Web Design and SEO Blog

Dec201627

Integrating UTMs into Your Digital Marketing Strategy

by Mira Brody in SEM, SEO, Social Media, Tools & Tips

Using UTM tags.
What are UTMs?
UTM (Urchin Tracking Module) codes are pieces of code attached to the end of a URL to provide specific parameters about where that traffic is coming from. When clicked, these details are tracked in Google Analytics allowing you to better understand how your individual marketing campaigns are performing. They allow you to determine not only that people HAVE arrived at your site, but WHY.

Most importantly, UTMs reveal where your marketing efforts are paying off and where they may be wasting resources so your organization can run as economically as possible.

Elements of a UTM
At first, a UTM link can look a little frightening; a smattering of characters that add volume to your URL:
https://www.jtechcommunications.com/blog-article-title?utm_source=facebook&utm_campaign=blog-content&utm_medium=social&utm_content=article-title

If we break it down, however, we can start to recognize the different key elements that power this marketing tool:

Campaign — This is the Analytics campaign this UTM is tied back to so that it can easily be tracked.
&utm_campaign=blog-content
If your business is tracking the performance of its blog content, this would be the label for your campaign tag.

Source — Your source is to which website your content is being posted
?utm_source=facebook
So, if you posted one of your blogs to Facebook, your tag would be “Facebook.”

Medium — What marketing medium is this content being posted to.
&utm_medium=social
Some examples of medium tags could be “external-publisher” or “social-media.”

Content — The content tag differentiates types of content in the same campaign, medium or source by specifying its purpose or placement.
&utm_content=header
If you launched a Pay Per Click ad campaign and had multiple ads with the same UTM, you would see where they were placed to see which got more attention with tags such as “header,” or “sidebar.”

Term — Term tags are used in Pay Per Click ad campaigns to specify the keywords you paid for in that particular ad.
&utm_term=digital-marketing

What Can You Tag?
Now that you are familiar with the elements of a UTM, what should you use them for? Here are some content types we’ve started tagging:
  • Social posts, with a UTM tag for each platform. So, one for Facebook, one for LinkedIn, etc.
  • Email campaigns, such as newsletters. We insert a tag for each of our articles in our monthly Dispatch as well as one for the website link in the footer.

Additional uses include a/b testing different calls to action to see which gets more hits or tagging the share icons on your website to receive more precise data about who is interacting.

UTM Management
UTMs are most helpful if you manage them carefully. This will ensure all of your employees are using the right ones for each campaign and they are easily scheduled and tracked in Analytics over time.

If you use Google Analytics set up for your website already, your UTM campaigns will be tracked automatically under the Audience section.

Building a UTM Tag
There are tools that can help you properly build effective UTM tags, such as Google’s URL builder and similar. If you have minimal experience, however, we recommend you contact your digital marketing specialist, or give us a call. We’d love to review your marketing strategy and reveal if UTMs would benefit your business.
Dec201622

Domain Scams and How to Avoid Them Pt. 2

by Mira Brody in Tools & Tips

Avoiding malware scams.
A few weeks back, we talked about fake domain name expiration letters and how to spot and avoid this common scam. Today, we will cover a similar, new scam to keep your eyes out for: the Domain Abuse Notice.

“Our system has detected…your domain is being used for spamming and spreading malware…take action in 24 hours to avoid immediate suspension…”

Different variations of the above email are being sent out to domain owners threatening to take action if they do not click and link, download instructions, and follow “simple steps for prevention.”

What to do if you receive this scam notice.
Delete or ignore it. Chances are, if you do not recognize the name in the from field, it isn’t your domain registrar and you are not obligated to answer to them. These phishing scams, malware or virus attempts are easy to spot because domain registrar rarely ever send these types of messages out at all. If JTech happens to be your registrar, you can contact us at domains@jtechcommunications.com for verification or if you have any further concerns. As your domain registrar, JTech’s domain registration services include an auto-renew feature and we always work directly with you to ensure the upmost domain security.

Website domain names are a valuable piece of property, so scams are unfortunately very common. As the owner, the best thing you can do to protect your domain is to keep your eyes open for these common scams and never download or pay for anything you are unsure about.
Dec201620

Merry Christmas and a Happy New Year from JTech!

by Mira Brody in Announcements

Merry Christmas from JTech.
As the 2016 holiday season comes to crescendo and the year ends, we would like to take a moment to thank you for your loyalty over the years and for making our job a joyful and exciting experience.

