of the things that should be addressed; there are guides that will help you write a detailed plan.

Below are a few tips for developing a secure social media plan in your organization:

  • Establish a social media team headed by a senior person. This person will be responsible for implementing and enforcing your company’s social media policy, as well as issuing access to those who need it. The team should include someone from the IT department who can consult on risk mitigation and who can assist if security issues arise.
  • Use role-based email addresses instead of employee addresses. Using email addresses like social@company.com and communications@company.com makes it harder to break into a network. A cybercriminal needs two email addresses to figure out your company’s email assignment scheme, which is a valuable piece of information needed to break into your network or your building.
  • Your plan should include a way to insulate employees who choose to participate in your social media campaign. They should consider setting up separate social media accounts for work that are not linked to their personal accounts.
  • Unless the employee has agreed to participate in a social media campaign and has taken steps to insulate themselves, try not to identify employees by more than one identifier, such as name and department, or name and email address. For example, if you post a photo of an employee who has earned an award, avoid identifying them as Jane Smith from Accounting. A criminal can use this information to get into the building (“I’m here to see Jane Smith from Accounting”) or find her and her email address in the company directory.
  • Any employee photos on social media (or any public-facing website) should be taken in a closed conference room or some other area away from active workspaces. This will prevent confidential information, employee names, or information on screens or desks from inadvertently being photographed.
  • Consider a policy of zero trust and require that all posts be vetted by the social media team for content prior to publishing.
  • Review your social media policy at least quarterly. Go over the privacy settings for each platform and make any necessary changes. Make sure only the people who need access and publishing privileges have them, remove anyone who does not, and change privileges as needed. Sit down with your IT experts and discuss the latest threats to make sure you’re covered. Finally, take a look at your overall social media policy to ensure that it’s best for your organization and make any necessary changes.

Securing our connected future

Social media has proven to be a powerful communications tool for both business and government organizations, but its powers can be used to harm as well as help. A solid social media policy and security plan that is implemented with care, will vastly improve your social media strategy and protect employees’ privacy.

Security Tips for Social Media and Social Networking Apps

Introduction

Social media, and social networking or messaging apps, can pose a number of security and privacy risks to both organisations and individuals when used in an inappropriate or unsafe manner.

Due to their popularity, social networking or messaging apps are a common way for an adversary to gather information on organisations and their employees, projects and systems. Even social networking or messaging apps targeted at children or teenagers present the risk that sensitive or embarrassing information will be disclosed. When sensitive or embarrassing information is posted on social networking platforms, or shared via messaging apps, it has the potential to harm individuals and Australia’s national interests, security or economic wellbeing. Information that appears to be benign in isolation could, if aggregated with other information, have a considerable impact.

Personal information posted on social networking platforms, or shared via messaging apps, can also be used by an adversary. Even seemingly benign posts, messages, photos or videos can be used to develop a detailed profile of an individual’s lifestyle and hobbies. This information could be used in extortion or social engineering campaigns aimed at eliciting sensitive information from or influencing individuals to compromise an organisation’s systems.

Information which is posted to social networking platforms (even in private or direct messages), or through social networking or messaging apps, may be accessible to social networking and mobile app companies. Sometimes, this information can be stored outside of Australia and subject to lawful and covert data collection requests by other countries, and you may not be protected by Australian legislation and privacy or consumer laws.

The compromise of social networking accounts could also contribute to identify theft, fraud and/or reputation damage or embarrassment to individuals.

Social networking for business purposes

The use of social networking platforms for business purposes should be governed by organisations’ social media usage policies.

The following measures should be implemented for corporate social networking accounts:

  • Ensure only authorised users have access to corporate social networking accounts.
  • Be aware of any extrajudicial obligations in conflict with Australian law which may apply to social networking or mobile app companies.
  • Ensure users are informed of, and agree to, their organisation’s social media usage policies as well as social network platforms’ usage policies.
  • Ensure users are trained on the use of corporate social networking accounts.
  • Ensure users are aware of what can and cannot be posted using corporate social networking accounts.
  • Ensure users are aware of processes for responding to posting of sensitive or inappropriate information.
  • Ensure users are aware of processes for regaining control of hijacked corporate social networking accounts.
  • Ensure users’ access to corporate social networking accounts (either direct or delegated) is revoked immediately when there is no longer a requirement for access.

Social networking for personal purposes

The use of social networking platforms for personal purposes should be governed by common sense and a healthy level of scepticism. For example, there have been numerous incidents where social networking platforms have been used to distribute inaccurate information (i.e. ‘fake news’). Furthermore, other incidents have involved accurate information being redistributed by a very large number of automated accounts in an effort to draw additional attention or to sway reader opinion.

The following measures should be adopted by individuals for the use of their personal social networking accounts:

  • When creating social networking accounts use an alias rather than disclosing your full name.
  • Use a personal email address rather than a business email address. If possible, use a separate personal email address for social networking.
  • Ensure you understand and apply any available privacy options and use a private profile where available. All the information you put on social networking, or share on social networking apps will be available to the app or social networking company regardless of privacy settings.
  • Restrict the amount of personal information placed on social networking such as your home or work address, phone numbers, place of employment, and any other personal information that can be used to target you.
  • If your location or movements are sensitive, be aware of mobile social networking apps that automatically post your location. Also, remove GPS coordinates from any pictures posted.
  • Do not post information that is not for public release from your current or previous jobs.
  • Carefully consider the type and amount of information you post. Remember the internet is permanent and you can never fully remove what has been posted. Further, all your posts will be available to the social networking platform’s operators regardless of your privacy settings.
  • Monitor information friends post about you to prevent the unauthorised disclosure of your personal information.
  • Be wary of accessing shared links or attachments including via ‘direct’ or ‘private’ messages on social networking platforms and messaging apps.
  • Be wary of unsolicited contacts. Do not accept requests from people that you do not know.

Securing social networking accounts

The following measures should be implemented for the use of both corporate and personal social networking accounts:

  • Use a strong passphrase that is unique for each social networking account and is not re-used on any other system. Use multi-factor authentication where possible.
  • Do not share passphrases for social networking accounts.
  • Do not store passphrases for social networking accounts in emails or in documents.
  • Do not elect to remember passphrases for social networking accounts when offered by web browsers.
  • Avoid configuring social networking accounts to automatically sign in.
  • Always remember to sign out of social networking accounts after use.
  • If asked to set up security questions to recover social networking accounts, do not provide answers that could easily be obtained from public sources of information.
  • Do not access social networking accounts from untrusted devices in internet cafes or hotels.
  • Use lock screens and a passphrase on devices that have access to social networking accounts.
  • Where possible, access social networking accounts using devices that are using the latest versions of software and have had all recent updates applied.
  • Remember to close old social networking accounts when they are no longer required.

Securing mobile app permissions

Most social networking platforms provide a mobile app for use on the go. These mobile apps can create additional security and privacy risks which should be considered before installation, and be reviewed regularly:

  • Ensure you are informed of, and agree to, social networking platforms’ usage policies which may include collection of data about you and your device.
  • Ensure your device is up-to-date with the latest available operating system which provides the greatest control of mobile app security settings.
  • Only install mobile apps from your device’s approved app store, such as Google Play or the Apple App Store.
  • Check the mobile app’s store page for required permission before you install any mobile app. Be wary of mobile apps which require excessive permissions for the functions they provide.
  • Also make sure to check mobile app permissions and security settings after updates as these can change over time.
  • Be mindful that mobile app permissions and privacy settings cannot completely remove the risk of your information being compromised. Sometimes mobile apps can collect more information about you and your device than they openly declare. It is important that you trust the social networking platform you are using with your information and access to your device.
  • Be aware that information collected and transmitted offshore may not attract protection through Australian legislation and privacy or consumer laws.

DM Channels Social Media Cyber-Vandalism Toolkit

Social Media Cyber-Vandalism Toolkit

Guidance on how to respond to cyber-hijacking.

Cyber-vandalism presents a serious challenge to online-based communication tools. Users need available resources to counter intrusions of social media accounts.

This document provides guidance, resources, and security practices that prepare users to respond to cyber-hijacking, make informed choices, and enact future policy.

Readiness: Phase 1

Cyber-vandalism occurs when an outside party, regardless of identity or motive, takes control of an agency communication channel and misdirects it. Incidents may contain information misleading to the public or threatening to an agent of the government. Agencies should plan and train prior to an incident, and prepare approved processes and material for the recovery and response to cyber-vandalism.

1. Identify a social media stakeholder team to prevent and respond to cyber-vandalism

A direct chain of responsible managers should be aware of their roles in the potential response to any social media cyber-vandalism, including the necessity of quick, decisive action. This team should be connected by email, phone, text and any other appropriate means of communication. The team should include, but is not limited to:

  1. Social media team
  2. Program manager
  3. Public affairs representative
  4. General Counsel
  5. IT Security
  6. Senior leader/manager

2. Review Individual App/Platform Resources

Online-based communication tools offer resources, each with unique strengths and limitations. Awareness of this support and their unique characteristics is beneficial before an incident:

  1. Facebook: Facebook Security TipsFacebook Security Settings; Learn extra security features including approvals, notifications, trusted contacts and mobile security
  2. LinkedIn: LinkedIn Safety CenterPrevention TipsPassword GuidelinesFrequently Asked Questions | Reporting Inappropriate Content, Messages, or Safety Concerns
  3. Instagram: Instagram Privacy & Safety Center
  4. Twitter: Safe tweeting: the basics
  5. Google: Keeping your account secure
  6. Hootsuite: Social Media Security

3. Establish Stakeholder Rapid Outreach Plan

  1. Prepare a list of internal and external contacts and processes for a cyber-vandalism incident:
    • Who is the POC for the app or platform when an incident occurs (see Phase 2: Recovery for list)?
    • Who is the POC for cyber-vandalism of accounts in the Government (see Phase 2: Recovery for list)?
    • Who is on your social media stakeholder team?
    • Who are your key communities and audiences on social media and other channels you must alert?
  2. Incorporate relevant contact information:
    • Emails; Phone Numbers; Social Media Handles; Hashtags; Listservs and more.

4. Create Communication Templates

  1. Pre-populate different types of messages.
    • Emails; Texts; Social media posts and more.
  2. Communicate essential information to convey the nature of the compromise, for example:
    • An account is compromised; An administrator cannot access an account; A username and/or password for an account is compromised; Information on the account is unauthorized.

5. Review Secure Social Media Best Practices Checklist

  1. Institutionalize secure web standards, such as HTTPS, as a foundation for secure social media:
  2. Establish accounts with official .gov or .mil domains of full-time equivalent employees (FTE) .
    • Allow for more than one FTE to administer an account.
    • Designate an alternative as auxiliary support. Limit this designation to an individual essential to the operation and management of an account.
    • Clearly define the criteria for the administrator and alternative.
    • Provide adequate resources to the FTE administrator, including a mobile device and third-party management tool whenever possible.
  3. Create a social media policy with standard operating procedures (SOP) for cyber-security.
  4. Obtain approval from appropriate agency parties, including IT Security and General Counsel
  5. Train stakeholders and others on the procedures and policies of social media cyber-security.
    • Require training before use of an account.
  6. Use only authorized URL Shorteners.  
  7. Add all official accounts to the Digital Registry, verifying authenticity of ownership.
    • This tool, used by both Facebook and Google to verify accounts, tracks official federal social media accounts.
    • List Department of Defense (DoD) social media accounts in the DoD Social Media Site Registry.
    • Per DOD Web Policy and DoDI 8550.01 , use DoD Social Media Registry submission form.
  8. Follow best practices for secure passwords.

6. Evaluate Two-Step Verification

This type of authentication verifies a user attempting to access a device or system. It requires confirmation of two consecutive, yet dependent, entries. It may not be applicable to those without mobile devices or in secure environments prohibited entry of such items. It may also require the use of third-party management tools to effectively allow multiple content coordinators.

  1. Facebook: Facebook’s Login Approvals; ZDnet.com supplemental step-by-step guide.
  2. Google and YouTube: Google 2-Step Verification.
  3. LinkedIn: LinkedIn’s Two Step Verification.
  4. Twitter: Twitter’s Two Step Verification Process.

7. Review Special Guidance Per Common User Responsibility

For Supervisors and Directors: Confirm policy is clear, accessible, and distributed among employees. Review, approve, and document all agency accounts regularly. Identify and eliminate rogue accounts. Instruct staff administering accounts to adhere to agency criteria and undergo training where appropriate.

For Social Media Managers: Make security a part of regular social media meetings. Conduct security checks on a regular basis. Regularly update passwords. Keep the list of social media accounts updated. Keep account manager contact information accessible and updated. Remove access for users who are no longer with the agency. Develop a secure method of storing account names, owners, and passwords.

