James Wynne is Director of User Experience for Sandstorm and has been in digital product development since 1996. He has worked as a UX designer for a myriad of clients including large eCommerce brands, mobile device manufacturers and integrated marketing agencies.
Every year since 2005, the Drupal community has flocked to DrupalCon to learn, explore and share. This year, the Sandstorm® team headed to Nashville, Tennessee–site of DrupalCon 2018–to get the latest updates on one of our favorite CMSs, find inspiration, and get our hot-chicken fix. Here are a few of the things we took away from this year’s conference.
1. “Clients buy solutions not code.”
Software wizard Vladimir Roudakov reminded us that no matter how impeccable and innovative our code looks, what’s most important to our clients is that our code solves the problems they’re facing. It was a great message to ground us throughout our time in Nashville.
2. By 2020, there will be more than 50 billion connected devices
3. Most traffic on the internet is non-human
Developer advocate Emily Rose made a pretty compelling case for why we’ll be developing for humanoids in the not-so-far future. With 61% of the internet made up of bot traffic and connected devices estimated to outnumber people 6:1 in two years, that’s a concept that’s hard to argue with.
4. Increasing page speed by one second can increase conversion by 27%
Google announced that by July 2018, pagespeed will be a ranking factor for mobile searches. For businesses to reach that coveted first position in the search engine, they’ll need to make sure their site loads lightning fast. And the reward—a big bump in conversion rate—will be worth it.
5. Drupal makes big dreams a reality
To celebrate the total solar eclipse, Miles McLean and Ken Fang used Drupal to create a once-in-a-lifetime viewing experience, integrating more than 20 video feeds and real-time tracker. Forty million people used the tool to see the solar eclipse.
If you’re looking to do big things with your website, drop us a line.
Whether it drizzles or pours, it’s good to be carrying an umbrella.
Back in 2014, Drupalgeddon rained cats and dogs.
Drupal released a critical security update on October 15, 2014 with express directions to address the vulnerability within seven hours of the release. Unfortunately, a large number of system administrators didn’t grab their umbrellas, and—to stretch this metaphor to its limit—they got soaked. It was a wake-up call, to say the least.
So four years later, when Drupal released a similarly critical security update that many people called Drupalgeddon 2.0, the admin community was prepared. At Sandstorm®, we started planning right after the announcement, and when the update was released, we secured more than 30 sites in a single afternoon.
But we’ve always understood the importance of taking security updates seriously, whether it’s 2014 or 2018. Because staying on top of these updates is just one easy way to keep your systems safe. And as recent hacks and data breaches like those from Saks and Lord & Taylor continue to show, your safety is under constant attack.
So what else can you do to keep your site as safe as possible?
1. Move your site to HTTPS
More than half of internet traffic is now encrypted, which is great news. Having your site use HTTPS (SSL/TLS) helps protect against session hijack attacks, because all traffic between your server and the client is encrypted.
This is such a boon to security that Google has been talking about penalizing sites that don't use HTTPS. Most notably, the Google Chrome browser will start indicating sites without HTTPS as insecure, starting in July 2018. Just one more reason to get a move on.
2. Take charge of your passwords and access
A major line of defense for any infrastructure is good management of credentials. As individuals and institutions, we now have a number of tools at our disposal, such as password managers, policies, etc.
But what is often forgotten is to consistently and comprehensively review who has access to your systems. As a result, old employees still have access to sites and accounts, creating vulnerabilities that are just waiting to happen.
3. Keep your server and applications up to date
When security updates are released, they represent known vulnerabilities. It’s imperative to apply the updates immediately, or risk leaving a door open for malicious activity.
Ensure that your server is applying updates on a regular basis and that your web applications are updating any relevant frameworks or libraries. An ounce of prevention is much more cost efficient than trying to recover from a compromised server or application.
4. Ensure you have frequent backups
If something ever does happen, you want to be able to roll back to a safe state. That’s why it’s so critical to make sure your servers and your application have automated backups.
Most hosts offer backup services for a small additional fee, and you’ll want to ensure that these are configured and working.
5. Proactive threat management
Be proactive. Start a conversation with your host provider about threat management, and ask about automated systems that look for irregular traffic. Ask your web vendor about how code is managed on the server, and spend the time to find a solution that’s right for your organization.
Still not sure how you can stay protected? Sandstorm can help! Feel free to drop us a line, so we can help ensure your site is secure.
