Why are my styles missing?

WordPress 6.9 Is Doing Something Weird With Your Styles

Well, WordPress 6.9 dropped on December 2nd, and if your website suddenly looks like it forgot to get dressed this morning, you’re not alone.

What’s Happening

The WordPress core team made some performance improvements to how stylesheets load. The short version: they increased the inline style limit from 20KB to 40KB and changed how block styles load on-demand for classic themes. These are genuinely good changes for page speed.

The problem is that some themes and plugins—Elementor sites in particular—are now missing CSS. Layouts are collapsing. Fonts are wrong. Hero sections have wandered off somewhere. It’s the kind of thing that makes you stare at your screen and quietly say “huh” for longer than you’d like to admit.

The Fix

There’s a one-line code snippet that tells WordPress to load block styles the old way:

add_filter( 'should_load_separate_core_block_assets', '__return_false', 100 );

You can drop this into your theme’s

functions.php

file or create a simple must-use plugin. If those words mean nothing to you, that’s okay. Keep reading.

Your Options

Option 1: Turn off automatic updates and wait

This is the “I’ll deal with it when they fix it” approach. WordPress will patch this. They always do. In the meantime, you can disable auto-updates for core and stay on 6.8.3 until the dust settles.

To disable auto-updates, add this to your

wp-config.php:

define( 'WP_AUTO_UPDATE_CORE', false );

Option 2: Apply the fix yourself

If you’re comfortable editing theme files or creating a must-use plugin, the code snippet above should sort you out. Back up your site first. Always back up your site first.

Option 3: Hire someone to fix it

If you’d rather not touch code, we can apply the patch for you. It takes us just a few hours to get in there, verify the issue, apply the fix, and test everything. Our rate for this kind of quick fix is $500.

Contact us to schedule a patch.

Should You Panic?

No. This is just WordPress being WordPress. The open-source sausage gets made in public, and sometimes a piece of gristle gets through. The core team is aware of the issue, Elementor is working on compatibility updates, and life will go on.

If your site looks fine, congratulations. You can close this tab and get back to your day.

If your site looks like a ransom note made of mismatched fonts and collapsed columns, well, now you know why.


Design Web Louisville helps businesses and nonprofits keep their WordPress sites running smoothly. If you’d rather not think about things like inline style limits and block asset loading, we offer monthly maintenance plans that handle updates, backups, and the occasional “WordPress is doing something weird” situation.

The Web Professional’s Guide to Industry-Specific Cybersecurity Standards

For modern web professionals, building a great website is only half the battle — the other critical half is securing it. Cybersecurity is not a one-size-fits-all strategy because different industries have unique and often legally mandated standards. Every designer, developer and business owner must understand these industry-specific standards to protect their clients and their businesses. 

This guide walks you through the different cybersecurity rules governing e-commerce and finance, health care, education and general data privacy, so you can build sites with confidence.

E-commerce and Finance — Complying With PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a global rulebook created by the Payment Card Industry Security Standards Council to protect payment data from the moment it is captured through transmission and storage. It applies to any business that accepts or transmits credit card information. 

Protecting this data is a top priority. According to a PwC report, 78% of organizations expect their cyber budget to increase over the next 12 months, as businesses continue to face a widening array of cyber risks. Investment in artificial intelligence was identified as the top priority, followed by cloud security, network security and data protection. This points to greater scrutiny, more tools and higher expectations on anyone building checkout experiences. 

For web professionals, the golden rule is never to store card data. Storing credit card numbers, expiration dates or CVV codes on the server creates a massive and unnecessary liability. While the client is responsible for compliance, the design and development choices directly affect their ability to follow standards. 

The most effective way to handle this is to offload risk by integrating PCI-compliant gateways that handle sensitive fields in their own secure environment. On the developer’s side, a hardened network and application stack must be maintained. The standard expects strong passwords, patched software and no vendor-supplied defaults on any device or app that could touch the card data environment. These basics are directly addressed by the Council and remain among the leading causes of breaches among small merchants. 

Health Care — Adhering to HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) sets national rules for protecting health information. The Privacy Rule limits when protected health information can be used or disclosed, while the Security Rule requires administrative, physical and technical safeguards for electronic protected health information (PHI). 

