Select Page
Why And How To Add Voice Search To Your Website

Why And How To Add Voice Search To Your Website

The hype around voice search has been building up ever since it was introduced around a decade ago, from the time when users were required to dial in a number and verbally state their search queries.

Since then, various companies have made gigantic leaps in the development of voice-search, thanks to superior machine learning algorithms and the influx of data derived from search engines. Currently, the market for voice search has expanded into a multi-billion-dollar enterprise with the biggest players, including Amazon, Google, and Apple, all competing for a piece of the pie.

The profound impact voice search has on search engine optimization (SEO) means that it affects everybody and anybody on the internet. Professionals directly linked with the Internet, and digital marketing in particular, need to stay one step ahead of the curve to ensure they are ready when the tide changes.

Graphic with question - why is voice search important

Why Is Voice Search Important For SEO in 2019?

Amit Singhal, the head of Google SERP ranking team stated in 2013, that “the destiny of Google’s search engine is to become that Star Trek computer.” If anything, that explains the direction voice search has taken in the last few years, and where it is headed in the years to come.

As a component of speech recognition technology, voice search uses voice commands to perform online searches. The core idea behind it was the facilitation of the consumer experience; people would find it more convenient to speak – and let the computer transcribe the search query – than manually typing it in.

This simplistic view has been expanded upon through the gradual growth in technology. Innovation, such as personal voice assistants have proven revelatory for voice search advancement, offering the much-needed personalization and customization when catering to users’ queries.

Voice Search Is the Future

Such developments were the reason why back in 2014, Andrew Ng – the Chief Scientist at Baidu – was confident enough to predict that by 2020, 50% of all searches would be conducted through voice search.

As of 2017, 41% of online adults were conducting at least one voice search a day and the numbers have only increased since then. Voice search has already become the fastest growing search type, and the trend’s trajectory doesn’t seem to be fading anytime soon in the foreseeable future.

By January 2018, 1 billion voice searches were being carried out a month. These numbers aren’t surprising as people look for faster, more efficient alternatives to typed searching. While people can only type about 40 words per minute, they can speak 150 in the same amount of time.

Additionally, the NLP (natural language processing) prowess of voice recognition software has enhanced multi-fold. Back in 2017, Google voice search’s ability to understand language and speech was 95% equivalent to that of humans, and, it has only grown since then.

As a web professional, voice search adaptability is a necessary accessory for your toolkit as you prepare to take on 2019. 58% of consumers are already utilizing voice search features to find information on local businesses. As the number of voice searches increases, businesses need to implement sound SEO techniques to reap the benefits i.e. increased organic traffic.

How to Optimize Your Website for Voice Search

Does voice search have any benefits at all? For sure. Don’t take our word for it, ask Amazon. A study reported that the implementation of voice search technology on its eCommerce platform resulted in $1.8 billion of the tech giant’s revenue in the last year – a figure that is expected to reach $40 billion by 2022.

Let’s face it, creating an attractive and relevant website can be a real challenge so outsourcing web professionals can be a great solution. However, they also need to stay relevant and continually grow to be able to deliver a valuable service to their clients. Here are some of the ways web professionals can optimize a website to maximize results derived from voice searches:

Focus On Featured Snippets

Appearing at the top of SERPs, featured snippets aim to present a concise answer to a user query. With this feature, Google aims to present the most relevant content at the very top of the user’s search result for a smoother experience.

In addition to ensuring high-quality content that justifies its relevance and quality to the search engine, you can go a step further and include a brief summary of the crux of your content above the fold.

The average voice search result is about 29 words long, so keep that in mind when devising content summaries. Additionally, long-tail keywords are a prominent feature of the “snippet” and should be included for added visibility.

Include Long Tail Keywords Using Conversational Tone

When optimizing your site for voice searches, it is imperative to keep in mind that the way we speak is inherently different from the way we write.

While typed queries are very short and concise, conversational search queries make use of more words. This translates to the emphasis placed on long tail keywords, which sound natural, and are more likely to be used in voice searches.

This helps in traditional SEO, and keywords that contain multiple words face less competition and hold a higher chance to top the SERP rankings. It might require additional and extensive keyword research, but is well worth it.

Additionally, the easier your sentence reads – the better it is for your SEO. We speak less formally than we type, and that means reduced wordiness. In fact, a majority of the voice search software conform to 9Th-grade reading levels. You could be writing about genetic engineering, but it should be written in a way that makes it easier to comprehend.

Make Sure Your Page Loads Fast

The reason why people use voice search is a convenience, and what convenience does a slow loading speed provide?

Not only does Google’s algorithm tilt towards websites that load faster, and as a result, ensure optimal user satisfaction and reduced bounce rates; it also benefits the consumer.

