[ GrayMatter ]

404 Page: Get Creative

After some time on the job, web kids tend to pick up a few quirky habits when visiting other sites. Many of us like to view the page source and see what other developers’ practices are like. Personally, while exploring a website, I might be tempted to go to a url that I know would (or at least should) not exist, just to check out their 404 page. Once in a while, I run into something quite spectacular, such as Poem of Quotes’, Limp Fish’s, or Bluegg’s 404 pages.

These error pages aren’t purely meant for designers, developers, and content writers to show off their talents, however. Errors aren’t fun, so of course they should be kept to a minimum, but sometimes these errors are inevitable. Pages get deleted, websites get redesigned, and every once in a while, posts like this get written that tells Google, “Hey, check out these awesome 404 pages.” Instead of throwing technical error messages at an unsuspecting visitor, designers and developers often take advantage of these pages. When done correctly, custom 404 pages can actually help increase your website’s traffic, user engagement, and even conversion rates.

(more…)

Share this:Share on FacebookTweet about this on TwitterShare on LinkedIn

[ GrayMatter ]

Social Engineering: The Basics

Social engineering is an attempt to steal your personal information by disguising fraudulent activities with information that looks safe and harmless. Such attacks can be executed in a number of ways. There is the obvious method that most of us have probably heard of, or seen, such as email messages offering something that’s only “1 click away!” Other methods are more deceptive, involving seemingly innocent phone calls or random USB drives left sitting in a parking lot.

The objective is still the same: have you forfeit your information for their personal gain. There are no software programs that you can run to protect yourself from the most deceitful social engineering. (Although you may be able to combat some of the more basic attacks with an anti-virus program or anti-spyware.) Its not all bad news, though, knowing what to look for can help protect your information against disingenuous attacks. Let’s dive into the different methods on how to keep you and your information safe.

(more…)

Share this:Share on FacebookTweet about this on TwitterShare on LinkedIn

[ Digital Marketing ]

5 Steps to Creating the Ideal Customer Journey Map

At first glance, your customer’s journey to purchasing your product or service may seem like a pretty simple transaction. They find your product or need your service and then they buy it. But, when you step into the shoes of your customer, the process is much more complicated than a two-step-sees-product-and-buys-product process. Your customer’s journey is an intricate series of interactions that can “Make or Break” the entire buying process, and mapping their journey from start to finish will deepen your understanding of your customer, which will lead to a higher ROI.

There are 5 steps involved in creating an effective customer journey map, and this blog will take you through the entire journey (see what we did there), so you become a pro. By the end of this post, you’ll have a broad understanding of what it takes to build out a customer journey map that will improve the user experience on your website.

(more…)

Share this:Share on FacebookTweet about this on TwitterShare on LinkedIn