The health care industry has been a frequent target for attackers, and the fallout can include exposed records, regulatory penalties, class action lawsuits and lasting loss of patient trust. High-profile incidents from recent years at major insurers and hospital systems have shown how a single compromised portal or third-party tool can compromise millions of records and disrupt care operations. 

The cases of Anthem, Excellus, Premera and the UCLA Health System in 2015 alone exposed millions of patient records. These cases highlighted that overlooked systems, such as printers and portals, can be the weak link that triggers heavy regulatory and financial fallout. Anthem, for example, found its database of potentially up to 80 million people exposed after its administrator’s credentials were hacked. In the same year, up to 11 million client records under Premera Blue Cross were compromised.

The Meaningful Use program is designed to reward organizations for improving quality, safety and patient privacy by digitizing health records. Yet within most health care institutions, it is typical that 25%-35% of patient data is in analog format. This creates a need for IT to secure the flow of information and transfer physical documents into the digital world. 

As a web professional, your projects should encrypt data in transit and at rest on servers that host any PHI. Use secure forms that never send protected details through standard email, and choose hosting and key vendors willing to sign a Business Associate Agreement, since they become part of the compliance chain. Enforce role-based access so only authorized users can see protected data, and document a risk analysis process that you can repeat with each major feature release. 

Education — Understanding FERPA

The education industry is governed by the Family Educational Rights and Privacy Act (FERPA). This law protects student record privacy, including grades, class schedules, disciplinary records and other personally identifiable information. It applies to all schools that receive funds from the U.S. Department of Education, as well as to third parties acting on their behalf. 

If you are building for an educational institution, design with those rights in mind. Student portals must require individual, secure logins. Do not publish grades or schedules on public pages, and use role-based access so students, parents and staff see only what their role allows. The Department of Education’s student privacy program provides guidance for edtech vendors, which you can use as a checklist during procurement and integration. 

A practical pattern is to centralize authentication and authorization, then pass only the minimum data needed for each tool. Maintain an inventory of vendors that receive student information and map the fields you send to prevent accidental data sharing. 

General Data Privacy — Navigating GDPR and CCPA

Beyond specific industries, general data privacy laws have a huge impact on web development. The two most prominent are the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA). These laws are not industry-specific. They are location-based and focus on giving individuals rights over their personal data. If you work with visitors from these regions, your site must respect these frameworks. 

For day-to-day builds, this means three things:

  • Writing privacy policies in clear language, explaining what you collect and why
  • Presenting consent controls for cookies that process personal data, with an option to reject on the first layer and no pre-checked boxes 
  • Preparing for user data requests by incorporating the export and deletion processes into your operational workflow 

GDPR and CCPA require fundamental changes to how a site is built and managed, so focus on structured development from the outset. You can standardize privacy features across projects, such as preference centers, consent banners and data request forms by using well-documented, reusable parts. You can save money and stay compliant by designing versatile and easy-to-understand modules. This way, you do not have to write the same logic and behavior stays consistent across sites. 

Building Trust Through Security

Security is part of your job. Knowing the different industry-specific security rules is not only important to avoid sanctions, but also to build trust, keep users safe and establish a reputation for quality and safety. Be a proactive collaborator with your clients as they work on their security.

Understanding Link Farms and Private Blog Networks: Why Google Penalizes Them (And How They Catch You)

If you’ve been managing a website for any length of time, you’ve probably heard warnings about link farms and Private Blog Networks (PBN). Maybe you’ve even been approached by someone offering to get you “high-quality backlinks” through their network of sites. These offers can sound tempting, especially when legitimate link building feels slow and difficult.

But there’s a reason Google explicitly prohibits these practices. And there’s a reason they’ve gotten increasingly good at catching people who use them.

Let’s talk about what these schemes actually are, how they work, why they fail, and what Google does to the sites that participate in them.

What Is a Link Farm?

A link farm is exactly what it sounds like – a website or group of websites that exist primarily to create links. These sites aren’t built to serve readers or provide genuine value. They’re built to manipulate search engine rankings by artificially inflating the number of backlinks pointing to target websites. With Ai making content development much easier and faster this is going to be the next big issue to worry over in the Google updates to come.

How Link Farms Work

The basic operation is straightforward. Someone creates multiple low-quality websites or acquires domains specifically for linking purposes. These sites get filled with thin content – articles that exist only to hold links. Then they sell links on these sites to anyone willing to pay.