This is basic on-site SEO in action, with a special emphasis on mobile responsiveness. With Google Mobilegeddon causing mobile-responsive sites to rank higher, it is vital that your website is compatible with smartphones as well.

Faster page-load speeds are achieved through the utilization of images that are optimized, compressed files, and website caching, to name a few. People already use voice search widely, and its acceptance will only grow drastically in the future.

Conclusions

Those who take voice search into account in their SEO strategy already have an edge over other players. Voice search operates by narrowing down results, only catering to the top three. Companies that capitalize on voice search integration early on will benefit from higher content visibility, which will only keep increasing.

While it may seem ominous now, the future is clear: voice search will form the core of SEO, and preparing for it now will give you a competitive edge above others as they try to catch up in the coming years.

Editor’s note: this sponsored content was provided by Antonija Bozickovic.

Photo of Antonija Bozickovic

Antonija is an internet marketing specialist at Point Visible, a marketing agency providing link building and digital marketing services.  She has a great interest in digital marketing and a soft spot for graphic design. She’s never tired of searching for new inspirations, listening to her favorite music and creating digital illustrations.

 

How Mobile Apps are Bringing Revolution in the Healthcare Industry

How Mobile Apps are Bringing Revolution in the Healthcare Industry

Technology has impacted our lives on a larger scale, including our health. From doctors to patients, everyone has adopted the digitization of health industry. And this adoption has given rise to healthcare mobile app development. Undoubtedly, the demand for mobile apps in the healthcare sector is constantly increasing. Medical apps or mhealth apps have brought revolution in the way patients receive care and how patients communicate with providers.

Some tools which might be used in the health care industry including scalpel, phone, syringe, and checklist

Healthcare mobile apps made patients empowered to take their own, fully-informed medical decisions. It not only provides them with more knowledge but also increases patients’ involvement. Whether it is the healthcare provider or patient, mhealth app developers took the initiative to level the playing field for everyone.

Let’s have a look at how mhealth apps are transforming the healthcare industry.

With the help of mhealth apps, healthcare providers can cater to medical emergencies as well as offer enhance patient care. These apps are slowly becoming a significant part of the patient-provider lifestyle. It comes handy in a lot of medical procedures such as viewing blood reports and medical prescriptions, tracking patient recovery, and monitoring disease symptoms. Digital prescriptions allow providers to treat and monitor patients on the go.

Benefits of Healthcare Mobile Apps

Some of the biggest concerns of patients while accessing healthcare services are the cost of medical and health insurance and keeping pace with the technology. Healthcare mobile app development addresses these concerns and improves patient-provider communication. Even though health is a priority for everyone, but visiting hospitals frequently for regular checkups or follow-ups doesn’t count as a feasible option. Mobile technology brought relief to this problem. Here are some of the benefits of healthcare mobile apps:

  1. Easy care access: mhealth apps let providers communicate with the patients in a better way. It reduces the distance between them and improves the patient-provider relationship. Mobile apps let patients take consultation over platforms and visit only as recommended. This will not only save patients and providers’ time but also cut a significant cost.
  2. Improved patient engagement: The long queues outside the doctors’ clinic leaves a very limited time for providers to treat every patient warmly. In addition to this, it lacks the transparency of cost and quality. Healthcare apps work the best for patients, as it informs them if there is any delay in the appointment or they want to fix an appointment in the real time.
    Health care professional discussing laptop screen contents with patient
    Additionally, mhealth apps are beneficial for working professionals and elderly who don’t get updates regarding upcoming doctor appointments or pill schedule. These apps work as an assistant for patients, reminding them to take pills and scheduled appointments as required.
  3. No More Medical Fraud: With healthcare apps, there would be no more Medicare fraud. Often, patients get mislead by brokers present in the hospital who fool them saying that they will fix their appointment and charge a hefty amount to the medical staff. mhealth apps let patients access healthcare services without any mediator. Additionally, patients are also able to book their appointments directly with the doctor through the app and get genuine bills.
  4. Round the clock service: Healthcare mobile apps offers 24*7 assistance to patients and providers. Generally, when patients are done with consultations, they are left with paper, prescribed medicines, and recommended treatment. This way, there are higher chances that patients may miss the key points mentioned by doctors during treatment.

In such situations, healthcare apps come as a handy solution. It can help patients remember even the minute detail and the important instructions from providers such as taking pills, checking side effects, and contacting a doctor immediately in case of emergency.

Role of mobile apps in the Healthcare Sector

When it comes to healthcare, it becomes mandatory for healthcare providers to make quick decisions and implement those decisions timely to save patients’ lives. An efficient IT infrastructure is necessary for the providers to make prompt decisions. Here healthcare mobile apps can ease-down the decision-making process.