For Social Media Coordinators: Use a protected, official government device. Use protected connections. Do not post from an open Wifi network. Use a work VPN, 4G or the work-connected Internet connection. Generally, use network locations with strong firewalls and on standalone equipment. Preview shortened links to see the address of where they lead. Review the URL of a website in the address bar. Make sure the websites you visit use HTTPS encryption. If you are unsure of a link, double click the lock icon on your browser’s status bar to display the digital certificate for a site.

8. Conduct Training on Secure Use of Social Media

Live training: DM Channnels Cybersecurity Online Learning (DCCOL) program supplements mandatory FISMA security role-based training by offering in-demand cybersecurity workshops.

Recovery: Phase 2

Alerts of suspicious activity on social media can come from anywhere, including social media itself. If the social media cyber-security stakeholder team or responsible manager determines an incident is in progress, remember that minutes and even seconds count. Within minutes you’ll need to alert internal stakeholders, alert outside stakeholders to help you regain control, and act to isolate the compromise.

  1. Immediately: Alert your social media cyber-security stakeholder team, and CC them on following messages.
  2. Attempt to change passwords to isolate the incident (steps 2 and 3 ideally simultaneously with two employees)
  3. Contact the platform companies themselves and GSA to help regain control.

1. Contact Information to Recover Control After Cyber-Vandalism

  1. Facebook: Online form for Facebook; Email: gov@fb.com;
  2. Twitter: Online form for Twitter; Email: Gov@Twitter.com;
  3. LinkedIn: Respond to and Report Various Issues; Email: LCSHelp@linkedin.com; Email: mcirrito@linkedin.com;
  4. Instagram: Online form for Instagram; Email: government@FB.com;
  5. Vine: Online form for Vine; Email: Gov@Twitter.com;
  6. Hootsuite: Email: Support@hootsuite.com; Email: sajji.hussein@hootsuite.com;

2. Audit your social media inventory

  1. Audit your list of social media accounts, password holders, agency hosted websites.
  2. Ensure no former employees, contractors or interns have access to current passwords.
  3. Review any third-party app you use to monitor or post to social media, such as IFTTT.
  4. Review your other digital services, including websites, for signs of cyber-vandalism and any vulnerabilities.

3. Confirm cyber-vandalism recovery process on different channels

Once securing your other accounts, release pre-approved initial messages alerting your communities that an incident is occurring and that steps are underway in order to recover cyber-vandalized accounts.

4. Initiate Restoration Activities After Regaining Account(s)

  1. Archive cyber-vandalism messages.
  2. Delete cyber-vandalism messages.
  3. Stop all pre-scheduled messages.
  4. Restore normal settings and features.

Response: Phase 3

Agencies must not only prepare for and recover social media accounts after a cyber-vandalism incident, they should also quickly and effectively respond to their stakeholders and audiences as soon as possible using social media in order to maintain trust in digital services. Initial responses to the cyber-security stakeholder team and the public should be within minutes of recovering control of your accounts.

1. Confirm Incident and Recovery

  1. Cyber-security team confirmation: Send initial report of recovery to social media cyber-security stakeholder team.
  2. Public confirmation: Distribute as soon as possible social media posts confirming the cyber-vandalism incident and your recovery of affected accounts. Announce a return to regularly scheduled activities.
  3. Community confirmation: Deliver additional communication with pre-determined internal audiences and stakeholders to prevent the spread of rumors and misinformation.

2. Confirm and Verify Changes to Access

  1. Review account holders.
  2. Confirm verification of login status.
  3. Confirm changes and updates of passwords.

3. Conduct a review of lessons learned

  • What type of response worked well?
  • Why did this work so well?
  • What did not work?
  • What unforeseen events occurred?
  • What changes will lead to a better response?

4. Apply data and analysis of outcomes to improving your program

  • Develop after-action report.
  • Ensure future relevance with accurate information.
  • Include lessons learned and best practices.

19 Social Media Security Best Practices

Social Media Security has quickly become one of the most important issues facing business and individuals. Unlike a few years ago, social networking has asserted itself as one of the primary means for communication. Large corporations and individual users alike prefer the channel for various reasons. The most common ones are the ability to communicate with millions of users at a go, connecting to people from any part of the world, and facilitating the sharing of all types of media. Such include pictures, videos, text messages, and voice and video calls.

Despite its popularity, social media poses security risks due to the rising number of hackers and sophistication of attacks. Security threats are rife, and as such, social media users need to be aware of the best practices required to secure their social media accounts.

Common security risks affecting social media

Third-party applications

Social media companies are aware of the cybersecurity risks they face. They, therefore, frequently assess their systems and applications for vulnerabilities and implements the best measures for enhancing their security. Due to this, cybercriminals use third-party apps to hack their victims. This is demonstrated by Twitters’ security breach, where attackers exploited a security flaw in Twitter Counter (an application used to analyze Twitter activities). They were able to hack the Twitter accounts of Amnesty International and Forbes.[1]

Malware attacks

Cyber adversaries are persistent in their efforts to create smart and stealth malware programs. They use malicious scripts to hack the social media accounts of unsuspecting victims. By tricking their targets into installing the malware, attackers can easily monitor their activities. The approach allows them to access sensitive information like usernames and passwords.

Unsecured mobile devices

The majority of social media users install applications, such as Facebook and Instagram, in their devices for quick and easier access. Besides, smartphones are easily portable, and this makes them useful for social media usage. If a mobile device connected to social media accounts falls in the wrong hands, it can easily compromise a user’s privacy or security, resulting in identity theft, where malicious individuals use compromised accounts to promote their gains.

Imposters

Internet con artists are excellent at creating imposter accounts. Current technology makes it easy to create a replica social media account. To lower suspicion, they can wait for long periods, monitoring the original accounts to ensure they have similar activity history. As a result, targeted users can fall prey and provide highly sensitive information. Rival businesses can use the same tactic to tarnish the name and reputation of their competitors. Also, hackers can use imposter accounts to gain access to social media accounts used for corporate activities.

Unattended accounts

In some cases, individual users or companies create social media accounts and stop monitoring them after using them for a while. Cyber attackers target such accounts since they are aware that no one is watching them. They do not even need to hack them as they can use an imposter account to post fraudulent messages. Unmonitored accounts are a huge risk since they can enable hackers to disseminate false information or send malicious links to followers.

Staying secure

There are many other types of social media security threats. Although the parent companies invest heavily in maintaining secure systems and social media applications, users also have a massive responsibility to keep their social media accounts safe. Here are the top tips for enhancing social media security.

Social Media Security Tips for individual users

1. Monitor your inbox

For many years, hackers have used email messages to conduct phishing attacks. These are attacks where a cyber adversary uses different techniques to trick victims into installing malware or divulging confidential information. The methods can include appealing to the victim’s interests. Social media has, however, made it easier for hackers to carry out phishing campaigns. At a single glance at the user’s profile and account activities, they can create convincing messages to trick victims into clicking a malicious link or downloading an attachment with malware. Therefore, monitor the messages, links, or attachments sent to the inbox. Phishing attacks are usually sent by unknown people and will mostly request for personal information.

2. Utilize password protection

When creating any social media account, the process includes a requirement to create a unique username and password. Password protection is, in fact, one of the easiest ways of keeping a social media account secure. All social media platforms require users to provide a password to gain access. Creating a unique password is nevertheless different from maintaining best password security practices. Recommended practices for enhancing password security consist of creating strong passwords. Strong passwords can prevent a brute-force attack attempt. Also, periodically changing a password can minimize the possibility of its compromise. Furthermore, it is always essential to log out of a social media account once accessed through another person’s device. Most browsers or applications retain passwords where anyone can sign in.

3. Use multi-factor authentication

Many social media platforms support two-factor or multi-factor authentication schemes. They provide additional security to password protection. Enabling multi-factor authentication requires a user to provide a correct password and a second item to verify authenticity. For example, two-factor authentication may send a code to the provided phone number or email address when signing in. Failing to give the sent code, even with a correct password, denies access. Since only the legitimate account owners can access the authentication items, a malicious user can’t gain access. However, not all social media platforms enable multi-factor authentication in their default security settings. The account owner must hence allow the option in the privacy and security settings. Applying multi-factor authentication is an effective way of enhancing social media security and preventing unauthorized individuals from accessing the account.

4. Set up hard to guess security answers

When creating a social media account like Facebook, users must provide the phone number or email address for resetting passwords, in case they forget. Malicious individuals may have access to the email accounts or phone numbers and use them to rest the passwords. As such, they can sign in as the real owner and use the account to post harmful content or target followers with phishing messages. Using security answers can enhance social media security since resetting passwords might require one to provide answers to the security questions. Providing the wrong answer prevents a password reset, and this strengthens social media security. However, just like multi-factor authentication, the security questions to be used during password reset must be enabled in the security and privacy settings.

5. Manage the privacy settings

As previously stated, social media users have a huge responsibility in ensuring their personal security and that of their accounts. Due to this, they should proactively manage their privacy settings to determine who can see their posts or timeline activities. Maintaining privacy settings protects a user from social media phishers. To create a successful phishing message, an attacker must identify the interests of the target. Enabling privacy settings such as followers or friends can view the timeline history can prevent phishing attacks, thus enhancing social media security.

In that light, it is also advisable to be careful with the messages a user posts on social media. The primary intent of hackers is to access personal information such as social security numbers, credit card numbers, home addresses, and user passwords. Posting such information on a public platform like Facebook only simplifies a cyber adversary’s work. The more a user posts personal information on social media, the easier it is for a hacker to steal the user’s identity.

6. Secure mobile devices and computer

Sometimes, all a cyber actor requires to compromise social media security is a vulnerable computer. Cybercriminals exploit computer or mobile device vulnerabilities to install malware programs. Through the malware, a hacker can remotely monitor all activities, including the social media usage patterns of a particular victim. This can provide a cybercriminal with the necessary information for accessing the victim’s social media accounts.

There are multiple measures one can implement to ensure computer and mobile devices security. Using antivirus solutions can detect malware programs present on the computer. Also, acquiring updates whenever they become available, especially for social media applications, installs the latest security updates. As a result, it becomes difficult for a cybercriminal to exploit security vulnerabilities.

7. Who are your followers and friends on social media?

Verifying requests sent by new friends or followers can go a long way in enhancing social media security. The main aim of social media is to connect people from different parts of the world. As a result, hackers utilize such opportunities to create fake social media profiles and sending requests to hundreds of users as it increases the possibility of finding an easy target. It is prudent to verify the social media profile to determine its authenticity. It is relatively easy since a legitimate profile should contain a history of the owner’s activities. Such include sharing photos and comments on their posts from other friends. A profile with hard to verify information can be a cybercriminal using a fake account. Delete such requests and take the extra step of blocking or reporting them for further investigations.

Social Media Security Tips for Businesses

Businesses are heavy users of social media. They use different sites like Facebook, Instagram, and Twitter, to advertise products and interact with customers. The heavy usage is due to the various advantages, which include responding to user queries in real-time, promoting products in different parts of the globe, and maintaining business image and reputation. Since social media acts as the face of an organization, companies must ensure their social media accounts are secure. The following are the top social media security tips businesses can use.

1. Perform frequent audits

Due to emerging technology and hacking tactics, the threats impacting social media security change constantly. Cybercriminals are always devising new strategies, viruses, or scams that they can use to compromise social media accounts which businesses operate. Therefore, a company aiming to keep ahead of cyber actors should enforce regular audits of all implemented security measures. A quarterly or semi-annual audit is sufficient, and a review on the following should guide a comprehensive inspection:

2. Social media policy

Businesses enforce social media policies uniquely tailored to meet their communication needs. As such, the businesses should review the policies to accommodate changes in social media usage and security practices. A frequent review can ensure that social media security documentations remain useful in securing their accounts.

3. Publishing and access privileges

Auditing publishing and access permissions can enable an organization to protect its social media accounts. Permissions review is necessary since it identifies users with the rights to publish content on the platforms. Some users might have changed their roles or had their access revoked. As such, auditing ensures that only users with the necessary permissions can access or publish on social media.

4. Privacy settings

Social media sites tend to update their respective privacy settings. The updates can impact the security of an account since it will be using the old privacy settings before they were updated. Businesses should ensure that they frequently audit their security settings to ensure they are in tandem with the new updates.

5. Keep track of recent threats

The IT department of any company should track new risks and working solutions. Tracking emerging threats enables a business to implement sufficient measures for responding to them or preventing them entirely.

6.Implement a system for approving new posts

All businesses dread any incidence that can damage their reputation. A malicious individual with the correct login information can access the account and post information that can ruin the company’s reputation. Notwithstanding, an employee with good intentions can use the same platform to post sensitive business information about the business. Such information can include unreleased products or services that have not yet been unveiled. Moreover, a user can also use a work social media account to post personal information. Whereas this does not pose any significant risk to the account’s security, it demonstrates a business’s inability to control information flow, thus affecting its reputation and customer base.

Every organization should, therefore, implement a system that it can use to approve any posted information. Such information can include designating a group of individuals who approve different types of information. For example, an employee from the marketing and finance departments can approve any information originating from their respective sections. In a recent case, a marketing contractor working for Z-Burger posted a graphic image of a killed journalist on the company’s Twitter handle[2]. The contractor had publishing rights, but the company lacked a system for approving new posts.