Recently I had the honor of speaking at .orgCommunity’s Solutions Day 2017. Usability testing is a big part of how Sandstorm eliminates subjectivity from the creative process, so I wanted to show attendees how usability testing can help drive significantly improved user experiences.
With as few as 5–6 users, usability testing can identify 80% of user issues on a website or mobile app. Our Sandstormers have learned many lessons while performing more than 3,000 usability studies. These are just a few of the findings that can help you.
1. Members want to see real images of their peers.
We performed usability testing for the American Planning Association as part of a redesign of their website. During testing, we learned that their members found the stock photography used on their existing site inauthentic and unengaging.
This simple finding led us to use professional photos of real APA members that improved engagement on key pages, including the homepage, Events page, and About Us page.
2. Don’t put too many events on the homepage.
The Association for Corporate Growth (ACG) holds 1,200 events for 58 chapters across the globe each year, and they were struggling to find a way to highlight events.
Before we tested, ACG was including 25 events on their homepage, which was harming the user experience.
We needed to make it easy for members to find the events that were of interest, in their location, etc. So we created a featured event section on the homepage that links to an events page allowing users to filter by keyword, chapter, date, and event type.
3. Navigation items that require user action need an active verb in the title.
We made a surprising discovery while testing wireframe designs for a large non-profit organization: users thought the navigation items were too unclear and passive.
By adding active verbs to these items—for example, changing “Theft & Fraud Awareness” to “Prevent Theft and Fraud”—we were able to make the navigation clearer to users and let them know what they would be able to accomplish when visiting the page.
4. People miss content when there’s no visual cue.
Weber was redesigning the website for their grills and accessories and wanted to test several UX changes on a development environment before going live.
One of the issues we uncovered was that users didn’t know that the navigation items in the main menu expanded.
To solve this, we added carets next to the menu titles to indicate action. After making this simple fix, users clearly understood that they would find additional pages in the menu.
5. Using a search icon without an input field confuses users.
While redesigning the website for NOW Foods, we found that users were confused by a small change: we removed the input field for the search bar.
By merely adding the field back to the search area, users could search the site with ease.
Usability testing is a quick, simple way to improve the user experience, whether you’re creating a new site or app or redesigning what you have now. Contact us to learn more about how to execute your own usability test today.
Should you use a hamburger menu for your mobile navigation?
That’s a matter of ongoing debate here at Sandstorm®. It’s a debate we carry out in email chains linking to the latest articles, with subject lines like, “Hamburger menus were (bad/good).”
So I’m here to finally end the debate and offer a definitive answer on whether you should use hamburger menus by saying, “It depends.”
Because that’s the truth: Hamburger menus aren’t uniformly bad or good. It all depends on your audience, your goals, and how best to structure your information so that it serves your users and your needs.
The Myth of the Hidden Menu
In his article Why and How to Avoid Hamburger Menus, Louie Abreu lays out a thoughtful argument against the pattern of using sidebar menus. For him, the biggest issues are:
- Low Discoverability—the menu is out of sight and, therefore, out of mind.
- Reduced Efficiency—it creates navigation friction for the user.
- Navigation Clashing—it clutters up and overloads the navigation bar.
- Lack of Glanceability—information about specific items is harder to surface.
But I don’t quite buy the rest of his argument.
Since 2014, when the article was published, hamburger menus have become a common pattern for some of the most highly trafficked sites on the web, including Google and Facebook. And in countless usability studies, we’ve seen that most people don’t mind the ‘hidden’ menu on mobile devices.
The main issue we’ve seen in usability studies is some users don’t understand the three-horizontal-lines ‘hamburger’ icon. This is consistent with an A/B testing experiment conducted by Sites for Profit, which suggests that the three-horizontal-lines ‘hamburger’ icon is less effective than the ‘menu’ label. So there is definitely evidence that supports adding a menu label underneath the icon or simply using the word ‘menu’ instead of the icon.
What users really want is something that’s designed for them, whether it includes a hamburger menu or not—and I’d argue that most users don’t know that this is even a debate.
So how do you effectively use a hamburger menu without alienating users?
Considerations Before Using Hamburger Menus
1. If your navigation structure is small and simple, why not just show it?
Websites with a deep menu structure—like large enterprise software companies—can benefit from hamburger menus. But small websites, like those for a local business, have limited functionality and can display their full navigation. Or you could use one of these emerging patterns for mobile navigation.