Mobile technology has proven helpful for doctors and nurses. It enables them to check patients’ health records in the real-time and patients can monitor their health conditions too. It also helps policy-makers to further improve as well as create new healthcare programs.

Here are some tips to develop a Successful Healthcare Mobile App

Slate with a light bulb and some chalk circles representing ideas

  • Determine your target audience: Determining who you are going to provide your services is one of the most crucial factors to consider while developing a healthcare app. Explore as much as you can on your targeted user-base.
  • Understand the need/problem: Once you know your target audience, determine what problems they are facing and how can you solve it. There might be many apps available in the market that claim to solve the same problem but hardly people find those appropriate. As a healthcare app developer, you must provide a solution that offers an easy-to-use experience to your users and solves their problems efficiently.
  • Customize as required: Your solution should be customized as per patients’ needs. It should provide information to the users, specific to their queries and with which they can relate to.
  • Direct Communication: Your healthcare app should offer a direct communication medium between patients and their doctors as it helps patients understand their health state. The medium can be in any form: messages or email.

Earlier, it was necessary for the patients and doctors to be in the same place for the treatment. With the advent of healthcare mobile apps, this limiting requirement has been addressed and solved as patients can take consultation, book appointments and tests, and take proper follow-up virtually within the app. These apps are like a blessing for the people living in rural areas and face difficulty in connecting with professional doctors.

Key Take Away!

As you have learned about how the intervention of technology with healthcare gave rise to healthcare mobile apps, its benefits, and a few tips to build a successful healthcare mobile app. It is evident from the above discussion that the upcoming years are going to be great for the healthcare providers and patients as there will be better solutions and many options to choose from, in order to solve a problem.

Whether it is a patient or a healthcare provider, there are numerous advantages for everyone. If you are thinking about developing your own app then it’s the right time to do it. All you need is a skilled team of an experienced digital healthcare technology partner, medical app developers, and digital marketers.

Editor’s note. This sponsored content was provided by Ritesh Patil.

Photo of Ritech Patil

Ritesh Patil is the co-founder of Mobisoft Infotech that helps startups and enterprises in mobile technology. He loves technology, especially mobile technology. He’s an avid blogger and writes on mobile application. He works in a leading mobile app development company with skilled Android and iOS app developers that has developed innovative mobile applications across various fields such as Finance, Insurance, Health, Entertainment, Productivity, Social Causes, Education and many more and has bagged numerous awards for the same. You can find him on Twitter and LinkedIn.

Static Website Generators – Part 2

Static Website Generators – Part 2

We covered the fundamentals of static site generators recently. Let’s take a deeper dive into one of them.

Jekyll 

Jekyll remains the most widely used static site generator. With Jekyll, you’ll typically work with content in Markdown, a lightweight markup language designed for text formatting. The Liquid templating engine is used to place this Markdown content into the HTML template, and to combine templates representing various parts of a page (say, header, footer and content) in a modular and re-usable manner. It also has support for Sass for those with a preference for CSS pre-processing, and it’ll play fine with libraries like Bootstrap. Also included with Jekyll is an HTTP server which can be used to easily deploy and test your static pages locally.

Importers is a feature which enable an existing site to be migrated to Jekyll with relative ease. For example, you can take an existing WordPress site as a starting point with Jekyll using one of the importers.

If you have a GitHub repository, you’re able to create a GitHub pages site for free using Jekyll. This can be a convenient way to give a polished landing page to your GitHub project.

The big downside of Jekyll – and this applies to most generators – is that it can seem complex at first and is a new technology to master.

If you want to try it yourself, here is the link to install Jekyll.

Installation of Jekyll

You first need to install the Ruby DevKit or you will experience errors. If you are installing Ruby only for the purpose of running Jekyll, Portable Jekyll will give you a full working Jekyll install in less than 5 minutes.

Few easy steps:

To set up your site locally with Jekyll, follow these steps:

  1. Create a local repository for your Jekyll site.
  2. Install Jekyll using Bundler.
  3. (optional): Generate Jekyll site files.
  4. Build your local Jekyll site.
  5. Keep your site up to date with the GitHub Pages gem.
  6. Configure Jekyll.

Does Jekyll generate valid HTML?

Jekyll essentially a parser that converts plain text content written in a special formatting language called Markdown into HTML. These content blocks get inserted into one or more templates to build final output for a static page or a post. Markdown is a styling language used to prepare written content such as blog posts in Jekyll that can eventually be converted into HTML. Markdown allows user to focus on content by using an easy-to-read and easy-to-write plain text format, which can then be converted to valid HTML.