The articles often look somewhat legitimate on the surface. They might be about real topics and contain actual sentences. But if you read them carefully, you’ll notice they’re generic, poorly researched, and exist mainly to justify the presence of several outbound links. They are created quickly, often without even being read or reviewed.

A most recent example would be the scandal over an article written that reviewed current popular books, but as the internet would soon discover, those books? They didn’t exist. They were part of an Ai hallucination. No one read the article, they just pumped it out and published it to get some link backs. It is happening more an more often too. Here is another example of an AI-generated summer reading list featuring fake books: https://www.npr.org/2025/05/20/nx-s1-5405022/fake-summer-reading-list-ai

Link farms operate at scale. A single operator might run dozens or hundreds of sites, churning out content continuously and selling links across all of them. The whole operation is designed to look natural to search engines while being completely artificial.

Why People Use Them

The appeal is simple: speed and control. Earning legitimate backlinks takes time. You have to create genuinely valuable content, build real relationships, and wait for other websites to discover and link to your work organically.

Link farms promise to skip all that. For a fee, you get backlinks right now from sites that appear to have authority. For businesses under pressure to show SEO results quickly, that can seem like an attractive shortcut.

The problem is that shortcuts in SEO almost always become sinkholes eventually. SEO needs a solid foundation. If you build your marketing foundation on bad decisions, quick cheats and cut corners, then just like a real house, it will not hold up for long.

What Is a Private Blog Network (PBN)?

A Private Blog Network is a more sophisticated version of a link farm. Instead of obvious low-quality sites, PBN operators create what look like legitimate blogs and websites. They might use expired domains that used to be real businesses. They might fill the sites with decent content. They might even generate some real traffic.

But underneath all that camouflage, the purpose is the same: to create controlled links that manipulate search rankings.

How PBNs Differ from Link Farms

PBNs try harder to look legitimate. Where link farms are obviously thin and artificial, PBNs invest more effort in their facade:

  • They use diverse domain names and hosting providers
  • They create content that sounds more authoritative
  • They might interlink between network sites to simulate a real web of related content
  • They vary their link patterns to avoid obvious fingerprints
  • They sometimes mix in legitimate content alongside their paid links

The goal is to make each site in the network look like an independent, authentic website that just happens to link to the target sites. In reality, they’re all controlled by the same operator and exist for the same manipulative purpose.

The Economics of PBNs

Running a PBN requires more investment than a basic link farm. Operators need to buy or lease multiple domains, pay for hosting across different providers, create more convincing content, and maintain the sites to keep up appearances.

They recoup these costs by charging more for links. A link from a PBN site might cost anywhere from fifty dollars to several hundred, depending on how established and legitimate-looking the network appears.

For the PBN operator, it’s a business model. For the people buying links, it’s a gamble. And for Google, it’s a violation of their guidelines.

How Google Detects Link Schemes

Google has spent nearly two decades getting better at identifying artificial link patterns. What worked in 2005 doesn’t work now. What might slip past their algorithms today probably won’t work next year.

Here’s how they catch these schemes:

Pattern Recognition at Scale

Google’s algorithms analyze billions of links across the web. They look for patterns that deviate from natural linking behavior:

  • Large numbers of low-quality sites all linking to the same targets
  • Sites that link out to many unrelated websites with no clear editorial reason
  • Sudden spikes in backlinks from sites with no previous relationship
  • Networks of sites that share hosting infrastructure, WHOIS information, or content patterns
  • Links that use overly optimized anchor text across multiple sites

When Google’s systems spot these patterns, they flag the sites involved for further review.

Content Quality Signals

Google’s algorithms evaluate the quality of the content surrounding links. They can identify thin content, keyword-stuffed articles, and text that exists only to justify links.

If a site consistently publishes low-quality content with suspicious linking patterns, that site loses credibility in Google’s eyes. Links from that site stop passing value. Eventually, the site might be removed from search results entirely.

Network Footprints

PBN operators try to hide the fact that multiple sites are part of the same network. But hiding those connections is harder than it looks:

  • Similar WHOIS registration information across domains
  • Shared IP addresses or hosting providers
  • Similar site templates or design patterns
  • Overlapping Google Analytics or AdSense IDs
  • Similar content structures or writing styles
  • Cross-linking patterns between network sites

Google’s algorithms are specifically designed to detect these footprints. When they identify one site in a network, they can often uncover the entire operation.