2. Label your menu with the word menu.
Our own tests and others have shown that just adding the word ‘menu’ below the hamburger icon increases user engagement. Or ditch the icon and just use the ‘menu’ label.
3. If you have the screen width to display your menu, you should do it.
Avoid hiding your navigation on larger screens. If you don’t have to use a hamburger menu on tablet, then don’t.
4. Nesting can be a problem, if your menu structure is too deep, there’s probably something wrong with your architecture.
The hamburger/offscreen navigation pattern can get tricky if your menu structure is deep and wide. It’s probably not a good pattern to use if this is the case, but the first thing you should do is consider revising your site architecture so it’s less complex.
If you need help with your mobile navigation, Sandstorm can help. From usability testing to user experience design, we’ll help you find the solution that works best for your users.
Stronger member engagement. Increased traffic. Connecting with Millennials.
If I just listed everything on your association’s wish list, then gamification has a lot to offer you.
Gamification is all about motivation. It plays on people’s competitive nature and love of recognition to encourage them to accomplish goals. And gamification works wonders. Studies show that gamification can lead to a 150% boost in engagement, which is why more than 70% of the Global 2000 according to badgeville.com have at least one gamified app.
How can you start taking advantage of gamification’s benefits? We’ve created a quick walkthrough to help you power up member engagement.
1. Add a profile progress bar.
Users want goals and they want to feel like they’ve accomplished something. More than 75% responded to a survey saying that they want an indication of progress.
LinkedIn has mastered this technique to get members to build out their profiles: rewards for completing a profile, clues that offer direction, and tapping into users’ competitive nature to see who is looking at their profile.
2. Include provocative language in the profile form.
Asana challenged its users by asking them to describe themselves in seven words. When they made that switch, their response rate increased 98%. With just a simple form change, you can get your members to be more engaged right from the start.
3. Use points to incentivize members to come back.
Learning a new language can seem daunting, unless you use Duolingo. The popular language education app grew to 110 million users in just three years, and it keeps those members coming back by giving them experience points for each completed task.
4. Award badges for participation.
It can be difficult to get off the couch, but Fitbit encourages users to push harder by awarding badges for milestones. And the awards aren’t just for running a marathon, they start with tasks that the user can actually achieve and build from there.
At Sandstorm®, we can design new and exciting ways to engage your members through gamification.
Watch the video below for more ideas, or contact us to talk about what we can do for you.
Personalization is the best way to engage your users in a conversation, and it’s increasingly something that they expect from your website. Almost 75% of users prefer to do business with organizations that use personalization to make their experience more relevant; the same percentage of users get frustrated with websites when content has nothing to do with their interests.
I recently partnered with .orgCommunity to help associations better understand how to leverage website personalization. In the webinar Spectrum of Personalization, you’ll see 5 examples of personalization in action, from simple to complex, and take away some tips to help you get started today.
Get inspired! Watch our webinar below.
Over the years, Sandstorm® has built websites on content management systems (CMS) using a variety of programming languages: Python, .NET, and PHP to name just a few. These programming languages support CMSs like Django, Kentico, and Joomla, respectively. Two of the most popular CMSs are Drupal and WordPress, built on PHP.
A common question we hear from clients is whether they should use Drupal or WordPress. While there’s no right answer, there is an answer that’s right for you. Each one has its place, so we've laid out where you can gain the most benefit from each CMS.
The Benefits of Drupal
Speed and Performance
When it comes to a scalable CMS that can support high-volume traffic and vast libraries of content, Drupal beats out WordPress. Not only does Drupal offer better performance out of the box—including default cache features that help pages load faster—it’s more robust for handling complex projects with lots of functionality.
Drupal is favored by many top companies and government agencies, including whitehouse.gov, for its enterprise-level security. Drupal has a very active security team with a stringent review process for plugins and a robust permissions layer that provides nuanced limitations for user access.
WordPress, on the other hand, is a popular target for hackers whose malicious attacks often succeed due to fully coded plugins compromising security. Additionally, WordPress doesn’t provide the flexibility in tailored permissions that Drupal does.
When it comes to getting leads through web contact forms, WordPress requires third-party tools like Gravity Forms or JotForm, which will cost you extra.
With Drupal, web form functionalities are already built into the platform, so you don’t need external tools. Drupal can also enable rules and set up triggers so that when someone fills out a form on your website they receive an SMS message from your company, which helps with lead nurturing efforts and potential conversions.