Please note that JTech’s Bozeman office will be closed Monday, December 26th and Monday, January 2nd so that our staff can enjoy the holidays with their loved ones. We hope that you have a wonderful Christmas and a healthy and prosperous New Year!
Dec20169

How Infographics Boost User Engagement

by Mira Brody in Content, Design, Imagery, Infographic, Tools & Tips

As of 2015, the average human attention span has reached a new low — eight seconds. That’s down from the previous average of 12 seconds, and a second less than that of a goldfish. As content marketers, it’s our job to take advantage of this window of time in order to properly engage our audience. A great way to do this is with an infographic.

Why are infographics so effective?
Infographics, when utilized properly, break down complex information and data into a visual, making it easier for readers to digest. They are sharable, engaging and give you a chance to represent your branding in content.

Easily Consumable
Humans are visual creatures. We remember:
Infographics are easily consumable.

Traffic lights are more often than not, a symbol.
Traffic lights are more often than not, a symbol.
Faster Processing
We can recognize and process a symbol in 150 ms — which is why we have symbols, rather than text, for road signs, which need to be comprehended quickly.

Memory Retention
Three days after reading an article, we recall:
Infographics help memory retention.

Engaging
Eye tracking studies show that we focus in on graphics and imagery that are relevant to the topic on the page more than the text itself. We also spend more time on a page with visuals.

What can infographics do for your business?
Benefits of using infographics.

John Snow's famous map of cholera cases during an epidemic in London.
John Snow's famous map of cholera cases during an epidemic in London.
The use of infographics to display data is not a new practice. For thousands of years people have been using imagery to attract readership and display data, from the first world maps, to tracking the movement of Cholera through London to uncover its cause, to political cartoons to express an opinion.

Adding an infographic to your sales or marketing strategy is a great way to communicate important information in a visually appealing and engaging manner. Although not all information can be communicated effectively in one, utilizing the power of an infographic is a useful tool for all those looking to give their digital content a marketing boost!
Dec20165

Make Life Better With 1Password for Teams

by Mira Brody in

1Password for teams.
Many of us have followed the bad habit of storing our passwords in a journal, on a post-it note or in a Word document. The problem is, most of these places are incredibly unsafe for password storage, especially if your password is tied back to financial assets or personal information such as social security numbers, birth certificates or credit cards. With identity theft being a prevalent issue, it is important to guard this information securely. Luckily, there are software options that will securely store this information on your computer and be easily accessible when needed. One that we’ve found particularly useful for our team is 1Password.

1Password is a software service developed by AgileBits with options available for personal use, families and teams. This software allows you to securely store login information, credit cards, social security cards, certificates, legal documents and much more. This information is then protected under strong encryption and accessed by you via a master password. Your master password is never shared digitally and is produced on a PDF for safekeeping in case data recovery is needed; AgileBits recommends in a safety deposit box or fireproof safe.

1Password for Teams: the highlights
1Password for Teams is designed for the workplace. After purchasing the software, your team gets their own unique URL where password management takes place. An administrator will then invite team members and assign permissions.

Master Passwords — Each team member receives their own master password, keeping their devices secure. Unlike the credentials used to log int to websites and apps, the master password is never stored digitally, leaving no risk of it being stolen by hackers.
Cross platform — 1Password can be used across devices, so you can access everything you need from your computer, tablet or phone. It also supports Touch ID for iOS and the new MacBook Pro, as well as on a few specific Android devices as a fast and convenient alternative to inputting your master password to login each time.
Shared Vaults — Team members can be given permission to access shared vaults, providing all team members with the credentials they need to get their work done.
Password Strength — 1Password provides a password generator feature to create randomized, strong passwords and an entropy meter for existing passwords, allowing you to identify weaknesses in security.
Browser Extensions — 1Password has browser extensions for Safari, Firefox, Chrome and Internet Explorer. The extension allows you to autofill login information from a list of suggestions, save typed logins, create strong passwords and more…all while in your browser.
App Extension Support – Many apps on mobile devices have added support for 1Password in iOS, allowing you to login using 1Password directly from within Twitter, ebay, or other supported apps.

Admins will particularly appreciate blind access (allowing users to use, but not see, login credentials), lease timeouts (suspending user access temporarily) and guest access (sharing only certain credentials with, say, a client or temporary employee). And because we manage accounts for our clients, as well as our own, 1Password allows us to quickly locate credentials and login securely from any workstation.