7. Monitor all social media accounts

As mentioned earlier, unmonitored accounts are one of the biggest threats to social media security. Hackers target unattended accounts since they are easy to hack or impersonate. Monitoring all social media channels is hence a security necessity that a company should consider observing. Monitoring should include accounts used every day, and those that were opened but used for a short while or not used at all. As a result, it can be possible to detect any cyber actor who manages to hack and use the accounts. However, monitoring the accounts usage patterns alone is not enough. It is also vital to monitor the originality and authenticity of all posted information. To achieve this, a business can cross-reference its posts with the company’s content calendar.

Besides, following up on everything can enable a business to maintain sufficient social media security. Social media platforms are designed such that any information communicated through them appears to be from the owner or authorized users. However, this is not always the case. Digging into all activities, even those that look legitimate can uncover risks that can cause security issues in social media usage and access. Some content can be crafted to stray from the intended information. This can be due to human error, or due to unauthorized access. Also, monitoring should include watching out for employees who make inappropriate comments or mentions about the business’s brand, negative conversations regarding the business, and imposter accounts.

8. Designate a social media officer

Creating a role that establishes the position of an employee responsible for controlling social media accounts can enhance their security. It can also bolster the efforts put in place for mitigating risks and threats. The person who fills such a role should be responsible for developing and owning social media security policies. Other vital roles can include monitoring the company’s social media presence and determining individuals with permissions to access or post on the accounts. This is particularly important since unauthorized posts or access can compromise the security and integrity of the account in question.

To ensure the employees responsible for securing an organization’s social media accounts discharges the role effectively, they require to collaborate with the IT department. A good relationship will be valuable in facilitating sufficient risk mitigation and prevention. Also, the social media officer needs to closely work with all departments that require the accounts to fulfill their obligations. Such may include marketing. As a result, the officer can approve or decline to authorize posts depending on how they impact the organization’s strategies, objectives, or regulations.

9. Restrict the use of social media

According to a survey done by PriceWaterhouseCoopers, organizational employees have higher possibilities of causing social media security risks compared to hackers. Employees can make errors when posting on a business’s timeline, which can result in security risks. As a result, restricting the use of social media is one of the best ways of keeping the company’s social media accounts secure. For example, a business may task different teams with roles such as messaging customers through social media, creating new posts, or providing customer services. However, not everyone requires the permissions to post; neither should all team members have access to login passwords.

As such, minimizing the number of employees capable of posting should be a top priority in managing social media security. Once a business identifies employees with permissions for posting, it should consider using software solutions that can provide direct access without requiring a password or username. This would eliminate the need for continually changing login credentials once an employee leaves the business or the permissions are revoked.

10. Train best social media security practices

Adopting the most potent social media security policies can be useless if the employees are ignorant of best usage practices. Whereas such a policy needs to be simple and easy to understand, training staff provides them with an opportunity of actually learning how to enforce it. Training sessions also enable staff to understand social media security threats and their responsibilities in preventing them. Moreover, training sessions provide a business with the time to review implemented policies and updating them accordingly.

11. Maintain social media policy

Any business using or planning to use social media must develop a comprehensive policy to ensure its security. An effective policy should contain guidelines for preventing negative PR or legal struggles, and more importantly, mitigating security threats. Some of the guidelines to include in the policy are:

  1. The team members or departments with access to company social media accounts
  2. Guidelines for working password management strategies
  3. How employees can identify social media threats, attacks, scams, and how to report them
  4. Rules governing the use of personal social media for work reasons
  5. Guidelines for talking about the business’s brand on social media
  6. Invest in automated security technologies

Monitoring social media activities using human operators can be challenging since they can make errors or be unable to ensure round the clock monitoring. Subsequently, some threats can go unnoticed, resulting in disastrous security breaches. An automated solution can prevent that from happening since it doesn’t make errors, nor will it leave the system unmonitored. Automated security monitoring can alert of offensive posts that can harm a business’s reputation. Also, it can detect links or attachments used for phishing campaigns, fraudulent accounts attempting to impersonate a company or scams that target the business’ customers. As a result, a business can enjoy enhanced social media security.

The 2020 Digital Marketing Glossary

The ever-changing digital ecosystem can be confusing. Here’s our guide to the most common and most commonly misunderstood digital marketing terms every marketer needs to know to stay ahead of the curve.

A

A/B Testing

If you want to improve your marketing efforts, A/B testing may come in handy. This is the process of comparing two variations of the same variable to find out which one performs best The variations can be change in copy, call-to-actions, landing pages, etc.

Above the Fold

In website terms, ‘above the fold’ is the type of content that a website visitor sees before scrolling down on a specific page It’s useful being aware of this type of content when you are creating landing pages for inbound marketing. A call-to-action that first pops up after a lot of scrolling may decrease the efficiency of your campaigns.

Ad Servers

Isn’t it nice to have someone who does the job for you? Yes, it is, and that’s why ad servers exist! Ad servers are automated servers that help you request, bid on, and place your ads on websites, as well as monitor the progress of each campaign. For advertisers handling billions of data per day, ad servers make it easy to select the ads with the most potential and place them on appropriate websites.

Affiliate Marketing

This is a type of performance-based marketing where a brand rewards affiliate partners for each website visitor or customer brought by the affiliate’s own advertising efforts. Affiliates typically receive discounts or payments based on the number of visitors or customers they bring.

API (Application Program Interface)

An API is a way of getting specific information from other applications or websites, which you can use for a variety of different needs. It is similar to a set of tools used for building a software application. The better the tools, the easier it is to make a good product. In the case of an API, the better the API, the easier it is to develop a program.

B

Behavioral Targeting

Is serving tailored advertising to audiences by utilizing their previous web browsing behavior in order to drive more engagement.

Bottom of the Funnel

Bottom of the funnel is the last stage in the buying process when your prospects are close to becoming new customers. Messages at this stage usually include a product offer, a product demo, a free consultation, etc.

Bounce Rate

It often happens that you click on a random link and you end up on a website that you are not interested in anyway. Even though you immediately leave that website, your visit still counts in website analytics. Congratulations, you have just contributed to the bounce rate of that website! In other words, bounce rate is the percentage of visitors that have landed on your website but have not stayed long enough or clicked on other pages.

C

Churn Rate

This is the metric that comes in handy when you want to find out how many customers your business retains and at what value. To find out your churn rate, divide the number of customers you lose within a specific timeframe to the total number you had at the beginning of that period.

Closed-Loop Marketing

If your goal is figuring out how your inbound marketing drives quantifiable business growth, you might want to take a look at this one. The practice means being able to execute and tie in marketing efforts to bottom-line impact.

Cloud Computing

If you do not have space or resources to build your own computing infrastructure, then cloud computing is for you! It allows its users to store, manage, and transfer data using host servers. There are several types of clouds with different purpose and benefits.

CMP (Cloud Management Platform)

CMP is a group of products that can be used to manage and monitor cloud computing resources either in private, public, or multi-cloud models.

Conversion Path

This is defined as a series of actions by which an anonymous website visitor becomes a known lead. Typical steps in your conversion path may be a call-to-action, a lead capturing form,a thank you page, etc.

Cookie

As much as we wish this were a real sweet treat in the internet terminology, a cookie is a unique value stored on your browser (in the form of a small file cookie.txt) assigned by websites you visit. The purpose of a cookie is to keep track of where the user is and help create customized web pages or save login info. Find out more about the effect of Safari’s ITP 2.1 on cookies and how to eliminate its impact.

CPA (Cost Per Acquisition)

In advertising, CPA (short for ‘Cost Per Acquisition’ or ‘Cost Per Action’)  measures the cost that you are willing to pay to get a goal conversion. It is similar to CPC (Cost Per Click) and CPM (Cost Per Mile).

CPM (Cost Per Mille) / CPT (Cost Per Thousand)

When your ad loads and displays for a user, it counts as one impression. Cost Per Mille (CPM), also called Cost Per Thousand (CPT), is used for a thousand impressions on one website. It is similar to CPC (Cost Per Click) and CPA (Cost Per Action).

CR (Conversion Rate)

The percentage rate gathering the online audiences that followed and completed the campaign action that you wanted. (e.g: signing up to your service or mailing list or buying your product). A good CR means that your marketing game is strong! Find out how to optimize CR from Moz.

CRM (Customer Relationship Management)

CRM is the approach of managing and analyzing your brand’s relationship with potential and existing customers. Digital marketers usually use a CRM system to support this strategy – to streamline processes and increase profitability.

CRO (Conversion Rate Optimization)

CRO is short for Conversion Rate Optimization. If your conversion rate is not impressive, then it is time to take action and employ conversion rate optimization methods. Because good CR is synonymous with a high number of conversions that in turn, reflects a good website and SoMe performance. CRO consists of numerous techniques, and testing methods –  check out this illustrative CRO guide to dive into some of them.

CTA (Call To Action)

When it comes to online advertising, a good choice of words and a persuasive CTA are essential. A CTA is a message that appeals to potential customers, and it is often the last push to drive a specific action such as buying a product, subscribing to a newsletter, etc.

CTR (Click-Through Rate)

Have you ever wondered about how many people actually see your ads and how many click them? A CTR shows you that. CTR is simply the percentage of people that saw your ad and felt compelled enough to click it. You can count your CTR score as follows by dividing the total number of Clicks to the total number of Impressions.

D

DAM (Digital Asset Management)

When you’re handling many digital files on a daily basis, DAM may come in handy. This process helps you store and categorize your digital assets easier, so thar you can access them at any time from one place.

Data Visualization

This is the process of visually representing specific information to make it easier to understand. Dashboards and infographics are common examples of visualizations.

DoubleClick

DoubleClick is a subsidiary of Google which develops and provides Internet ad serving services. Its clients include agencies, marketers, and publishers who serve businesses such as Microsoft, General Motors, Coca-Cola, L’Oréal, Apple, Visa, Nike, Carlsberg, and many others. At the beginning of 2018, Google announced the merge of DoubleClick and Google Analytics 360 Suite into a new Google Marketing Platform and Google Ad Manager.

Drip Nurturing

Is a lead nurturing method that uses automated tailored content & triggers that are ‘dripped’ at a specific time with the goal of driving a desired action (e.g: a sale). Drip campaigns or drip emails are usually used here.

Dynamic Content

Dynamic content is the process of displaying different messaging on your website or in your online advertising (e.g. Facebook’s Dynamic Ads) based on information you have or your enriching about your target audience.

E

Engagement Rate

This is a valuable metric used to describe the amount of social media interaction a post, ad, or campaign has. This is usually measured based on interactions like Comments, Shares, and Like.

Event Tracking

If you want to track beyond revenue and conversion metrics, keep an eye on Event Tracking. This is a method for analytics and social (e.g. using Facebook’s pixel) that helps you track your customers’ journey every step of the way by analyzing certain behaviors like form fills, cart additions, or newsletter sign-ups.

Evergreen Content

This is the type of content that is always relevant to your audiences, no matter when they read it. Compared to time-sensitive content such as seasonal articles or campaigns, evergreen content continues to provide value way beyond its release date

F

Friction Element

A friction describes any type of element that causes your website visitors or campaign to stop taking a desired action. On a website, a friction can be a distracting color, a confusing message, etc.

FTP (File Transfer Protocol)

FTP or File Transfer Protocol is a network protocol standardized to make transferring of computer files between a client and a server easier.

G

Geo Targeting

Geo Targeting is an effective way for increasing conversions where content is delivered to audiences based on their geographic locations. It’s effectively used in paid search or social campaign. The location can be a country, state, city and more.

Google AdWords

Google AdWords is an online advertising service made by Google where customers can create and manage ads within the Google universe (on Google Search, Display, YouTube, etc.). If you want to advertise your service or product through AdWords, check out this handy guide from Neil Patel.

Google Analytics

Even if you are entirely new to the digital marketing world, you have most likely heard about Google Analytics already. This analytics service is provided by Google, and it helps you track, analyze, and measure all types of revenues and costs of your website, advertising campaigns, videos, social channels, etc.

H

Hard Bounce

In email marketing, hard bounces are simply emails that were not delivered. This can happen for different reasons: the recipient email address could be wrong or inactive, the recipient might have blocked you or reported your emails as spam etc.

I

Interactive Content

Interactive content is the type of online content that engages audiences in a certain activity. In return, participants get real-type and relevant results. Think of a survey tool or an interactive infographic that captures your attention right from the start.

K

KPI (Key Performance Indicator)

A KPI is a type of performance measurement used to demonstrate how effectively a marketing project, company, or employee is achieving key business objectives. Common KPIs are cost reduction, revenue improvement, or increased customer satisfaction.