My experience working with Jekyll

Jekyll is widely used Static Generator. I tried working with Jekyll. I followed easy steps to install and run a Jekyll post locally. I first installed Ruby, then used the command prompt to get the desired Jekyll output locally.

Here are some screen captures to get an idea how the site look like. It is a simple blog post without any graphics.

I transferred all generated files and also post I created via FTP to a server. It didn’t give the desired output shown in above images. For example, the link to the CSS file appears to be broken upon transfer.

During my course of study as a Web Developer I tried many different CMS and installed different software, but working with Jekyll is little different. It has a bit of a learning curve and I think someone before working may need someone to have a little technical background. I am still trying to see what I need to change in the background code when it is transferred to a server. Clearly, something did not work properly.

These are my initial observations on using the tool. You may have different experiences and we look forward to your comments. The biggest issue with using any static generator is that you must generate the entire site each time you make updates (so all the links work). You would then need to transfer the appropriate files to the server each time. In my opinion, there are other tools (such as WordPress) which would seem to be more efficient (although less secure as they interact with a database).

As always, we look forward to your comments.

 

Office worker’s guide to Internet privacy

Office worker’s guide to Internet privacy

There are a number of reasons why internet privacy can be just as important in the workplace as it is in your personal life, and it’s not all about going on Facebook when the boss isn’t looking. In an era of instant message chats and endless email threads, conversations that might once have been had at the watercooler are increasingly likely to take place in logged, viewable exchanges.

Whether those conversations are complaining about a company policy or discussing personal details that could lead to workplace discrimination, most of us are keen to make sure that private discussions remain just that. But since the computers you use at work are your employer’s property, it’s not uncommon for internet connections to be monitored.

computer desktop in office setting with likely non business content

Around 78% of major US companies admit that they check up on their employees’ emails, browsing history, downloaded files and even online phone calls. With almost two thirds of workers admitting to using the internet for personal reasons during working hours, it’s not entirely unreasonable for employers to be suspicious – but if you’re concerned about snooping, it’s good to know how you’re being watched and what you can do to avoid it.

The rules on snooping

A crucial thing to bear in mind when conversing via your work email address or workplace instant messenger system, is that just as your device belongs to your workplace, so does your email account. So whether you’ve added two-factor authentication to your log-in or set your emails up to be heavily encrypted, it won’t change the fact that someone else is the overseeing administrator of ‘your’ account.

In the US, UK and Australia, employers are legally within their rights to monitor all activity that you carry out on a company-owned device. This is true whether you’re in the office or working from home, and can include the use of personal email accounts on company devices.

In the UK, staff are supposed to be informed if they are being monitored – whether that’s via email, in browsing history logs or otherwise. However, just because your employer is supposed to tell you that they’re monitoring you, this doesn’t mean they have to get your consent. And in practice, notification of web use monitoring is forgotten. In the US and most of Australia, no disclosure is legally required.

The financial sector is thought to be the most vigilant when it comes to staff surveillance, with more than 92% of firms participating in some kind of monitoring activity. The types of monitoring in place include:

  • Keylogging – from actual keystrokes to time spent at the keyboard.
  • Computer file audits – inspecting what is being downloaded to, and stored on, company devices.
  • Email reviewing – according to the American Management Association, an estimated 73% of US companies use automatic email monitoring tools, while 40% have individuals specifically assigned to read and review incoming and outgoing email.
  • Browsing history reviews – generally looking for inappropriate site surfing, from social media to explicit content.

Encrypting browsing data

The simplest way to keeping your browsing history and ongoing activity private is to encrypt your connection, using a Virtual Private Network or VPN. There are various VPN apps suitable for PC and laptop use, and they only take a minute to install. Just make certain you only install this on personal devices (if you use them at the office). [Editor’s note – we also employ a VPN on our equipment when traveling (typically this will require an administrator to install on a corporate device).]

When connecting to the internet via a VPN, in essence you create a secure ‘tunnel’ in which to undertake your activities. If your employer tries to access the browsing history of your particular device, anything you’ve been up to while connected using a VPN will be missing from the list.

As well as keeping your activity private, a VPN can also sidestep access restrictions to certain websites. So if you were trying to access social media, only to find that it was blocked by your workplace network, connecting to a virtual server elsewhere through a VPN client would be one way to bypass the block.

If you connect to your workplace Wi-Fi network in order to browse on a mobile device, it’s wise to install you VPN service there too. In theory, the activity on your personal device shouldn’t end up exposed to prying eyes – but browsing activity sent over an office network can still be viewed by relevant parties who want to know what you’re up to.

A mobile VPN can encrypt your traffic in just the same way as a desktop version, ensuring that if someone does try to see what you’re up to, all they’ll get access to are indecipherable encryption keys.