If you’re still writing passwords down or recording them insecurely, give it a try. 1Password for Teams has been a great addition for us, allowing the team to access, share and manage passwords while adding both convenience and security office-wide.
Dec20161

JTech’s New Marketing Intern

by Mira Brody in Announcements

Please join us in welcoming Mariah, our newest marketing intern! A Bozeman, MT native, Mariah recently completed her education with a Business Management degree from Montana State University. With a background in event coordination and bridal consulting, she has made the switch to marketing and is looking forward to gaining knowledge in Google Analytics, Adwords and to better understand customer decision-making.

We are pleased to welcome Mariah aboard and look forward to the benefits her skill set will add to the team.
Nov201621

Happy Thanksgiving from JTech!

by Mira Brody in Announcements

Happy Thanksgiving from JTech.
Our office will be closed Thursday, November 24th and Friday, November 25th for the Thanksgiving Holiday. We will be back at work on Monday, November 28th.

At JTech, we are continually thankful for you, our clients, for making our jobs a fulfilling and rewarding experience. We are also thankful for the health and happiness of our family, friends and pets! We wish all of you a very happy and relaxing Thanksgiving holiday.
Nov201617

Siri’s Relationship with Yelp

by Mira Brody in Industry News, Optimization, Social Media, Tools & Tips

Yelp and Siri.
Since her permanent arrival to the iPhone 4S in 2011, Siri has been an integral part of our daily inquiries. From locating the best doughnuts in town to helping you calculate discounts on a whim in a busy grocery store, she’s a tool nearly 98% of iPhone users utilize at least once a month.

Because of her usefulness to consumers, Siri is a great tool for business owners to utilize to reach those consumers as well. Siri optimizes her results through a businesses’ Yelp listing, including location and reviews, determining how you appear in Apple maps’ directory — making it especially crucial for this information to be correct.

What you can do: Many business owners mistakenly do not consider Yelp as a viable option because the platform doesn't seem to fit their industry. However, it turns out if you don’t have an account you’re less likely to appear in search results by Siri. To increase your odds and become more visible to your customers, here are some things you can do:
  • Create a Yelp account if you have not already. This includes verifying your business through a process similar to Facebook and Twitter’s.
  • Upload a logo.
  • Fill in every relevant field, but especially your business hours, contact information, location and specialties. This not only ensures you can be found, but it boosts optimization, increasing your odds of showing up in search results when people are looking within your industry.
  • Check your other major online directories (Google Places, Facebook etc) for consistency with your information in Yelp. This accuracy is a significant ranking factor as well.
  • Gather reviews. Siri does take into account who is looking for “cheap dinner” or “the best burger.” She relates these terms to Yelps price range listings and customer reviews. If you have only one star reviews, she may not suggest you for that requested “best burger.” More tips on how to gather positive Yelp reviews from your clients.

Now that we know Siri’s ranking relies on Yelp for help to answer our toughest inquires about local businesses, it is time to make sure you are one of her recommendations! Follow the above suggestions, and as always, contact us if you have any questions or are concerned about your business’s visibility in voice search results.
Nov201615

Domain Name Scams and How to Avoid Them

by Mira Brody in Industry News, Tools & Tips

avoiding domain name scams.
"...Attn: We are sending you this notification for your business domain name search engine registration…time to send in your registration and save…failure to complete…may result in cancellation…do not discard..."

Whether or not you’ve been the unfortunate receiver of a domain registration scam letter, it is important to be aware of their existence in case you do get one someday.

A domain name scam is a sales solicitation disguised as a bill, designed to pressure the receiver into paying an amount to “renew” their domain name, change registrars or otherwise forfeit their existence on the web. They can come via email, paper letter or over the phone and should always be scrutinized carefully!

How to spot a scam.
  • First, check the bottom of the email. It usually contains a disclaimer saying something along the lines of “THIS IS NOT A BILL. This is a solicitation.”
  • Second, look for a registrar name. If you don’t see one, or the name sounds unfamiliar or suspicious, such as “Internet Renewal Service,” it is probably a scam.
  • Third, check the subject line. Language such as “this is your final notice” or “immediate attention needed” when it is only the first you’ve received should not be taken too seriously.

What to do if you receive a scam notice.
It is easiest just to delete, trash or ignore it. If you are unsure if it is legitimate or not, give JTech a call or forward the message to us for verification at domains@jtechcommunications.com. If we are your domain registrar, you don’t have to worry about answering these solicitations or about your domain ever expiring without you knowing. We auto-renew all domains with our clients and always work directly with you to securely manage your valuable names.

Domain scams are, unfortunately, very common. Falling for them however, is extremely avoidable. Keep your eye out and never pay for anything you feel unsure about.