L

Lead Generation

In marketing and sales, lead generation is the process of attracting and converting new potential customers in order to drive future sales. For many companies, this is a crucial stage of their sales and marketing strategy

Lead Nurturing

Lead nurturing is a process used in inbound marketing for pushi g leads further in the buying lifecycle by targeting them with contextually-relevant content. This can be done through different channels like email or social media

Lifecycle (Customer Lifecycle)

These are stages used to define the relationship that you have with your potential or existing customers. Common lifecycle stages are Awareness, Evaluation, Purchase, and Retention.

Lookalike Audience

A lookalike audience is a type of custom audience used in social media targeting – popularized by Facebook and LinkedIn. It helps you target audiences with similar characteristics to existing ones. Here’s an example: let’s say you have many people visiting your website. With a Lookalike Audience, you could easily advertise to people similar to your visitors.

LTV (Lifetime Value)

LTV is a useful metric that helps you find out what customer groups are valuable to your business and what total worth they bring during their lifetime. Differently said, it shows the total revenue your business can expect from every single customer.

M

Marketing Automation

Do you want to make your life as a marketer easier by managing and automating all your marketing processes across channels? You’re in luck! This is precisely what marketing automation does.

Martech (Marketing Technology)

Simply put, Martech is a term used to describe the overlap between marketing and technology. Software suites & tech tools used by marketers to drive more marketing impact usually fall under the martech umbrella.

MVP (Minimum Viable Product)

A minimum viable product is a term mostly used in sofware to describe the most basic version of a product that can carry out its desired function.

N

Native Advertising

Native advertising is a popular type of social media advertising where an ad follows the form, function, and feel of the content of the media where it’s placed. Native ads are currently considered more effective in terms of engagement, as they enable marketers to target audiences with content that closely matches their experience.

NPS (Net Promoter Score)

If you’re conducting customer surveys and you’re interested in customer satisfaction, NPS is a handy metric. It helps you find out how likely a customer would be to recommend, on a scale of 0-10, your product, service or company to somebody else.

O

Omnichannel Marketing

Omnichannel Marketing is a cross-channel marketing strategy that focuses on delivering unified experiences – regardless of the touchpoints or devices your customers are using.

Open Rate

Open rate is used in relation to email marketing. Simply put, it’s the value that shows you many recipients have opened your email. Open Rate should not be confused with Total Opens. The latter shows you many times your email has been opened by everyone. This can be done by the same users who have chosen to open your email multiple times.

P

Page Views

Page Views represent all the visitors of your website. Each reload of the webpage by the same visitor counts as a new page view.

Personalization

In the context of marketing, personalization is a popular practice that enables you to tailor user experiences by delivering personalized content to specific users based on behavior and context. This technology typically uses advanced machine learning and automation processes.

Position 0

Position Zero is used in search engine optimization to describe the featured (and desired) snippet of text that shows up in search right before the search results.

Q

QR Code

A QR Code or Quick Response Code is a scannable barcode used to encode data such as text or an URL.

Qualified Lead

In digital marketing, a Qualified Lead is a term used to describe a lead that has shown interest in your brand and is likely to become a new customer based on a specific set of qualification criteria. This can be anything from a guide they have downloaded or a service they have signed up to.

R

Referral Marketing

Referral marketing is the process of promoting products or services to new customers through referrals or recommendations. Compared to traditional online advertising, it’s usually done through word of mouth.

Remarketing

Remarketing is an effective way to reconnect with your website visitors who haven’t achieved a desired action like signing up for a service or buying a product. It enables marketers to target them with new ads that will make them more likely to convert .

ROAS (Return On Advertisement Spending)

After you start using AdWords, you want to see if your advertising is making an impact. This is when you check your ROAS – a calculation of the results (purchases, downloads, page views, etc.) divided by the budget spent on advertising. Contrary to ROI (Return On Investment), ROAS is only operating with the money spent on advertising, cutting down all the other costs in the investment (marketers’ salaries, etc.).

ROI (Return On Investment)

When you put your money and effort into something, you probably want to know what results it’s driving. ROI measures the performance and the efficiency of your investment compared with other investments. ROI is calculated by dividing total revenue by the total cost of investments. In digital marketing, ROI is often substituted for ROAS.

RPC (Revenue Per Click)

You can calculate your RPC like this: Goal Value x Conversion Rate. Voilà, now you know whether your ad (or keyword) is profitable or not!

S

SaaS (Software as a Service)

Google, Dropbox, Salesforce, MailChimp, Shopify – what do they have in common? They are all providing systems as a service. That means that they provide a third-party software solution that hosts a platform for the application and software and makes them readily available to their clients. It is beneficial for companies in the sense that they don’t have to invest in new hardware and software, they can use a third-party solution by paying a subscription fee.

SAINT (Site Catalyst Attribute Import Naming Tool)

Classifications (SAINT) are one of the enduring features of Site Catalyst (Adobe Analytics). In general, classifications (both utm_id and SAINT) are making marketers’ lives easier. SAINT allows users (advertisers) to upload customized metadata within the Site Catalyst, analyze, and process them. By classifying the data, you are attributing them specific characteristics and creating a relationship between a variable (campaign’s source, medium, keyword, etc.) and all the metadata related to it. In other words, the campaign link that is classified can be used to measure all the variables through one link because the analytical tool (Site Catalyst) recognizes the classification and knows what is going on. Without classification, you have to create specific campaign links to measure all the variables separately and manually, which takes time and energy.

SEA (Search Engine Advertising)

Are you longing for that top result in most search engines? You can improve your SEO by paying for it. SEA means that you are buying the top spots in a search engine’s result page. However, your link will have the little “Ad” button or other indication that it is a paid link.

SEM (Search Engine Marketing)

Have you noticed the little yellow boxes that say “ad” next to the top links in a search query? That’s search engine marketing! Because most users select the first options that are shown in search results, businesses pay to get their website linked at the top hoping that people will click their link. This is done through AdWords for Google search results. Other search engines (Bing, Yahoo, etc.) have similar tools.

SEO (Search Engine Optimization)

Do you want to increase organic growth and visibility on the internet? Then you have to polish your SEO game. Through technical (e.g., a correctly structured website that a search engine understands) and creative (using the right keywords, optimized headlines etc.) aspects, well-made SEO improves your chances of appearing among the first results in a search query on Google or other search engines.

Shoppable Posts

If you’re an Ecommerce business and using Instagram, you’ll love Shoppable Posts. They enable you to turn your account into visual stores with the help of product tags. You can add them to your images and link them to your webshop.

Site Catalyst

Formerly known as Omniture, Site Catalyst is an analytical tool that has been part of the Adobe platform since 2009. It allows marketers to measure and analyze data from multiple marketing channels.

Soft Bounce

A Soft Bounce is a term used in email marketing to notify a sender that their email was delivered to the recipient(s), but ‘soft bounced’ back. Common reasons are a full inbox, a heavy email. or an email server that is temporarily down.

T

TOFU (Top of the Funnel)

Nope, this is not the vegan soy-based product. In marketing, TOFU stands for the first stage of the buying funnel. At this point – also called the awareness point, your target audiences are typically wide and have challenges that you can help them solve through helpful content such as guides or best practices. Your messaging has very little to do with the product or service that you are selling.

U

URL (Uniform Resource Locator)

URLs are what we use in the address bar of our browser to tell our browser where to get the information we want (like a specific website). URLs most commonly appear in the form of HTTP or HTTPS protocols, for example, ‘https://accutics.com/’

utm_id

A utm_id is a classification campaign code used for Google Analytics. Classifications make the lives of marketers easier, as it enables them to track their campaign URLs in their analytics platforms.

UTM Parameters

UTM parameters are simply tags that you add to a URL. When someone clicks on a URL with UTM parameters, those tags are sent back to your Google Analytics for tracking purposes. The most common parameters are medium, source, campaign, term, content. However, parameters are versatile and can be customized according to what you want to track. The biggest disadvantage of UTM parameters is the sensitivity towards an ununified system of definition (aka marketers using their own terms, lower- and upper-case letters, special symbols etc.) that might cause data fragmentation.

UV (Unique Visitor)

Unique Visitor stands for a visitor that returns to your website repeatedly in a set period. Contrary to Page View, UV is tied to one visitor, so even if they visit a website ten times (which results in ten page views), the UV still counts as one.

V

Viral Content

Do you remember those funny YouTube videos with tons of views and shares? These are usually described as viral content. In other words, viral content is content that gets really popular really fast – usually by having viewers/ visitors sharing it to others soon after publishing.

Voice Search

Voice search is an increasingly popular technology that allows users to search the web, a website or an app using a voice command.

Top Google Searches and Trending Keywords in 2020

Top Google Searches and Trending Keywords in 2020

Valeria Voitsekhovskaia

Top Google Searches and Trending Keywords in 2020

Ever wondered what people are searching for online or interested to know what questions people frequently ask Google? SEMrush has analyzed more than 20 billion keywords and compiled easy to digest lists to answer your questions. This report contains the latest data insights and trends across The United States, The United Kingdom, Canada, Australia and an overall global search as well:

Top Google Searches

Amongst the top lists, many search terms are related to ‘Not Safe for Work’, so we have excluded them. In case you were wondering – the ‘NSFW’ searches make up an estimated 20% in the top 100 list. If you want to learn more about these keywords, you can simply check the search volume for them in our Keyword Overview tool.

Top online search trends that unfolded throughout the year so far:

  • Who wins the retail battle in the US: Walmart or Ebay?
  • In which country is the Mass Media brand more popular than YouTube?
  • Which country has such a devoted fan base of their national sports team that those searches trump those for Netflix?
  • What are people trying to find nearby more often? Is it food, pizza, restaurant, breakfast or Walmart near me?
  • How many times a month people search for ‘Coronavirus’ in Google?

See all takeaways of the study based on Google search data below. Click the big arrows to switch between countries and small arrows to see the full list within one country.

Search volume is the average number of times a specific search query is entered on a search engine per month. In this table search volume metric is calculated as an average number of monthly searches for the last 12 months.

Trends based on Global data

We split the top 100 global search lists by categories to reveal people’s main interests:

Top 100 Google searches, distribution by topics

The majority of search queries are related to translationsocial networkingentertainmentshoppingweather and news.

Top queries in the ‘social networks’ category show people are on the hunt for ‘Facebook’, ‘Instagram’ and ‘WhatsApp web’. Meanwhile in the ‘entertainment’ category ‘YouTube’ trumps Netflix which is then followed by the online game platform, Roblox.

In the ‘shopping’ category – there is little doubt that across the globe the most popular companies are the big players such as Amazon, Ebay and Walmart. It is interesting to see that fashion label, H&M marks its spot at the 92nd position – keep in mind this is the only fashion brand that appears throughout this entire top 100 list.

When it comes to the ‘News’ category, people seem to have their eye on Cricbuzz – an Indian cricket news website which is the most searched for source of news across the world. Other popular news sources globally are BBC News, Fox News, CNN and German tabloid newspaper Bild.

Another major percentage of Google search queries in the list is related to gamblingtravelingfinance, and sport – the main areas of attraction for people in this day and age in the online world.

One specific word that has certainly created a ripple effect on each and every single person’s life in one way or another during the year of 2020 – ‘coronavirus’, was searched more than 60 million times per month in 2020, being the one and only uncategorized trending topic in the top 100 list.

The most interesting ‘top searched for’ results from across the globe:

US

  • Most popular news sources: Fox News, CNN, ESPN
  • Most popular retailers: Amazon, Walmart, Ebay
  • Most popular streaming platforms: Amazon Prime, Netflix, Hulu
  • Most popular food chains: Domino’s, Pizza Hut, McDonald’s

UK

  • Most popular news sources: BBC News, Daily Mail, Sky News
  • Most popular retailers: Amazon, Ebay, Argos
  • Most popular football clubs: Arsenal, Liverpool, Manchester United
  • Most popular fashion brands: Next, Asos, Marks & Spencer

CA

  • Most popular news sources: CBC News, CNN, CP24
  • Most popular retailers: Amazon, Canadian Tire, Walmart
  • Most popular sports leagues: NBA, NHL, NFL
  • Most popular banking & finance companies: RBC Royal Bank, AccèsD, TD Bank

AU

  • Most popular news sources: ABC News, Sydney Morning Herald, NineMSN
  • Most popular retailers: Ebay, Kmart, Big W
  • Most popular sports leagues: NBA, AFL, NRL
  • Most popular banking & finance companies: NetBank, Westpac, ANZ

The most frequently asked questions in Google across the globe

When it comes to the most frequently asked questions across the globe, the most commonly asked ones cover a huge range of topics:

  • What is my IP?
  • What time is it?
  • How to tie a tie?
  • Where am I?
  • How many weeks in a year?
  • How to screenshot on Mac?

Apart from some of the more obvious questions, we indeed found some unexpected results. Some may leave you guessing but others may see you googling the exact same thing to see the answer for yourself:

  • Why were cornflakes invented?
  • What does SMH mean?
  • How to make hand sanitizer?
  • How old is Danielle Cohn?
  • What is pansexual?
  • How did Cameron Boyce die?
  • How tall is Peppa Pig?