On and offline

It almost goes without saying that the best way to keep your online activities away from your boss is to steer clear of anything but work-related activity online in the office, and to have private conversations in person rather than over the web. But in practice, this isn’t always feasible.

Keep personal conversations and browsing to your own devices where possible, and secure it all with encryption to ensure it can’t be snooped. It’s also a good idea to familiarize yourself with any workplace monitoring policies that your employer has – as well as informing you of anything that could be deemed to be inappropriate conduct, they’ll also educate you on how you’re being watched.

This article was provided by Tabby Farrar, who works with organizations in a range of industries including VPN security and small business consultancy. If you would like to see more articles like this one, please let us know via your comments.

4 Strategies to Convert Visitors into Buyers with Video

4 Strategies to Convert Visitors into Buyers with Video

Online buyers have many choices when it comes to products or services. If you’re an internet retailer, then you want every advantage to gain more sales. In that regard, video can be crucial to converting online traffic to revenue.

In their recent, annual video marketing survey, Wyzowl surveyed 570 professional marketers and online consumers. Of this group, 76% reported that website videos generated more sales.

A Liveclicker survey of retailers noted a significant increase in average order value (AOV) on product pages that contained videos. As well, 57 % of retailers who used video witnessed a sales increase of 50 percent on their products.

This marketing trend is valuable intel to businesses and will continue to be strong in 2019. Whether the video is animated, featured in a header, or used for a sales campaign, the results from marketing with video have been shown to attract more revenue.

Here’s how video converts online visitors into paying customers.

1.    The Video Hook

One of the most valuable steps to a video campaign that is going to generate online sales happens in those first few seconds. Folks are just not going to stick around without having their interest piqued. Like a well-written article, a video needs a solid hook.

One of the most famous marketing video series begins with the zinger, “Will it blend? That is the question.”

The blender company, BlendTec, offers a unique hook that makes customers curious about their remarkable, sturdy kitchen blenders.

Following the hook, founder Tom Dickson proceeds to blend anything imaginable, including cameras, marbles, and even an iPhone playing the series’ intro. This innovative marketing strategy has resulted in viral videos, with millions of views and the lion’s share of the kitchen blender market.

2. Video Length: The Short and Long Game

Online shoppers make quick decisions. For them, there is great value in a short video that highlights the product in a simple and clear fashion. However, some shoppers may bite on a longer video when contemplating how their lifestyle fits with the company’s mission, brand, and products.

Short for Sales

Short, short, short. For sales, it’s often best for the video to come in under two minutes.

The longer the video, the less engagement happens

Video software company Wistia reports that two minutes is often what companies need to shoot for. Videos that sneak past the two-minute mark show a significant drop-in engagement.

For short videos, a good strategy is to be concise. Be clear on message. Don’t try to do too much. Though the business or retailer wants a sale, the mission is just as important to feature as the product. Even in a short video, the customer is buying into the company as much as the product itself.

Long for Brand

While short is often essential to sales, that is not always the case for engaging customers with your brand, which is why long-form videos have their merits.

Businesses interested in showcasing their brand or a particular message may not be able to do that visually in 120 seconds. It may be necessary to craft a longer narrative. In that case, you want careful planning and a proper budget.

Longer videos can result in more shares and views, which is the result of a 2017 study by Wochit, a leader in video platform. More shares and more views can ultimately lead to more revenue. Paul’s Boots and Patagonia are great examples of using the long-form video to attract consumers and reinforce their brand.

In their “Worn Wear” video, Patagonia takes the viewer and/or potential customer on a journey of experience and aspiration. With breathtaking outdoor scenes and rich stories about rugged individuals who care about the earth, their video is targeted directly at these interested consumers, and even new ones, who want the same journey, lifestyle (and that awesome outdoor wear!). You may be surprised at how quickly the twenty-eight minutes passes.

3. Videos Can Be Fun (and “Quality” is Negotiable)

Screen capture of will it blend video example

BlendTec’s “Will it blend?” series were not high-quality at the onset, and they didn’t need to be. For videos showcased on social media sites, small businesses in particular can get away with off-the-cuff, down-to-earth feel of a low-rez video. And this is what BlendTec did in the mid-2000s.

Many SMEs can have a lot of success like BlendTec by crafting fun videos that don’t require a large budget. Small businesses can shoot on cell phones without expensive light kits or a boom mic and DAT recorder taking in the sound.

An often overlooked part of the video equation is the value of knowing which web hosts can handle large amounts of traffic. Whether you end up with a flashy, high-dollar mini-movie or a low budget infomercial, you need a host and plan with the computing resources available to push it out to viewers quickly and without fuss.