The Benefits of WordPress
Ease of Use for Small Businesses
Since WordPress started primarily for less tech-savvy bloggers, small businesses with a junior development team benefit the most from the platform. Additionally, most writers and content managers have some experience with WordPress, so there's little need to train them on the platform.
Where It's a Toss Up
Drupal and WordPress users have created diverse global communities that offer international conferences like DrupalCon and WordCamp; local training events and Meetups; and active forums where users can ask questions and learn more about the platform. While the WordPress community is larger than Drupal’s, it’s uncommon that you would run into an issue with either platform that someone hasn’t encountered, and solved, before.
Search Engine Optimization
It doesn’t matter to Google which platform you use, and both platforms offer excellent plugins and modules to help you with your SEO, including Yoast for WordPress and Content Optimizer for Drupal.
At Sandstorm®, our experts have extensive experience developing, designing, and writing in Drupal, WordPress, and many other content management systems. We’d love to find the one that’s right for you.
Now more than ever, digital security is something that needs a thoughtful approach.
From Yahoo! to the DNC, large, high-profile security breaches are filling the news and making security a hot topic for everyday conversation. There are so many hacks that even data visualizers are struggling to make sense of them all. Which is why 2017 will be the year that companies finally realize the value and necessity of security for their digital properties.
Whether cause or effect, our increasing reliance on technology correlates with the spike in frequency, size, and severity of security breaches. At Sandstorm®, we're big fans of Steve Gibson and his podcast Security Now, where he talks about the race to keep up with new security threats. With each new security improvement developers release, hackers are ready to uncover weaknesses. Over the years, this has brought us to a place where both the threats—and the necessary defenses against those threats—have reached a level of complexity that can seem daunting.
From Convenience to Security
The complexity and automated nature of modern attacks has changed the industry’s view on the lengths hackers are willing to go to. Now, we have to assume that there is always someone looking to exploit opportunities and weaknesses.
While these are just a few examples of the risks and remediations that companies need to consider, they illustrate the many different attack vectors that developers need to address. The trick is to do the following:
- Define the requirements
- Identify the risks and determine the solutions
- Design a highly functional application that still puts the user first
Trend #1: Rise of the Botnets
Botnets are a major reason for the increase in security issues. As an industry, we’ve known for some time about the danger of improperly patched or unsecure computers and servers that get infected with malware. But in the last few years, risk has increased exponentially due to the prominence of the Internet of Things (IOT). We have an explosion of internet-connected devices (light bulbs, refrigerators, dishwashers, teddy bears) with many of them rushed to market without regard for security.
Night of the Living Malware
Malware programs target these vulnerable systems to create zombie armies of infected computers that work together to feed on sites. The most recent and well known is the Murai botnet, the code of which was released as open source and has since spawned a plethora of derivations. That's right; you heard me. They’re multiplying, evolving, and getting smarter like a creature out of a bad horror movie.
How bad is it? Projections as of 2016 suggested that 35% of all internet traffic consisted of malicious bots. That's a lot of zombies wandering around looking for your server's brains.
GhostBot in the Machine
Another recent example is GiftGhostBot. This attack came to light in March 2017. Bots are brute forcing the pages that allow customers to check the balance on their gift cards. These bots keep guessing gift card numbers (at an estimated rate of four billion requests per hour) until they get one that has a remaining balance. They can then use that gift code to steal from the gift card holder.
What makes this GiftGhostBot particularly sinister is its sophistication. First, the attack is distributed across multiple compromised devices, servers, and computers—which means there’s no way to track and block these requests by IP. Second, the bots have been set up to use over 740 different user agent profiles, meaning they masquerade as different browsers and operating systems to confuse attempts to filter out their traffic. Vendors might add CAPTCHAs or completely remove these pages to remediate the issue. This is just another example of the exponential scale and complexity of attacks that have shifted the conversation towards security.
What You Can Do
- Your best defense is keeping your systems up-to-date. Apply security updates to all technology in your ecosystem in a timely manner (including websites, servers, computers, employee mobile devices, etc.).
- Be sure to spend the time to review all new features and components of your digital products with an eye for potential vulnerabilities. Always overestimate the lengths someone would go.
- When in doubt, engage a knowledgeable specialist to help review your security configuration.