Another interesting query to note and one that is still trending from 2019 across all countries is ‘What is Keto diet’ – with over 280,000 searches globally. We also noticed a shift in behaviors as people moved away from weight watching to health and safety obsessing. ‘What is Coronavirus?’ is in the top list of questions, being asked in Google more than 300,000 times each month.


Top trending keywords in 2020

The next step was to explore how the circumstances of the year 2020 changed the wider public’s main areas of interest. Here are the keywords with the highest increase in searches this year, that reflect new trends of this year so far.

The top list is sorted out by the growth rate of the monthly search volume: the highest search volume of the keyword in the current year divided by the lowest search volume the keyword had in the current year. Only the keywords which have a minimum search volume of over 0 were analyzed in this case.

The most trending topics

Globally

‘Dalgoona coffee‘ – the homemade coffee prepared from instant coffee, sugar, water and milk, which looks like the coffee from the best coffee house which quickly became a hit on Instagram, – is the most trending keyword globally.

US

When President Donald Trump signed the CARES act, Google searches for the keyword ‘Stimulus check’ exceeded 20 million searches per month, and became the most trending keyword in the U.S. in 2020 and still is so far.

UK

The topic which concerned Brits and other people in the UK the most was the ‘UK lockdown’ – hitting newspapers’ headlines in March 2020 as well as the search engine being asked many questions about the new lockdown reality.

Canada

The Canadian government introduced the CERB (the Canada Emergency Response Benefit) to the employed or self-employed who were impacted greatly by the COVID-19 pandemic and as a result, searches for CERB have increased dramatically – by over 500,000% in 2020.

Australia

The hit Netflix drama documentary the ‘Tiger King’, certainly influenced the number of searches for Carole Baskin in Australia with the highest increase of over 300,000% among all other trending keywords.


New search terms in 2020

When diving deeper into the search trends of 2020 several popular terms that are brand new were revealed, with no previously existing online searches ever recorded:

The top list is sorted out by the search volume of the newly appeared keywords in 2020

Such keywords mark momentous new occasions, many of which became viral. Disney’s ‘Tangled’ which dated back to 2010 suddenly became popular again because the name of the kingdom was called Corona. Another trending story – about Jamal Murray, a professional basketball player, who made his 50-points game in the NBA playoffs becoming the player of scoring 50 points twice in a playoff round along with huge basketball stars like Michael Jordan and Allen Iverson. Conversations were sparked about the tragedy of Gabriel Fernandez after the Netflix docuseries unraveled his story in February 2020. Searches for quarantine memes to cheer friends, family and colleagues up, spiked during times of uncertainty, as well as ‘flatten the curve’ search query which also drew a lot of online attention in 2020.


Final words

There are lots of doubts that surveys are valid anymore because when people answer them, they want to look good and so they’re not truthful. The only place where people are as precise as possible is Google or search. That’s the only place where people don’t lie. People will only be honest when they search. That is what companies have to understand and embrace and be attentive to what people are searching.

 

Internal Links: A Guide to Building a Strategy that Works

Internal Links: A Guide to Building a Strategy that Works

83
Luke Harsel

This post is in English

Internal Links Guide

Internal links are arguably one of the most neglected link building tactics in SEO marketing.

We are all quick to turn to tactics that will help us build external links (backlinks), but we often underestimate the impact of developing an optimized internal linking strategy.

What is internal linking?

Internal links are those that point from one page to another on your site. External links, by contrast, are ones that point to a page on another domain.

For example, a link to the SEMrush Features page from this article is an internal link, and a link to Google’s Keyword Planner tool is an external link.

We can become so focused on building natural links from external sources that we neglect internal improvements. It is an area of SEO in which mistakes are often made, so let’s take a look at how you can avoid the pitfalls to build a robust strategy that works for you.

Here is what we will cover: 

Understanding the Importance of Internal Links for SEO

Do internal links help SEO? The short answer is ‘yes’.

If you want to leverage internal linking to have a real impact on your SEO, though, you need to dig a bit deeper to know why it matters.

We can break its benefits down into three main points:

1. Internal Links Help Search Engines Understand Your Site’s Structure

A solid internal linking structure SEO-wise can help search engines find and index the pages on your site.

In Google’s own words:

“Some pages are known because Google has already crawled them before. Other pages are discovered when Google follows a link from a known page to a new page.”

Using optimized internal links is a surefire way of allowing Google to regularly discover relevant content on your site. An additional benefit here is that internal links can help to demonstrate the contextual relationship between two pages.

When you use internal links correctly, it sends a signal that page a is related to page b. This can be a great way to illustrate your expertise if you have a wealth of authoritative content to weave together.

If you don’t show Google how your content is connected, your users won’t make the connections either. Later, we will walk through how to approach this strategically for the good of your Organic performance.

2. Internal Links Pass Authority

The right internal linking strategy helps to pass authority between pages on your site and ultimately improve rankings.

This is determined by an algorithm known as PageRank (PR), which assesses the quality and importance (or the authority) of individual pages and applies a value to it. Interlinking is, of course, taken into account.

Google officially killed the PageRank Toolbar in 2016 and stopped updating the public-facing scores many years beforehand.

It is still, however, very much part of the ranking algorithm, so understanding how it works helps to map out a solid internal linking strategy. If page a, for instance, has authoritative external links pointing to it, it will have built up a PageRank score. This authority can then be passed to page b by way of internal links.

Identifying these kinds of ‘power pages’ can help you make the most of the authority coming into your site to improve rankings – we’ll look into this later, too.

3. Internal Links Help Users to Navigate Between Relevant Pages

Internal linking is also a great way to improve your user experience (UX) by helping your visitors find more interesting content.

This might entail taking a user to a product page where they can buy something that’s mentioned in a buying guide, or to another piece of content to expand on a certain topic.

From increasing average time-on-site to nudging users down the paths to purchase, internal links can be leveraged to improve your UX and, in turn, your overall search performance.

Understanding the Different Types of Internal Links

There are two main types of internal links: navigational and contextual. Let’s look at both.

Navigational Internal Links

Navigational links typically make up a website’s main navigational structure. They are often implemented site-wide and serve the primary purpose of helping users find what they want.

You will find them in the main menu of a site:

Boohoo's Navigation Menu

Or in a site’s footer:

Motors Footer Links

Or, in Amazon’s case, in a sidebar:

Amazon sidebar

They are there to make customer journeys as straightforward as possible.

Contextual Internal Links

Contextual internal links are typically placed within the main body content of a page.

An e-commerce store, for example, might include links like this:

Contextual internal linking

The links within the text pointing to other relevant pages are known as contextual internal links.

In our guide to keyword research, you will see links to relevant pages within the body copy:

Contextual internal links within Body Copy

Pay attention to how prominent and ultimately clickable your contextual links are and how intuitive your navigational links are to deliver the most value for your site.

A clear and obvious contextual internal link with natural anchor text, for example, can simultaneously show relevance between pages and pass PageRank if the source page has authority.

An understanding of the functions of these different types of links and how they appear to users can help you get the most out of your internal linking strategy.

How to Audit Your Site’s Existing Internal Links

There is a very good chance unless you are working on a completely new website, that there is at least some degree of internal linking already in place, even if it lacks strategic thinking.

You need to know where you stand before you make key decisions on your new internal linking strategy.

To do this, head over to the SEMrush Site Audit tool and enter your domain:

SEMrush Site Audit tool

One of the Thematic Reports available through the Site Audit tool is the Internal Linking report:

SEMrush Site Audit Overview

This delivers the insights needed to quickly and easily audit your internal linking status before you start planning a full strategy.

SEMrush Internal Linking Report

It is categorized into five main sections:

  • Pages Crawl Depth: You can gain insights into the crawl depth of your site here (Note: your site’s most important pages should be reachable within three clicks of the homepage).
  • Internal Links: Here, you will see how many pages are receiving internal links, as well as how many are internally linking to others. You will also be able to identify any orphan pages.
  • Internal Link Distribution: You can identify the pages that have a weak Internal LinkRank (ILR) here so you can find out why.
  • Internal Link Issues: You will see any issues (broken down as errors, warnings, or notices) relating to internal links reported here.
  • Pages passing most Internal LinkRank: Here, you can quickly see a list of pages that have the most influence on the other pages (ILR). This can help you identify the most authoritative pages on your site.

The report is designed to give you insights into your current internal linking structure so you can plan a robust strategy.

Common Internal Link Problems

A vital part of this is understanding what the common issues are and how you can fix them. Here are some of the most frequent problems in this regard:

Broken Internal Links

  • The Problem: Broken internal links result in both users and search engine crawlers being sent to non-existent web pages, usually resulting in 404 errors, which is not ideal for communicating authority.
  • How to Fix: Either remove or replace the link with one that points to a live page to resolve it.

Links Couldn’t be Crawled

  • The Problem: This error occurs when the format of a URL is incorrect. For example, it might contain unnecessary characters.
  • How to Fix: Check the links reported as errors and fix formatting issues as necessary.

Too Much On-page Internal Linking

  • The Problem: When a page contains more than 3,000 links, it will be flagged in the Site Audit report. There is no specific rule on how many on-page links Google will crawl these days, but webmasters need to be mindful of overloading pages from a usability perspective.
  • How to Fix: Audit any pages that are found to contain more than 3,000 links and remove those that are surplus to requirements.

Nofollow Attributes in Outgoing Internal Links

  • The Problem: The rel=“nofollow” attribute in links on certain pages is restricting Googlebot’s flow through your site.
  • How to Fix: Remove the rel=“nofollow” attribute from any internal links flagged in the report. This may be set site-wide or on a link-by-link basis – check with your developer if necessary.

Orphaned Sitemap Pages

  • The Problem: An orphaned page is one that is not linked to at all from any other page on your site, which means it can’t be accessed in a crawl and can’t be indexed.
  • How to Fix: If an orphaned page could be valuable, include it in your internal linking strategy. If it should not exist or be ranked by search engines, consider either removing it, or adding a “noindex” tag.

Page Crawl Depth of More Than Three Clicks

  • The Problem: Some important pages take too many clicks for users to reach, which indicates to search engines that they are not that important.
  • How to Fix: Work out where you can lose certain clicks to help users get to the content they want quicker.

Pages with Only One Internal Link

  • The Problem: Solitary internal links can mean missed opportunities in both SEO and UX. As we’ve discussed above, you should be internally linking to key pages from other relevant content as much as it’s naturally possible to do so.
  • How to Fix: Identify other relevant pages to link to as part of your internal linking strategy.

Permanent Redirects

  • The Problem: Passing internal links through permanent redirects can reduce your crawl budget, especially for larger sites.
  • How to Fix: Update internal links to send users and search engines directly to the destination page (don’t remove the redirect, though, if it is still attracting traffic from other sources).

The main Site Audit report also includes insights that will help you improve your site’s internal linking structure:

Redirect Chains and Loops

  • The Problem: Internal links that trigger redirect chains and loops are difficult for search engines to crawl. They also create a poor UX.
  • How to Fix: As above, update internal links so they point to the correct live page. Additionally, remove intermediary redirects in a chain (update the redirect to go from the origin page to the end of the redirect path) or find the cause of loops.

Links on HTTPS Pages Lead to HTTP pages

  • The Problem: URLs that mistakenly point to HTTP pages on secure sites can cause unnecessary redirects.
  • How to Fix: Manually update any HTTP links to point to HTTPS pages if it is on a small scale; ask your developer for help if it is site-wide.

How to Build Your Internal Linking Strategy

Your audit will show you where you can resolve existing issues with internal linking. Your strategy will help you build on that to deliver business-changing results with your website.

Let’s take a look at how you can achieve this.

Step 1: Identifying Your Site’s Hub Pages

Your internal linking strategy starts with making a list of the hub pages that will help you build out what are known as topic clusters for a better understanding of your site architecture.

Hub pages often target broad keywords with high search volumes, rather than more specific long-tail keywords that receive fewer monthly searches.

They’re also often the ones that drive the most valuable traffic to you as a business, which means they will typically target your main keywords with the best content.

As an example, AO.com’s washing machines category could be considered one of its most important pages:

AO.com Washing Machines Category

It targets a broad keyword (‘washing machine’) with a monthly search volume of 246,000 in the UK alone.

What’s more, as you can see from the navigation, is that it also functions as a key top-level category page with subcategories for brands and products underneath it.

Ranking for this search term could have huge commercial potential in this industry, so, on the surface of things, it’s an important one.

The most important pages on your own site will be the ones you have optimized for your main keywords, whether they’re categories, products, services, or simply great examples of informational content.

If a page’s target keywords have value to you, you need to be considering this in your internal linking strategy.

We have highlighted an e-commerce example above, so we’ve added some other sites below to get you thinking about your own key pages.