Even low quality videos are an enormous bandwidth drain. If yours don’t load fast enough, thanks to a below-average host, expect potential viewers to click away as fast as they arrived, leaving all your video efforts to amount to squat. The bottom line is that all hosts are not created equal so exert some effort to find a good one.

4. Video Creation and Editing

Given the video capabilities of phones (the 2015 feature film Tangerine was shot on an iPhone), marketing videos can be created in-house with a decent look.

Also, with the ease of some basic video-editing software like Lightwork or DSVC, these videos can be edited with ease.

A small business does not necessarily have to hire a media company to shoot video though it is recommended if there is a budget for it.

Most iterations of the iPhone produce extraordinary video quality. As well, Apple offers their iMovie software, where you can edit on phone or Mac.

Offering free and paid versions, Magisto is another type of software that allows for shooting with a phone and editing within its interface. Magisto specifically targets users wanting to upload social media videos.

[Update Nov. 18, 2019] Resources like this one (How to make a promotional video for your company: 7 steps) may also help.

The Bottom Line

With a solid marketing strategy, video creation allows businesses, small and large, to grow revenue and gain more online sales. For large firms, this can be more high-quality videos or storied films about their brand and products. But even small business can get in on the game with video by grabbing more average order value (AOV) simply by posting product videos with heart and humor.

Privacy matters

As we begin 2019, we think this is a good time to focus again on the issue of privacy (especially as it relates to web applications). In a nutshell, one can think of privacy as the ability to control information about an individual or a group. This includes how the information is collected, shared, and used.

Last year, the European Union began enforcing GDPR (General Data Protection Regulation) on May 25. This legislation is designed to “Reshape the way organizations across the region approach data privacy.” (Quote from https://eugdpr.org/). This represented a major improvement (in our opinion).

Organizations such as noyb (none of your business) are researching enforcement options. You may recall their director, Max Schrems, was interviewed by the CBS News show 60 minutes in November, 2018. For example, they filed 4 complaints over “forced consent” on May 25, 2018 (against Google, Instagram, Facebook, and WhatsApp).

We can think of many instances where details are collected (often without full consent) and shared with others. If you have been paying attention to the news in the past few years, you already know this is an issue.

As a professional organization, we encourage adherence to privacy principles which include:

  • Never collecting more information than is necessary to complete a given task.
  • Keeping collected information confidential (and not sharing with other organizations without your specific permission).

We published our views on privacy on June 1, 2018. We ask that web professionals (and those who aspire to our profession and craft) take time to evaluate their role in protecting privacy as we begin 2019. We contend the U.S. lags significantly in the area of privacy protection (at least protection “with teeth”).

We are interested in what our readers and members think about this issue and look forward to your comments.

Best always,
Mark DuBois
Executive Director and Lead Community Evangelist

7 Ways Hackers Avoid Detection

7 Ways Hackers Avoid Detection

It’s hard to stay anonymous on the internet…

Between government surveillance systems and advertising tracking tools, your every move online can be monitored.

But if that’s the case, then why are hackers and cybercriminals so successful in their nefarious endeavors? Shouldn’t it be easy to watch their activity too?

In reality, hackers spend as much time designing their attacks as they do finding ways to stay below the radar. A single slip-up can result in the end of their malicious enterprise.

The list below covers the seven most common methods that hackers use to stay a step ahead of those chasing them.

1. Adding Layers of Virtual Machines

In movies and television, you’ll often see a supposed hacker using a basic Windows laptop to launch a major attack. That’s rarely how it works in the real world. Hackers usually operate on Linux machines and are careful to add extra layers of infrastructure between them and their operation.

Before beginning an attack, a hacker will likely connect through a series of virtual machines that are hosted in different regions of the world, acting as sort of a private cloud network. These access points are sometimes referred to as ghost machines and are replaced on a regular basis so that a hacker can cover their tracks.

2. Spoofing IP and MAC Addresses

Overview of steps to spoof a MAC address

Every single device that wants to connect to the public internet must get an internet protocol (IP) address assigned to it by an internet service provider (ISP). This IP address will identifies the computer, tablet, or smartphone so that it can easily send and receive requested data from websites through a browser.

A media access control address (MAC address) is similar to an IP address except it is assigned during manufacturing and is specific to a network adapter. A computer with an ethernet port and a wi-fi access card will have two separate MAC addresses linked to it.

IP addresses and MAC addresses are the most common ways that people are tracked online. To get around this, hackers use a variety of tools to spoof addresses to disguise location and which devices they are using. Certain versions of the Linux operating system make it easy for a user to set a custom IP or MAC address.

