Interacting with Google In-Page Analytics

Visualizing user interaction has always been an important step in understanding exactly how people are engaging our websites. There’s something humbling to a web designer to see where people click and what users do when they’re actually on your website. We pride ourselves in being user experience (UX) design experts, but there are always surprising results when you can actually see the usage data. Why didn’t they click that button? Why are they using the footer navigation and not the top menu? How could they miss that call to action? Why are they trying to click the banner image?

How to track user engagement visually?

There are tons of tools out there to assist in visually outlining your website’s usage in tracking where people click on your website and the percentage of those who do. Some free, and some paid. These tools allow us to understand what users do when they are on your site, and how they are actually navigating the site to measure where they are clicking.

Google has always had an option called Site Overlay in the Google Analytics report under the ‘content’ section (which we often found quite buggy). Recently Google Analytics has released a completely remodeled version of this report called In-Page Analytics that shows click data superimposed over your website as you browse your various web pages.

What you can measure with In-Page Analytics?

Viewing “Clicks” by percentage is a report to show us where on the page that users click in respect to the percentage of those who are clicking (to help eliminate the outliers). You can see a speech bubble next to the links on your site that represent a % of users who click that link.

Scroll map is a bar that follows you as you scroll down the page to tell you the % of users who are clicking on any links below that point. It’s quite helpful in determining the true “fold” of your website as well as secondary navigation items or alternative call to action regions.

What’s lacking from In-Page Analytics?

There are still imperfections in the accuracy of the data using In-Page analytics. Knowing where on the page that someone clicks can be just as important as what the user clicks on the page. What this means is that say we have a link to our online Portfolio, and we have links to this page in both the top navigation menu and the call-to-action button on our website. In-Page Analytics would show the percentage of users who click to that page, but not that of the 43% of users who visit that page 24% use the main navigation and 19% use the call-to-action button.

We also run heat mapping tools that let us paint a better picture of exactly where people are clicking on the website to help us measure the data we receive from the In-Page Analytics in more detail.

Overall rating of the new Google In-Page Analytics

We would rate Google’s new tool around 4 out of 5. It’s an incredible tool to pair with your existing Google Analytics reports and it’s a big step up from the original Site Overlay. Customizing reports and visualizing the Goal Conversions makes this a must have, whereas something like crazy egg wouldn’t allow you to leverage the power of the other analytical data from Google. Still hoping they improve the click placement, but we’re really pleased with all of the new Google Analytics improvements and certainly the In-Page Analytics section.

This article has been provided courtesy of the top Orlando Website Design and Orlando SEO company Designzillas. Designzillas is a full service Website Design Agency in Orlando specializing in web design, user experience (UX) design, web development, e-commerce solutions, and online marketing. For more information, visit http://www.designzillas.com.

Wireless Routers for Homes; Are they Even Safe to Use?

Many are wondering if wireless routers used in homes are safe to use and if there are any risks if other people use their internet connection. Indeed, wireless routers may offer free internet to some, but because of this fact, some people with dark intentions in mind can exploit this opportunity.

Hijacking Connection

Computer forensics say that someone can use your wireless internet connection to attack other computer networks. Hackers would prefer to use others internet connection, instead of theirs when they attack a particular target. Although hackers can mask their connection, details and location, it is much safer for them to use other’s internet connection. That way, the hacker will not be blamed for the attack he made, thus making him anonymous.

Attack the Computer and the Network

Despite the fact that there are new types of computers and operating systems, some people are still using ancient computers and operating systems in their homes, much worse, they have no decent protection against virus and malware. These types of computers are the easiest to penetrate. Once these computers are penetrated via the wireless network, hackers can then secretly install a Trojan. It can be used to transmit important information of the target, such as credit car information, banking information and etc. Hackers can use this information for their advantages, unknown to their victims.

The Zombie Computer

If zombies are scary, then a zombie computer would be scarier to digital computer forensics and security experts. The hijacked connection will be used to perform a specific attack at a specific time. A computer turned zombie can be used repeatedly by a hacker, through the installation of software. The software installed can be used to coordinate attacks; if there are more zombies the hacker controls then that could be more dangerous.

Data Storage

There are instances when hackers will need a place to hide the data they have stolen. And what is the most suitable storage place to use? It’s a computer with a wireless connection. The data is masked perfectly that only graduates of a computer forensic course can detect them. The data is hidden well and is not visible to the desktop’s user and the disk space will seem unused. Knowing how this happened will be very troubling.

The Bandwidth

Hackers will even use the bandwidth or connection of the one owning wireless connection to upload or download huge amounts of computer data. These types of files can be in Gigabytes and could lead to additional bills for that person’s internet connection.

Violates Privacy

No person with healthy state of mind would like someone activating their microphone just to listen to the conversations inside the house. Or activate the camera to see what is inside the house. If hackers are planning to hack a company, then hacking the privacy of certain officials would surely help their cause.

How to Protect The System

It is important to protect the wireless system against hackers. First thing to do is to configure the firewall of the operating system, so that there are some levels of protection. It is also possible to purchase firewalls to supplement or replace the current firewall of the system. Although they are hard to configure, there are manuals that would provide a step-by-step guide on how one could configure their firewall.

The second thing to do is to install the latest antivirus software; an antivirus software that has anti-hacking capabilities. It is important to know how to effectively use the software, since there are other things aside from protection anti-virus software can offer. There are many good anti-viruses in the market, such as Kapersky, Norton and others.

Turn off the router or the internet connection when the computer is not used. If there is a need to store important information like details in bank accounts, passwords or any other private information, store it on other secure media or in a secure external drive that will make the data encrypted so that the hacker cannot retrieve it. Sometimes routers will provide security features and encryption, thus it is much better to know how to make use of this. Of course, the hardware will provide manuals that will guide their users on how to activate and configure the security features of the router. It might be confusing at start, but it is worth it.

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cybersecurity and e-commerce. It is the owner and developer of 20 security certifications. EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. These certifications are recognized worldwide and have received endorsements from various government agencies. They also offer trainings in computer forensics.

More information about EC-Council is available at www.eccouncil.org.