Trend #2: Are You a Robot? – Identifying Friend From Foe
If you’re thinking this is all about the rise of the machines, you might (or might not) be happy to hear that humans still play an important role in threatening your business’s security. While botnets have increased the quantity of attacks, the level of sophistication for attacks has also dramatically increased. In some areas, malicious entrepreneurs have even turned to crowdsourcing to enhance automated attacks. Take CAPTCHA as an example. When those annoying pictures were too much for some bots to circumvent, unscrupulous companies paid real people to fill them out. Bots passed the CAPTCHAs back to humans whose answers were fed back to the bots so they could proceed with their attack.
This resulted in concerns with the CAPTCHA as a solution for determining bot from human. While still used, it was understood that this solution is not 100% effective. Recently, however, Google updated their reCAPTCHA service with their new Invisible reCAPTCHA. Maybe you’ve seen this: It’s a simple checkbox that says “I am not a robot.” Because so much information on your behavior has been compiled by Google, it can compare your digital fingerprints and activity against its vast repository of analytics to determine if you’re a real person. Or that’s the theory anyway; the new service has just rolled out and we're excited to see how it matures.
Mollom is another service we recommend, specifically for Drupal projects. It takes form submissions on your site and checks the content to see if it looks like bot-generated content. If it does, the content is flagged. This technique analyzes content to protect against spam, relying on the consolidation of massive amounts of examples to understand how to proceed.
What You Can Do
- You can do is realize that identifying bots is not as straight-forward as it seems. They have gotten very good at pretending to look like real users performing real actions on your site.
- Shift your thinking to a place where you assume that hackers and spammers are probably smarter (or at least more persistent) than you. Look at each element of your digital products as a place where a bot might pretend to be a human and consider what they might be able to do.
- Layer different preventative techniques. Don't assume that one fix is enough and have a contingency plan for is a bot does get past your defenses.
Trend #3: Moving to SSL
Another major trend for 2017 will be the push for secure socket layer (SSL or HTTPS) traffic for everything. This has been an important shift for security in the last few years. Previously, SSL was only considered important for highly sensitive data, but a few things have pushed us into a world where regular HTTP traffic is considered unsecure.
Man in the Middle
First, a number of tools have come out that make watching the traffic of someone else on your network very easy to do. This allows a person to see the sites you are visiting and even steal your username and password. This is generally referred to as a man-in-the-middle attack resulting in session hijacking. Traffic over HTTPS helps to protect against that because your browser and the server are essentially communicating via a secret language that only they can understand.
Man on the Side
Second, browsers pulling in content over regular HTTP can't 100% confirm where the content they’re displaying came from. There have been a few complicated attacks over the past few years where malware was sent to site visitors instead of the assets they were expecting. This is generally referred to as a man-on-the-side attack. The attempted attack on GitHub in 2015 is an example of this. Moving towards HTTPS traffic gives the browser certainty that the content it received is the one it was expecting.
Pushing the Transition
If you’re thinking all of that sounds scary, you're not alone. Google agrees and has started to roll out changes to the Chrome browser—you've probably noticed that grayed out "not secure" message near the URL. Additionally, if you log in to a site over regular HTTP, you may also notice a red "not secure" message. This is meant to push websites towards SSL, and it’s only the start. Google has announced additional plans to clearly mark all traffic as not secure going forward.
What You Can Do
- Work with your hosting provider or website developer to purchase an SSL certificate from a reputable vendor.
- Have those same partners review your SSL configuration to confirm that you’re using strong protocols and ciphers that have not been deemed to be compromised.
- You may also need to review your site to confirm that you don't have any mixed content errors, which is when HTTPS pages are referencing insecure HTTP resources.
- While you're at it, complete a full review of your server configuration.
- A full penetration test or security scan may also be a good investment.
How Sandstorm Can Help
This is just the start of the conversation and we've only covered a few topics. Whether you’re moving your current website to SSL or want to ensure your new website is developed with the latest security in mind, we utilize the technology and techniques that make sure you’re protected.
Having trouble putting into words what you are looking to accomplish with your website? Not sure how to get all of your web development agencies aligned with your goals and objectives?
Writing a request for a proposal (RFP) is a challenging process if you don’t know where to start. By taking a moment now to think about your organization and your users’ wants and needs, you’ll save time later and increase the possibility of attracting the best agency to deliver success.
We can help! By following the website RFP response template below, you’ll have a clear strategy and a solid start for your next initiative:
1. Brief Overview of the Project
Describe your current website situation or desired campaign and a description of what your investment will entail.