3. Communicating With IRC

Overview of IRC clients for Android devices

There’s a good reason you don’t see groups of cybercriminals talking about their enterprises on social media or message boards. Those types of forums are prone to eavesdropping and do not offer true anonymity.

Instead, you’ll find that most hackers rely on internet relay chat (IRC) implementations for all forms of communication. IRC apps are typically run on individual servers that do not interface with the public cloud. As a result, content on IRC channels is considered very secure and hard to trace.

4. Switching Between VPNs

When talking about internet security, virtual private networks (VPNs) are considered to be one of the smartest investments a person can make. With a stable VPN you can be confident that your internet activity is fully encrypted and protected from hacking.

But VPNs can be used for malicious purposes as well. In fact, hackers often maintain accounts with dozens of VPN providers and rotate between them on a regular basis. When it comes to choosing the best VPN service provider, it’s all about anonymity (ie, no logging). A properly functioning VPN connection will disguise a user’s true IP address, which makes it difficult to track their activity or determine their physical location.

In addition, some VPN providers offer an easy way to switch between access points. This means that a hacker can route their web traffic through a Canadian server one day and then move their activity to a German server the day after.

5. Using the TOR Browser

Screen grab of TOR browser interface

A typical internet user connects to websites using a popular browser application like Google Chrome or Mozilla Firefox. Hackers, on the other hand, have a different browser of choice. They primarily use a tool called the Tor browser, which offers built-in privacy advantages inherent with the great unindexed abyss that is the Dark Web.

When a webpage loads through the Tor browser, the initial request is actually first routed through a number of relays spread across the globe. This layered concept is known as onion routing, and that’s how The Onion Router became known simply as Tor.

At each stop on the onion relay, traffic is encrypted and then passed to a new IP address. This makes it almost impossible for outside entities to trace a user’s session and follow their activity.

6. Masking Email Addresses

Information that you share with another person over email might seem like a private communication, but that’s not the case for the largest email providers on the internet. These companies all have full access to the content of your messages, some of which may be used in government surveillance programs.

For this reason, you’ll rarely find an experienced hacker who relies on a Gmail or Outlook address, especially if part of their enterprise involves spam messages or other phishing attacks. Instead, like with IRC channels, they’ll host their own email server and use that exclusively.

Hackers have also developed a number of ways to mask their true email address when blasting large audiences with spam. Sometimes it’s as simple as adding a typo to an official-looking address that most internet users won’t notice. There are even services that offer temporary email addresses that expire after a certain period of time.

7. Encrypting Hard Drives

For a hacker, most of the focus is on network connections and covering their tracks on the internet. However, they also take careful steps to secure their physical devices. One of the most common ways is to use encrypted hard drives that require a special passcode to use.

In the fallout from a data breach, authorities may try to hack back and infiltrate the cybercriminals’ systems. Using an encrypted hard drive makes this almost impossible.

The Bottom Line

The point to all this talk about how hackers manage to stay clear of the long arm of the law is not to provide you, dear reader, with a primer on a new online crime career but rather to offer insight into how the bad guys stay out of sight.

The smartest thing you can do is take appropriate precautions to protect yourself with a VPN, updated security software, and a dose of common sense. Make no mistake, hackers are out there and you probably won’t see them coming.

Static Website Generators

Static Website Generators

What is a static website generator?

A static site is a collection of pages contained in basic HTML files. A static site generator is a compromise between using a hand-coded static site and a full CMS. You generate an HTML-only website using raw data such as Markdown files and templates. The resulting build is transferred to your live web server.

An Introduction to Static Site Generators article was published a few years ago. The basic concept has remained constant. It explains the popularity of static site generator. It also help people of all skill levels understand exactly what static site generators are, acknowledge their advantages, and understand if their limitations are a deal-breaker or if, on the contrary, they can be overcome.

How static sites work?

The proposition of a static site is to shift the heavy load from the moment visitor’s request the content to the moment content actually changes. Using a news kiosk metaphor, think of a scenario where it’s the news agencies who call the kiosk whenever something newsworthy happens.

Example website prototype displayed across different devices (desktop and mobile)

(more…)

Year End Security Check

Year End Security Check

Have you recently done a security checkup?

Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Implementing effective cyber security measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. People often use the same passwords on multiple accounts (and rarely change their passwords unless prompted). Since people are often the “weakest link” in a security program, one should periodically do a security checkup. This applies to individuals as well as organizations.

As you know, a security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against potential hackers. Once systems have been compromised or passwords leaked, access credentials are often placed on the “dark web.”

Security image stressing biometric authentication

(more…)

Are Affiliate Cookie Hijackers Stealing Your Commissions?

Are Affiliate Cookie Hijackers Stealing Your Commissions?