HubSpot’s “Free CRM” page:

Hubspot’s Free CRM

Ultimate Performance’s gym location pages:

Ultimate Performance Los Angeles Location Page

Or even this brand’s car finance page:

ChooseMyCar Car Finance Page

If a page is important to you as a business, it is likely to be important for SEO and UX, too.

Compile yourself a list of your most important pages, unless you have already identified them via the likes of keyword research and content strategy development.

Expert Tip: According to Siege Media,

“a good sniff test here is — if you’re trying to get the page you’re working on to rank for a long-tail keyword, it’s not a hub page. If the page you’re working on explores a very narrow topic in great depth, it’s not a hub page. If the page you’re working on touches on many aspects of a broad topic, it’s probably a hub page.”

Don’t fall into the trap of identifying too many hub pages as these will end up being too niche.

Plan your hubs and topic clusters carefully or you will struggle to identify supporting content.

Step 2: Creating Topic Clusters Using Internal Links

An internal linking project that maps out topic clusters of relevant pages (and not just the associated keywords) is a fantastic way to generate positive results.

Topic clusters should start with the main hub page of the silo, as you have just identified.

This is usually the main page for a particular topic. Any related pages will act as the supporting content to add depth to the topic.

These pages need to internally link back to the hub page to showcase topical relevance and indicate that the main page is the most authoritative source.

Here’s a visualization of the concept from Matthew Barby at HubSpot:

Topic Clusters

You can start mapping out your topic clusters at this stage by taking your hub pages and building out a list of relevant supporting pages.

A simple way to do this is to build out a spreadsheet for each topic cluster, as in the example here:

Topic Cluster Plan

Take note of how there can be different levels of related pages for certain types of sites. Once you have filled this out for yourself, you can build your topic cluster through internal linking.

There is a common misconception that the only way to create a topic cluster or silo is to follow URL paths like this:

  • yoursite.com/topic/
  • yoursite.com/topic/supporting-page-1/
  • yoursite.com/topic/supporting-page-2/

While this does work and is often the preferred way to structure a silo, you can still achieve a topic cluster without following this URL structure.

Here is how:

Step 1: Start with your hub page and begin internally linking down the silo to key pages.

Look out for contextual links like the one to the ‘car finance for bad credit’ page here:

An Example of Contextual Links

Or navigational links like the ones pointing to each of the models on the ‘used Ford cars’ page here:

An Example of Navigational Links

Step 2: Continue linking further down the silo from these relevant pages within the hub.

In this example, you will see that the ‘car finance for bad credit’ page links further down the silo to ‘CCJ car finance’ and ‘IVA car finance’.

These are contextual links that naturally make sense within the flow of the page. Take note of these as you build your own topic cluster.

Hub page internal linking

Step 3: Work back up the silo from these pages if they link to those above and to the main hub page.

Again, working through the same example here, we see that the ‘CCJ car finance’ page links back up to the ‘bad credit car finance’ page:

CCJ Car Finance Internal Links Example

As well as up to the main ‘car finance’ hub page:

CCJ Car Finance Internal Links Second Example

It might also make sense to employ some cross-linking between pages on the same level of a topic cluster.

Here, we see the ‘CCJ’ page cross-linking to the ‘IVA’ page. They’re both different types of bad credit problems, so it’s possible to showcase the connection in context while also helping users with navigation:

CCJ-IVA cross-linking

What you are doing at this stage is building out topic clusters to ensure the related pages all link to each other in the most appropriate directions.

This can have positive impacts on both SEO and UX.

Once you have completed these first two steps, you will understand how to check internal links and be able to map out how you will use them to create topic clusters.

Expert Tip: Run a content audit to identify opportunities to improve your supporting pages and further strengthen your topic clusters.

Step 3: Choosing the Right Anchor Text

The next part of the strategy involves choosing the right anchor text for your internal links.

A common question here is whether or not you should always use your main target keyword as the internal link anchor text.

In truth, you won’t be penalized for using exact-match anchor text for internal links.

When it comes to external links, of course, manipulating anchor texts in this way is a violation of Google’s webmaster guidelines, but the same doesn’t apply for your internal linking strategy.

There are a few things to consider here for the best results:

  • Variety: Even though you are not going to be penalized if you only ever link in one way, it is not natural. Try to diversify your anchor texts where possible, but not so much that it detracts from your efforts to optimize for certain keywords.
  • Length: Using longer-tail variants of your keywords could help to boost the rankings for that specific term for your target page, so long as it’s written in a way in which people genuinely search.
  • Relevance: Never force an exact-match anchor text internal link into a piece of content. Look for natural opportunities to place it without losing relevance.

Andy Drinkwater gave a good summary of this when he appeared on our Show Me The Links! Internal Links webinar:

“With the anchor texts, you need to make sure that they make sense to the pages that they’re pointing to. That’s the whole idea about them. If you have got an anchor text and you are just using the same one over and over again, you might think that the signal is a positive one. But it’s not. You want a variance in there. So you might want to use four or five different variants of that particular anchor text.”

Take the time to carefully plan how you are going to use the anchor text of internal links to your advantage. It is an effective way to indicate the topical relevance and the contextual connection between two pages.

A little thought at this stage goes a long way towards seeing a positive impact on your customer journeys.

You have got full control of the anchor text used on every internal link on your site, so be sure to use it in a way that properly indicates the topics of the target pages.

Expert Tip: Use Google Search Console’s performance report to find long-tail keywords that your pages are receiving impressions for, despite not ranking in top positions. Update the anchor text of the appropriate internal links to reflect the search terms and you might see some small gains.

Step 4: Identifying Your Site’s Authority Pages

Now that we’ve established a process for topic clusters, it’s time to move onto how you can leverage any existing authority within your site.

Some pages ultimately have more authority than others and you can use them to your advantage.

Your most authoritative pages will have links pointing to them from external sources (remember that it’s not about the number of links, of course, but the quality).

It’s possible to strategically pass this link equity through to other pages via internal links.

SEMrush’s Backlink Analytics tool will allow you to find these pages so you can start building a list of tactics to potentially repeat across the site where appropriate.

SEMrush Backlink Analytics

Run your domain through the tool and you will be served a list of indexed URLs, which can then be sorted by the number of referring domains:

SEMrush Indexed Pages

Sorting in this way is preferred over the number of backlinks, as it gives a better indication of the authority of a page.

You can easily export these results as .csv or .xls files. You can also utilize the Site Audit’s Crawled Pages insights with a filter to show the pages with the strongest ILR for further investigation:

SEMrush Crawled Pages

Step 5: Using Internal Links to Increase the Ranking of Target Pages

Once you have identified these, you can use your site’s authority pages to improve the rankings of others.

This part of the strategy can be as simple as working through your most authoritative pages and identifying opportunities to pass link authority onto others where appropriate.

If you are working with a site that has earned a high number of good quality links, this can be pretty straightforward.

All you need to do is work through the pages with the most valuable links and identify relevant opportunities to link to your most important pages or those which need a boost in rankings.

Expert Tip: If any of the authority pages you have identified don’t contain related content, don’t link to them. Create that content from scratch instead, if it makes sense to do so as part of your wider content strategy.

Step 6: Using Internal Links to Optimize Fresh Content

If you are working with a site that has not earned a lot of links, you can approach this initially from the point of view of optimizing fresh content instead.

This will mean consulting a list of authoritative pages to identify opportunities for relevant interlinking to benefit your search performance.

One way to do this is to perform a few Google searches with the keywords used in your new piece of content to find other related pages to link to on your site.

For instance, we might search for ‘site:semrush.com internal links’ to find other articles related to this guide and add reciprocal links where appropriate to benefit from any existing authority they might have gained:

site: advanced search operator

These approaches can help to boost your internal linking by ensuring more pages benefit from shared authority.

Expert Tip: Aim to point at least two or three internal links to every new piece of content. These should come from an authority page as well as from those within the relevant topic cluster.

Bonus Step: Maximizing the Impact of Digital PR Campaigns with Internal Links

If creating engaging assets to earn external links is part of your overall marketing mix, you can use them to improve your internal linking, too.

Consider how you can use your campaign landing pages to pass authority to other related pages on your site.

This might entail basic navigational links or more contextual links within the body copy to improve SEO and UX.

An example campaign from GoCompare reveals a missed opportunity for a contextual internal link to point to the ‘car insurance’ page:

GoCompare Digital PR campaign

It pays to be mindful of this when you are creating your internal linking strategy.

Direct collaboration with your digital PR campaigns can deliver benefits that your competitors might not have even considered.

Creating a Simple Strategy that Works

A solid internal linking strategy can help your content rank higher on Google, whether it is new or old.

It doesn’t need to be an overly complex approach either, since, unlike earning external links, you are in full control of every step of the process.

With the right data, tools, and planning, you can intuitively roll out a quick strategy that can have big results.

SEMrush

SEMrush emploLuke Harsel

9 SEO Best Practices That You Should Follow in 2020

9 SEO Best Practices That You Should Follow in 2020

98
Sandeep Mallya

 

SEO Best Practices

Here is the harsh truth, if you are not ranking in Google’s top 10 results for your target keywords, your website might as well be invisible on Google.

According to HubSpot, 75% of searchers never go past the first page of search results — this is why it is so essential to rank on the first page of Google.

There are several strategies and techniques you can follow to rank higher on Google, but if you don’t get the basics right, your chances of ranking on page 1 of Google are minimal.

By following SEO best practices, you will be laying the groundwork for your site to increase its visibility in search. Once you have laid the groundwork, you can move on to more advanced keyword research and link building strategies.

In this article, I will be sharing the 9 SEO best practices that you should follow to achieve higher search rankings in 2020.

Let’s get started.

1. Align Your Content with Search Intent

Search intent (also called “user intent”) is the purpose behind every search query. Understanding and satisfying search intent is Google’s ultimate priority. Pages that rank on the first page of Google have all passed Google’s litmus test on search intent.

For instance, take a look at the search results for “how to make oatmeal cookies.”

Search Intent Example - Informational Intent

The top search results are blog posts or videos, not eCommerce pages selling oatmeal cookies. Google understands that people who are giving this specific search are looking to learn, not to buy.

On the other hand, top search results for a query like “buy oatmeal cookies” are eCommerce pages. Because in this case, Google understands that people are in buy mode. Therefore, the top results don’t include links to oatmeal cookie recipes.

Search Intent Example - Transactional Intent

For that reason, if you would like to rank your pages on page 1 of Google in 2020, you need to understand the concept of search intent and create content that aligns with user intent.

There are four common types of search intent:

  1. Informational: A search falls under informational intent when the user is looking for specific information. It can be a simple search like “what’s the weather today?” that provides instant results or something complex like “best SEO strategies” that requires a more in-depth explanation.
  2. Navigational: In this case, the searcher is looking for a specific website or app. Common examples of navigational searches include “Facebook login,” “SEMrush,” and “Amazon.”
  3. Commercial: The intent behind a search is commercial when the user is looking for a specific product but hasn’t made the final decision yet. For example, searches such as “best SEO tools” and “best DSLR cameras” are all commercial searches.
  4. Transactional: Here, the intent is to buy. The searcher has already made a decision to buy a specific product or tool. Examples include searches such as “buy Nikon d500,” “buy Macbook Air,” and “buy groceries online.”

An SEO best practice is to always keep the search intent in mind while creating content for your website.

For instance, if you would like to rank for the keywords “best DSLR cameras,” you need to realize that the search intent here is commercial, not transactional. The user is still undecided on which DSLR brand to choose.

There is no point in optimizing your DSLR landing page with those specific keywords. Google understands what users want when the search query is “best DSLR cameras.” They are looking for options. They are looking for a blog post or video which lists down the best DSLR cameras, not product pages or eCommerce pages.

Bottom line: Create content that aligns with the search intent of your target audience.

2. Write a Compelling Title Tag and Meta Description

Your page title and meta description are two of the most important meta tags on your page. Let’s cover title tags first.

Title Tags

Title tags are clickable headlines that appear in search results and are extremely critical from an SEO perspective.

According to Google:

“Titles are critical to giving users a quick insight into the content of a result and why it’s relevant to their query. It’s often the primary piece of information used to decide which result to click on, so it’s important to use high-quality titles on your web pages.”

Search engines like Google typically display the first 50-60 characters of a title. Google will display the full title to your page as long as you keep your title tag under 60 characters.

Here are some other best practices to keep in mind while creating title tags:

  • Include your target keywords.
  • Write a title that matches search intent.
  • Avoid creating duplicate title tags.
  • Avoid keyword stuffing.
  • Keep it descriptive but concise.

Meta Descriptions

The second most important meta tag on a page is the meta description. A meta description is a brief summary of a page in SERPs it displayed below the title tag.

Example of title tag and meta description

Meta descriptions do not directly impact search rankings, but they can influence click-through rates.

Google explains it best:

“A meta description tag should generally inform and interest users with a short, relevant summary of what a particular page is about. They are like a pitch that convince the user that the page is exactly what they’re looking for.”

Google typically truncates meta descriptions to 155–160 characters, so make sure you provide an accurate summary of your content while keeping it under 160 characters.