2. Project Goals and Objectives
Define the motivation for your project. Why are you making this investment (i.e. expanded services, growth, new target audience, lead generation, attract job candidates)? What do you hope to accomplish? List your objectives.
3. Current Web Statistics
Include relevant web analytics such as top content, goal conversions, traffic sources, bounce rates, keyword phrases driving traffic, social referrals, mobile traffic, etc.
4. Technical Requirements
Are you integrating with any existing systems? List them. Do you require a specific programming language (e.g. .php or .net)? How is hosting currently handled?
5. Usability Requirements
How many different user groups do you have, and who are they? Are you interested in conducting usability testing? How about user research or developing a persona?
6. Functional Requirements
What features and functionality do you need on your site? Some needs might include:
- Secure user/password
- Contact forms or dynamic forms
- File uploading option
- User account management
- Social media integrations and social sharing
- Database development
- Video integrations
- Member dashboards
- Content management system (Drupal, Kentico, Wordpress, etc.)
- Newsletter sign up
- White paper lead capture
- 3rd party API integrations (LMS, AMS, HubSpot, Salesforce, etc)
7. Content Requirements
Approximately how many pages are on your current site? Do you have a content strategy? Who is going to be responsible for writing or editing your content? How will your social media channels be integrated?
8. Mobile Requirements
We only build websites that respond to your user’s device (i.e. mobile, tablet, desktop) – so we have that covered. Do you have any other special mobile needs that we should be aware of?
Has your budget been set and approved? What is the range?
What is your ideal project completion date? What is driving that time (i.e. trade show, new product launch, leadership change, board of directors, it should have happened last year)?
Ready to rock?
This website RFP response template can be the perfect tool to align all stakeholders on the essential building blocks for your project. It ensures you have a solid, thoughtful, and organized plan to guide your chosen agency, too.
A little upfront thinking and decision-making goes a long way in constructing an optimal site experience or campaign. You’ll be the rock star whose project launches on time, within scope, and under budget.
[Once you’ve completed all these steps, please send it to us. Sandstorm might be the right partner for your new project.]
Content marketing is the cornerstone of any successful digital marketing strategy, but it’s not enough just to create compelling content. You also have to think through how users engage with your content.
Since almost 90 percent of users are less likely to come back to a website after a bad experience, you really have to create a great experience right from the start. But don’t worry; creating compelling, user-friendly content isn’t as hard as it sounds. With a few simple changes, you can pack a serious punch. In fact, you’re probably following some of these best practices already.
1. Write content that’s scannable.
Like most readers, you’re probably skimming this article. Nielsen Norman Group, a leading UX research firm, found that 4 out of 5 users scan web pages looking for important information and fewer than 2 in 10 read word by word.
To deliver useful information to your users, your content needs to be scannable. You can make your content more user-friendly by following these best practices for web content. Start with the top 10 pages your users visit the most on your site and apply these principles:
- Think mobile first—look at how your content displays on a device.
- Use meaningful sub-headings instead of overly clever ones.
- Turn items listed in a paragraph into a bulleted list.
- Keep paragraphs to a single idea, and keep them concise. Paragraphs can have just 2-3 sentences.
- Edit your content, then edit again.
2. Use hyperlinks within your body content—and make them stand out.
Hyperlinks—the colorful text that links to other pages—are essential to a great user experience. They serve as signposts on the road to discovery and help users explore your content in a meaningful way.
Underlined text in a contrasting color is the best way to communicate a hyperlink, and it’s what most users expect. Using a longer phrase of three or four words is more engaging than a single keyword, and using really engaging language related to the link is even better.
Just remember not to overdo it; two to three links on a page is plenty for content of 450 words or less.
3. Create engaging and attractive calls to action.
Whether you’re trying to increase newsletter signups, encourage engagement, or promote an event, an appealing call to action (CTA) will improve your results.
What’s the key to an enticing CTA? Use a vibrant color from your brand style to draw attention to buttons, and give them a consistent look and feel. Use verbs in your CTA copy that tell users what you want them to do and what they get in return:
- Register for the event
- Request more information
- Download this report
If you follow these tips, you’ll be able to make quick optimizations that have a real impact on your site. Your current users will praise the improved usability, share more of your content, and you’ll have laid a solid foundation for attracting new users who are essential to growing business.