If you earn a living – or even just spending money – selling stuff online as an affiliate, you should be concerned about cookies.

Digital cookies are the behind-the-scenes gizmo that credits you with a sale generated by a web page visitor. What you may not realize is that it is entirely possible for a clever hacker to hijack those cookies and end up with a sale that should have been credited to your account.

We’re talking big money. Shawn Hogan drew the attention of the FBI when he redirected around $28 million from rightful affiliates to his own account over the course of a few years.

The process in question is known as cookie hijacking or session hijacking.

To protect your cookies, it’s time to get serious about cybersecurity. It’s time to learn what cookies are, how they get hijacked, and what you can do minimize the risk.

Understanding Cookies

A cookie is a small packet of data that a web server transfers to a browser when someone visits a web page. Think of it as a message that originates with the server and is received by the visitor. Unless the visitor has blocked cookies, that data downloads onto the system and makes it easier for the page to load the next time the visitor returns.

That’s the main purpose of cookies: to make visiting a page simpler by ensuring it loads a little faster. It also helps the owner of the page have a better idea of how many visitors the page generates, if there are return visitors, and in general keep up with traffic patterns.

As it relates to affiliates, those cookies also make it easier for you to get credit when a consumer purchases something via your page.

How Can They Be Hijacked?

Cookies are dead simple, which may be why they are often overlooked as a means of committing a crime. All it really takes is for a hacker to seize the cookie and make a minor alteration.

http cookie hijacking flow diagram between hacker and computer

The next time a visitor lands on your page the cookie ensures that the hacker’s content loads. In most cases, it will be an almost perfect mirror of the original page. What’s different is the packet of information downloaded for the session is not original. It’s been altered. That sets the stage for the hacker to control what happens next.

What Does this Mean For Affiliates?

Why would cookie hijacking matter to an affiliate? After all, doesn’t the visitor use the URL to get to the right place and make a sale? What does the cookie have to do with it anyway?

The thing to remember is that the cookies make loading the order page easier. If you alter the data in the cookie so that the affiliate ID is no longer the same, the credit for that order is redirected to another source. That’s because the cookie is often stored in the raw URL for the session. Alter the cookie by changing the affiliate ID and the end user doesn’t really notice anything.

In other words, it appears that the consumer is placing the order with you, but it’s actually being placed with someone different. You never get credit for the sale and certainly don’t receive a commission. That makes this little malfeasance a form of affiliate fraud.

How Do You Know If Your Affiliate Cookies are Hijacked?

Cookie hijacking is difficult to spot. In fact, it would be almost impossible to detect when it happens during a live session. Whether the session hijacking is active or passive, you only have a chance of identifying the damage once it’s done.

One sign that something is not right has to do with the performance of the web page. If it begins to function erratically for no apparent reason, that could mean something has been altered. Alternatively, the page shutting down can be an indication something has been changed. At this juncture, you may want to check the cookies related to the page closely and see if the affiliate ID or even some other aspect of the cookie code is not as it should be.

If your affiliate partner emails or texts you when individual sales occur, compare that information to the commission report. If they don’t match, and there’s no evidence of returns or canceled orders, someone else is ending up with your commissions.

Are There Ways to Prevent Hijacks?

Preventing a hijack is actually simpler on the visitor side. If the page visitor has up to date malware and antivirus software, the protections in those programs will likely spot that something was changed during a session. This gives the individual the opportunity to end the session before completing a transaction. The problem is the high rate of old malware and antivirus software in use.

Your affiliate can provide some support in terms of preventing cookie-jacking. Depending on how the servers download cookies and what sort of security is used for your customized affiliate page, it may be possible to prevent hacking software from modifying the cookies and the session ID that’s generated.

Create Your Own Encrypted Internet Connection

It’s not as complicated as it sounds. The concept of a virtual private network or VPN is coming into its own and likely will become an indispensable component of internet connections before too much more time has passed.

A VPN works in conjunction with your ISP. It is a separate service that encrypts the data that flows between your device and the internet. You don’t have to be a cryptographer to realize that encryption makes it harder for a hacker to complete his task. The extra ten or so bucks a month is money well-spent.

how does https work and differ from http - simple diagram

Make sure your affiliate pages use HyperText Transfer Protocol Secure (HTTPS) rather than HyperText Transfer Protocol (HTTP). Doing so adds another layer of protection by scrambling the code that’s shared between the originating server and the recipient

The Bottom Line

You don’t devote time and energy to building a business only to have someone else steal sales as certainly as if they reached over and grabbed twenty bucks from your wallet. Make it a point to educate yourself about online security. Subscribe to a blog or two. You don’t have to be a techie to stay updated on the latest threats and keep solid malware protection in place.