Here are some best practices to follow while writing your meta descriptions:

  • Write unique meta descriptions for each page.
  • Use action-oriented copy.
  • Include your target keywords.
  • Match search intent.
  • Provide an accurate summary.

3. Optimize Your Images

Images play a crucial role in improving the user experience of visitors on your site. Chances are you spend a lot of time selecting the right images to enhance your blog posts, product pages, and other important pages on your site.

But do you spend an equal amount of time optimizing the images on your site? When used the right way, images can contribute to your site’s overall SEO and boost organic traffic. Below are four things you can do to optimize your images.

Choose the Best File Format

Site speed is an important ranking signal, and images are often the largest contributor to overall page size. As a result, you need to optimize images for speed in order to improve the overall performance of your site. The first step involved in optimizing images is picking the best file format, so let’s look at JPEG vs. PNG. vs. WebP.

The most commonly used image formats on the web are JPEG and PNG. Both of these formats use different compression techniques, which is why the file sizes between these two can be dramatically different.

Showing JPEG vs PNG - image optimization best practices

Looking at the difference in file sizes above, it would be easy to declare JPEG as the clear winner. But it would be a mistake to use JPEG as the de facto image format for your site.

While JPEGs look great for photographs (as seen in the Panda image above), PNGs are best suited for images that contain text, line drawings, etc. This illustration by Digital Inspiration proves my point.

JPEG vs PNG

WebP is another option, which Google breaks down here. They state, “WebP is a modern image format that provides superior lossless and lossy compression for images on the web.

  • WebP lossless images are 26% smaller in size compared to PNGs.
  • WebP lossy images are 25-34% smaller than comparable JPEG images at equivalent SSIM quality index.”

Learn more about how to use WebP in this Google guide.

Compress Your Images

The larger your image file size, the longer it takes the web page to load, which is why it is imperative that you compress your images before uploading them on your site.

Luckily, there are several free tools out there that can help you compress your images.

  • TinyPNG: TinyPNG uses smart lossy compression techniques to reduce the file size of your PNG and JPEG files.
  • ImageOptim: If you’re a Mac user, you can download and use this free tool for all your image compression needs. ImageOption is a tool recommended by Google as well. It’s by far the best tool for compressing JPEGs, but not for PNGs. For compressing PNGs, you’re better off using TinyPNG.
  • ShortPixel: If you run your site on WordPress, you can install this plugin to compress your images. ShortPixel’s free plan allows you to compress 100 images per month.

Provide Alt Text for Images

Despite advances in Google’s abilities to understand images, adding alt text to images is still a necessary step. Adding alt text to images improves web accessibility and helps browsers better understand the images on your site.

Here is what Google says about writing alt text:

“When choosing alt text, focus on creating useful, information-rich content that uses keywords appropriately and is in context of the content of the page.

Avoid filling alt attributes with keywords (keyword stuffing) as it results in a negative user experience and may cause your site to be seen as spam.”

When writing alt text for images, be concise in your description, and avoid stuffing your target keywords.

Lazy-Load Your Images

Lazy loading is a technique that defers the loading of non-critical resources (images, videos, etc.) at page load time. Instead, images and videos are loaded only when users need them.

Here is how Google explains the link between lazy loading and site performance:

“When we lazy load images and video, we reduce initial page load time, initial page weight, and system resource usage, all of which have positive impacts on performance.”

Learn more in Google’s resource guide for lazy-loading images and videos.

To lazy load your images and videos on WordPress, you can use the free a3 Lazy Load plugin.

4. Optimize Your Page Speed

If your site takes a long time to load, you are going to have a lot of frustrated users, and your rankings will drop.

There are several free tools that can help you check your page speed, including Google’s very own PageSpeed Insights; you can learn how to improve your Google PageSpeed Insights score here on SEMrush.

The tool I recommend for this task is GTMetrix. This free tool provides insights on your page speed and gives recommendations on the steps you can take to improve your load time.

You can also use SEMrush to perform a site audit and fix all the performance issues with your site. Here is how:

  • Login to your SEMrush dashboard and navigate to Projects > Add New Project > Enter your domain.
  • Enter all the details here and hit “Start Site Audit.”
  • Within a few seconds, SEMrush will generate an audit report showing all the on-site errors you need to fix to improve the overall SEO health of your site.
  • From the audit report, navigate to Site Performance and click on the “View details” button.

SEMrush Site Audit Report data


Now you can view all the performance issues on your site that are preventing it from loading faster and take steps to fix them.

SEMrush Site Audit Report showing Performance Issues

A quick and easy win in improving your page speed would be to compress your images (see #3).

In addition to image compression, here are some other things you can do to help your pages load faster:

  • Enable browser caching.
  • Delete unnecessary plugins.
  • Reduce server response time.
  • Reduce the number of redirects.
  • Minify CSS and JavaScript files.

5. Use Internal Linking

Internal links are important because they establish an information hierarchy for your website and also help Google get a deeper understanding of the content on your page. Internal links can significantly boost your rankings when used the right way.

Case in point: NinjaOutreach boosted their organic traffic by 40% by optimizing internal links.

An SEO best practice is to add internal links from top-ranking pages on your site to pages that need a boost.

You can also use SEMrush to identify and fix internal linking errors on your website. The Internal Linking Report within SEMrush’s Site Audit tool can be extremely useful in identifying problems with your site’s internal link structure.

  • Run a site audit for your site on SEMrush to generate an audit report.
  • Navigate to Internal Linking and click on the “View details” button.

SEMrush Site Audit Report showing Internal Linking data

Now you can view all the internal linking issues on your site and go about fixing them.

Internal Link Issues displayed in the SEMrush Audit Report

Wondering how to cover the cost of SEO tools? Check out How Your Agency or Brand Can Afford SEO Tools.

6. Improve the User Experience on Your Website

Google keeps a close eye on how users behave with your content. As such, user experience is one of the key factors in improving your search rankings.

Page speed plays a vital role in improving the user experience of visitors on your site (see #4).

Here are a few other tips to ensure that users have a good experience when they visit your site:

  • Use subheadings: Proper use of subheadings (H1, H2, H3) helps Google understand your content better and makes your text more accessible to readers.
  • Make your content visually appealing: Several studies indicate that visuals help people understand your content better. Use relevant images, videos, and screenshots to illustrate your points.
  • Avoid using intrusive popups: Popups are not just bad from an SEO perspective, but they also end up annoying your visitors. Since 2017, Google has been penalizing sites that use intrusive popups. So use popups sparingly. If it is absolutely necessary for you to use them to grow your email list, use exit-intent popups, or display them to users who have spent at least 5 minutes on your site.
  • Use white space: White space is a fundamental aspect of good design. According to Crazy Egg, white space between paragraphs and in the left and right margins increases comprehension by 20%. So consider using white space to make your content more legible and grab user attention.

7. Include Keywords in Your URL

URL structure is an often overlooked aspect of SEO. A good URL structure provides both users and search engines an idea of what the destination page is all about.

Google explains it best:

“A site’s URL structure should be as simple as possible. Consider organizing your content so that URLs are constructed logically and in a manner that is most intelligible to humans (when possible, readable words rather than long ID numbers).”

With that in mind, here is how you can create a well-structured URL:

  • Use short URLs: A study conducted by Backlinko found that short URLs tend to outperform long URLs in SERPs.
  • Use keyword-rich URLs: Always include your target keywords in the URL to increase your chances of ranking better in search results.
  • Remove unnecessary stop words: To make your URL look clean and succinct, consider removing stop words.

8. Focus on Getting More Authoritative Backlinks

Despite several changes to Google’s search algorithm and ranking system, Google still considers backlinks to be a key ranking signal. Google recognizes backlinks as votes of confidence.

If your web pages have a high number of backlinks, it increases your chances of ranking higher in search results. As a result, it is important that you focus on building backlinks for your website.

That said, not all backlinks are created equal. Some backlinks can boost your ranking for specific search queries exponentially, while others can derail your rankings, which is why you should prioritize authoritative backlinks over other types of backlinks.

You should focus all your efforts on building high-quality backlinks that can improve your chances of ranking higher for your target keywords. One of the most effective ways to obtain authoritative backlinks is by replicating your competitors’ link building strategies.


You can use SEMrush’s Backlink Gap Tool to analyze the backlink profiles of up to five competitors to unravel untapped link building opportunities.

To get started:

  • Navigate to Gap Analysis —> Backlink Gap.
  • Enter your domain as well as four of your top competitors’ domains, and hit “Find prospects.”

The Backlink Gap tool will return a graph and a table depicting the comparison between the five domains’ backlink profiles. The graph provides a quick glimpse at the most recent link building activities of your competitors.

To identify link building opportunities for your site, you need to select your domain in the drop-down menu just above the table.

SEMrush Backlink Gap Tool data

This list will include the websites that are linking to your competitors’ domains, but not yours. Armed with this knowledge, you can kickstart a campaign to steal your competitors’ most authoritative backlinks.

9. Publish Long-Form Content

Here is the truth, long-form content ranks better on Google. This claim is backed by several studies, including the most recent SEMrush study on top-performing articles.

A key finding in the research suggested that long-form articles (posts with 3000+ words) get 3x more traffic, 4x more shares, and 3.5x more backlinks than articles of average length (901-1200 words).

SEMrush Study - Content Length

Long story short, there is a strong correlation between content length and search performance.

For that reason, you should aim at publishing 1-2 thoroughly researched, long-form articles that include helpful information to Google users. Google wants you to focus on the needs of the user over SEO, and it is the best way to keep readers and convert. However, we all know SEO is important as well.

When creating long-form content on your blog, target keywords that strike a good balance between search volume and keyword difficulty.

Long-tail keywords tend to have low search volume, but in some cases, they could help reach the customers you need. If the search volume is just too low, aim for mid-tail keywords with low to medium keyword difficulty.

You can use SEMrush to determine the keyword difficulty score of all the keywords you would like to use in your content.

  • Enter your keyword(s) in the SEMrush search bar and hit the “Search” button.
  • The Keyword Overview report will provide key data, including total search volume, keyword difficulty score, and more.

SEMrush Keyword Overview Report example

You can scroll down to see keyword variations, questions, and related keywords. Click the “View all” button under each of these sections to see different variations of your seed keyword(s) alongside useful keyword metrics.

SEMrush Keyword Overview variations, questions and related keywords report

With the help of this data, you can determine which keywords are worth targeting while creating long-form content.

Final Thoughts on SEO Best Practices

The SEO best practices outlined above are a great starting point to achieve higher search rankings. That said, the competition for the coveted first page on Google is intense, regardless of the niche you operate in. Once these best practices are in place, make sure you are sufficiently up to speed with the latest SEO trends and follow other SEO techniques from time to time to stay ahead of the game.

Here are some additional best practice resources: 

17 Ways to Get More YouTube Subscribers (2020)

17 Ways to Get More YouTube Subscribers (2020)
Brian Dean

by Brian Dean · Updated Jan. 07, 2020

17 Ways to Get More YouTube Subscribers

In this post you’re going to learn how to get more YouTube subscribers in 2020.

In fact:

These are the exact strategies I used to grow my channel from zero to 263K subscribers:

Backlinko YouTube subscribers

And today I’m going to show you how I did it…

…and how you can do the same thing.

1. Use “Power Playlists”

“Power Playlists” are like regular playlists… but better.

Here’s exactly how they work:

You see, most playlists are organized by topic.

Power playlists

But Power Playlists are different.

Instead of topics, Power Playlists are organized by outcomes.

Here’s an example from my channel:

"Higher Google Rankings" YouTube playlist

As you can see, the title of that playlist is an outcome:

Backlinko's Power Playlist title gives an outcome

Which makes people MUCH more likely to watch my playlist… and subscribe.

And that leads us to…

2. Publish LONG Videos (10+ Minutes)

Yup, this goes against conventional wisdom.

But stay with me.

We recently did the largest YouTube ranking factors study ever.

YouTube Ranking Factors study

In that study we analyzed 11 factors that might help video rank in YouTube’s search engine.

And we found something surprising:

Longer videos rank better in YouTube’s search results.

Longer videos tend to rank better in YouTube

For example, last year I published this video.

As you can see, my video is almost 14 minutes long:

Backlinko YouTube video length

And that’s one of the main reasons that it ranks in the top 5 in YouTube for the keyword: “backlinks”:

YouTube SERP for "backlinks"

3. Promote Videos In Your End Screen

Here’s the deal:

The more of your videos someone watches, the more likely they are to subscribe.

The question is:

How do you get people to watch 2, 5 or even 10 of your videos?

Promote another video in your End Screen.

Here’s an example from my channel:

Next video in YouTube endscreen

This simple “Next Video” has led LOTS more views and subscribers:

Backlinko – End Screen – Extra views and subscribers

Here’s how you can do the same thing:

First, include 10 seconds of time at the end of your videos specifically for your End Screen.

Here’s what mine looks like in the raw video file:

Backlinko – End Screen template

Then, use YouTube’s End Screen editor to add a link to a related video:

Backlinko – End Screen editor

That’s all there is to it 🙂

4. Branding Watermark = Subscribe Button

This is the ultimate YouTube subscriber hack.

You probably know that you can add a Branding Watermark to your videos.

Branding Watermark

This watermark lets viewers subscribe to your channel inside of your video.

Subscribe button as branding watermark

Unfortunately, most Branding Watermarks are completely ignored.

For example…

I once added this watermark to all of my videos:

Backlinko – First watermark

And it did absolutely nothing.

So I decided to try something new.

Instead of a watermark that looked cool…

…I used one that looked like a normal YouTube subscribe button.

Backlinko – Latest watermark

And it worked!

My new watermark generated 70% more subscribers than my old one.

Backlinko – New watermark success

Pretty cool.

5. Focus On Quality… Not Quantity

When I first started my YouTube channel, I read the same advice over and over again:

“If you want to grow your channel, you need to upload videos on a regular basis”

As it turns out, this is HORRIBLE advice.

I’ll explain.

When I first started my channel I published videos on a consistent schedule…

…but no one watched them.

Backlinko – Low YouTube view rate

And the few people that watched my videos didn’t even bother to subscribe.

Backlinko YouTube channel – Low subscriber conversion

It was REALLY frustrating.

So I decided to change things up.

Instead of quantity, I decided to focus 100% on quality.

And this “quality over quantity” video marketing approach worked like magic.

Flash forward to today and my channel generates over 200k views per month from only 28 total videos:

Backlinko – 200,000 views per month

And because I pour my heart and soul into every video, nearly 8k people subscribe to my channel every month:

Backlinko – 7,000 monthly subscribers

6. Reply To EVERY Comment

This is one of the EASIEST ways to get more subscribers.

In fact, YouTube’s internal data has found a clear correlation between replying to comments and subscribers:

“When creators take the time to interact with their loyal community, it can encourage audience participation and ultimately result in a larger fanbase.”

Why does this help?

Well, most YouTubers never reply to comments.

Which means you instantly stand out when you do.

Brian replying to YouTube comments

That’s why I do my best to reply to as many comments as I can.

(Especially right after I publish a new video)

7. Write a Compelling Channel Description

Your YouTube Channel Description is HUGE.

(Especially when it comes to video SEO)

Sadly, most Channel Descriptions look something like this:

Bad YouTube Channel Description

Imagine that you’re about to subscribe to that channel.

Is that description going to make you lunge for the subscribe button?

Probably not.

Contrast that weak description with this one:

Good YouTube Channel Description

See the difference?

This about page works because it:

  • Tells you what the channel is all about
  • Gives you important information on the channel (like the upload schedule)
  • Includes a strong call to action to subscribe

Here’s a template that you can use to write your own Channel Description:

YouTube description template

Pro Tip: Sprinkle in a handful of keywords in your description. This can help your channel rank better in YouTube search.

For example, I used a few different relevant keywords that people on YouTube would search for…

…like “SEO”, “link building” and “content marketing”.

Backlinko YouTube channel keywords

8. Funnel People to “Subscriber Magnets”

This is working GREAT for me right now.

Here’s the step-by-step process:

First, head over to the old YouTube Analytics report.

And click “Subscribers” → “YouTube Watch Page”.

"Subscribers" then "YouTube watch page"

Next, identify the video that brought you the most subs last month:

Identify the video that brought the most subscribers

(This video is your “Subscriber Magnet”)

In my case, this ONE Subscriber Magnet from my channel brings in as many subscribers as 13 other videos from my channel… combined.

Subscriber magnets

Why is this important?

Your Subscriber Magnet video is PROVEN to generate subscribers.

And if you can get these video in front of more people, you’ll get more subscribers

Here are 3 ways to get more eyeballs on your Subscriber Magnet.

First, feature that video in your End Screen.

Feature your Subscriber Magnet on your End Screen

Second, make a playlist that starts off with that video:

Make a playlist that starts with the subscriber magnet

Finally, promote that video in a card:

Promote video in card

You can even make your Subscriber Magnet your channel trailer.

For example, Evan Carmichael uses his popular Steve Jobs video as his channel trailer:

Evan Carmichael – Trailer

That way, Evan’s high-converting video gets in front of everyone that visits his channel page

9. Use an Awesome Channel Icon

Your Channel Icon shows up EVERYWHERE on YouTube.

Channel Icon

Your icon is like a custom thumbnail… for your entire channel.

That’s why it’s really important to use the right one.

So if you’re a personal brand, use a high-res headshot:

Personal brand – High-res headshot

If you’re a company channel, use a version of your logo designed for YouTube.

For example, ESPN rounded their logo so it works perfectly as a Channel Icon:

Company Channel Icon

10. Create a Channel Tagline

Let’s face it:

Most YouTube channels do NOTHING to stand out.

And hey, I’m not judging.

In the early days of my channel I completely ignored the positioning of my channel.

Backlinko – Old YouTube channel

And it was one of the main reasons that I struggled.

Once I started to strategically position my channel, my monthly views and total subscriber count shot up like a rocketship.

Views and subscribers rising from strategic positioning of channel

Fortunately, you don’t need an MBA to position and brand your channel.

In fact, all you need to do is create a simple tagline.

Here’s the 3-step process:

First, identify ONE thing that makes your channel unique or different.

Maybe you’re a busy mom that can deadlift 500 pounds.

Maybe your channel teaches SaaS companies how to grow a blog.

The exact “thing” doesn’t matter.

As long as it’s different than the other channels in your niche, you’re set.

For example:

My videos teach people marketing strategies they can use to grow their business.

Backlinko videos

But if I made my tagline “I teach marketing strategies” or “I help you grow your business”, I’d blend in with thousands of other channels on YouTube.

So I decided to focus on the ONE thing that my channel focuses on:

Higher rankings and more traffic.

Second, put that tagline in big font on your Channel Art.

Here’s mine:

Tagline in Channel Art

Finally, say your tagline in your Channel Trailer.

Say tagline in channel trailer

11. Heart Awesome Comments

A while back YouTube launched “Creator Hearts”.

YouTube Creators on "Creator hearts"

Creator Hearts make it easy to highlight awesome comments from your community:

Backlinko – Creator Heart example

Now for the interesting part…

When you heart a comment, that person gets a notification (and sometimes even an email):

Brian hearting a comment

And according to YouTube’s own data:

“We’ve found that viewers who have received a heart on their comment are three times more likely to click on the notification (than with other types of notifications), potentially leading more viewers back to your channel.”

That’s right:

Heart notifications get 300% more clicks than average.

So whenever someone leaves a solid comment, hook them up with a heart:

Brian hearting a comment

As you just saw, this will bring them back to your video… and make them VERY likely to subscribe.

12. Make a Killer Channel Trailer

You probably know that a channel trailer can help you get more YouTube subscribers.

Here are 3 tactics for making a channel trailer that converts:

Kick things off with your tagline

Start your trailer off with your channel’s tagline.

(Don’t have a tagline. Check out technique #10 from this post)

For example, I say my tagline (“Higher Rankings and More Traffic”) within the first 3 seconds of my trailer:

Stick to 60 seconds (or less)

YouTube themselves say that shorter trailers convert best:

Shorter trailers convert best

That’s why I made my trailer about a minute long:

Backlinko's trailer is about one minute long

Show off your best stuff

Your trailer is a GREAT opportunity to promote your best content.

That’s why the middle of your trailer should be a 20-30 second highlight reel.

For example, my trailer includes LOTS of clips from my other videos:

That way, viewers can quickly get a feel for the type of content that I publish.

13. Create Videos That CRUSH Watch Time

Yup, Watch Time is a massively important YouTube SEO ranking factor.

And not just for YouTube SEO.

Videos with high Watch Time numbers get promoted more often on the YouTube homepage:

YouTube watch time promoted

And in the Suggested Video sidebar:

YouTube watch time sidebar

That’s why YouTube states that:

“The longer you can keep people watching on YouTube because of your content, the more your content may get surfaced.”

Question is:

How do you maximize Watch Time?

Use lots of Pattern Interrupts.

PI

Pattern Interrupt

noun

DEFINITION

An event that changes a person’s thought patterns.

Pattern Interrupts make your videos more dynamic…

…which keeps people watching.

That’s why I use TONS of Pattern Interrupts in every video.

Including graphics:

Jump cuts:

And corny jokes:

Remember:

Pattern Interrupts don’t need to be fancy or complicated.

For example, check out this video from Safiya Nygaard:

Safiya uses lots of super simple Pattern Interrupts (like camera angle changes and simple graphics) to keep things fresh.

Safiya pattern interrupts

14. Embed YouTube Videos In Blog Posts

Your blog is a HUGE untapped source of views and subscribers.

Why?

Well, if someone’s reading your text content, they clearly like your stuff.

Which means they’re primed to subscribe.

That’s why I embed lots of videos in my blog posts.

Sometimes the video makes up an entire step or tip:

Video as an entire step

But I also embed videos as a way for people to learn more about something from the post:

Embed videos to impart extra information

Either way, these embeds get my videos in front of more people.

And not just random people.

I’m showing my video content to people that are SUPER likely to subscribe to my channel.

15. End Videos With a Strong CTA

When someone get to the end of your video, they think:

“What’s next?”

And unless you give them something to do, they’re going to click over to another video from another channel.

User clicking on another channel's video

What’s the solution? Tell them to subscribe to your channel.

And don’t be afraid to tell people exactly what to do.

For example, here’s how I end all of my videos:

Video ending captions

I literally tell people to click on the subscribe button below the video.

That way, there’s no guesswork or thinking involved.

And that’s one of the main reasons that so many people subscribe right after watching one of my videos:

People subscribe after watching Brian's videos

16. Promote Your Channel In Ebooks, Webinars, Presentations and Lead Magnets

The next time you create ANY piece of content, ask yourself:

“How can I funnel people from this content to my channel?”

For example, I include a link to my channel in every lead magnet:

Link to channel in lead magnet

I even promote my channel in podcast interviews:

Brian promotes the Backlinko YouTube channel in podcast interviews

17. Optimize Your Channel Page

When someone lands on your channel page, two things can happen:

  1. They leave right away
  2. They watch more of your videos and subscribe

And I can tell you from experience that an optimized channel page can increase your subscribers by 2-5x.

For example, my channel used to look bland and unprofessional:

Old Backlinko YouTube channel – Unprofessional

Needless to say, VERY few people that landed on my page decided to subscribe.

That’s when I decided to put some time and effort into my channel page.

Specifically, I hired a pro designer to design some new Channel Art:

Backlinko Channel Art

And I organized my videos so that my best content appeared at the top:

Backlinko YouTube channel – Best things at the top

That said:

There’s no “perfect” way to organize your Channel Page.

But here’s a template that I notice a lot of top YouTubers use:

Top YouTube users template

Bonus #1: “The Social Media Preview”

I used to share my videos on social media like this:

Brian – Old style of social media video sharing

And my posts got BURIED.

Why?

Because Facebook, LinkedIn and other social media sites want to keep people on their platform.

Which means they don’t like posts that send people to YouTube.

Well, I recently discovered a way around this problem:

“The Social Media Preview”.

And this simple strategy has helped me get INSANE views on social media:

Social media preview – High number of views

In fact, one of my recent Social Media Previews got over 31,076 views on LinkedIn:

LinkedIn – 30,000 views

Here’s how to do it:

First, grab a 30-90 second clip from a recent YouTube video.

This clip should be a single technique, idea or point.

Next, upload that clip as native video content.

Upload clip as native content

This is key.

Like I mentioned earlier, social networks (like Facebook, Twitter and Reddit) want to promote native content on their platform.

And there’s data to back this up.

Native video Facebook posts get 10x more views than posts that linked to YouTube.

Native Facebook video posts get 10x more views than LinkedIn / YouTube videos

Finally, include a link to your video as the first comment on the post.

Include link to video as first comment on post

That way, if someone wants to see more, they can easily watch the full video on YouTube.

And you’re set.

Bonus #2: Include a Subscribe Link in Your Channel Art

This is one of my favorite ways to get subscribers on YouTube.

You probably know that you can link to external sites in your Channel Art.

But what you may not know is that you can sneak in an extra subscribe button there.

Here’s an example:

Subscribe button in "Channel Art" section

All you need to do is create a YouTube subscribe link:

YouTube subscribe link

Then, add that link as one of your Channel Art links:

Add a "Subscribe" button as a Channel Art link

Make sure to give your link a compelling title:

Give your link a compelling title

And when someone clicks on that link, they’ll see this high-converting prompt:

"Confirm channel subscription" prompt

Nice.

Now It’s Your Turn

So I hope this post helped show you how to get more subscribers on YouTube.

And now I’d like to hear from you:

Which strategy from today’s post are you excited to try first?

Or maybe you have a question about something you read.

Either way, let me know by leaving a comment below right now.