Human Review

Beyond algorithms, Google employs human reviewers who manually evaluate suspected violations. If your site gets flagged for suspicious links, a real person might look at it and make a judgment call.

Manual reviews are particularly common for competitive industries where the stakes are high and people are more likely to push boundaries.

Competitor Reports

Google also accepts spam reports from webmasters who notice suspicious link patterns pointing to competitor sites. While Google doesn’t act on every report, documented patterns of link manipulation can trigger investigations.

This means even if Google’s algorithms don’t catch a scheme immediately, someone else in your industry might spot it and report it.

What Happens When Google Catches You

Google doesn’t issue warnings before penalizing link scheme participation. When they detect a violation, they act. The consequences depend on the severity and nature of the violation, but none of them are good for your business.

Algorithmic Devaluation

This is the most common outcome. Google’s algorithms simply stop counting the manipulative links. Your rankings drop to where they would have been without those artificial backlinks – or lower, if Google applies a ranking suppression.

You might not even receive a notification. You’ll just notice your traffic declining and your rankings falling. When you check Google Search Console, you might see a message about “unnatural links” or you might see nothing at all.

Manual Penalties

For more egregious violations, Google issues manual actions. These are penalties applied by human reviewers. They’re more severe than algorithmic devaluations and require active work to remove.

Manual penalties come in two forms:

Partial matches: Only some pages on your site are affected. Searches that would normally show those pages won’t.

Site-wide matches: Your entire website is demoted or removed from search results. This is devastating for businesses that rely on search traffic.

Manual penalties remain in effect until you remove the offending links and submit a reconsideration request. Even then, Google might not reinstate your rankings immediately – or ever.

Permanent Damage

Even after addressing the violation, your site’s reputation with Google may be permanently damaged. Sites that have been penalized often struggle to regain their previous rankings, even after the penalty is lifted.

Think of it like a credit score. Violations stay on your record and affect how Google evaluates your site going forward.

Wasted Money and Time

Beyond the direct penalties, there’s the opportunity cost. The money spent on artificial links is gone. The time spent dealing with penalties and cleanup could have been invested in legitimate marketing. And the traffic and revenue lost during the penalty period doesn’t come back.

Businesses that chase artificial link schemes often end up worse off than if they had just focused on legitimate strategies from the beginning.

Why Link Schemes Keep Failing

Google’s entire business model depends on showing users the most relevant, highest-quality results. Link manipulation undermines that goal. So Google invests heavily in detecting and penalizing it.

Every time someone figures out a new way to game the system, Google’s engineers work to close that loophole. The cat-and-mouse game has been going on for decades, and Google keeps winning.

The Arms Race You Can’t Win

PBN operators constantly adapt their techniques to avoid detection. They change their patterns, hide their footprints better, and develop new methods. But they’re fighting against a company with unlimited resources and some of the world’s best engineers.

Google processes billions of searches every day. They have more data about link patterns than any individual SEO operator ever could. They use machine learning to detect patterns humans can’t even see.

The people selling links might claim they’ve figured out how to avoid detection. They might point to current clients whose sites haven’t been penalized yet. But “hasn’t been caught yet” is very different from “won’t be caught.”

The Downside Is Catastrophic

Even if a link scheme works temporarily, the eventual downside is huge. A site that loses its search rankings can lose 50% to 90% of its traffic overnight. For businesses that depend on that traffic, it’s often a fatal blow.

Compare that risk to the modest benefit of getting some artificial links. The math doesn’t work. You’re risking your entire business for a temporary ranking boost that might not even materialize.

What Legitimate Link Building Looks Like

Not all link building is manipulative. There’s a huge difference between artificial schemes and legitimate strategies that earn links naturally.

Creating Content Worth Linking To

The most sustainable link building strategy is creating content that people genuinely want to reference. Original research, comprehensive guides, useful tools, and insightful analysis all tend to attract organic links over time.

This takes more work than buying links. But the links you earn are permanent, valuable, and completely safe from penalties.

Building Real Relationships

Legitimate partnerships with complementary businesses, guest posts on actual publications in your industry, and relationships with journalists all create natural linking opportunities.

These relationships develop slowly. But they’re built on genuine mutual benefit rather than payment for manipulation.

Letting Quality Work Speak for Itself

When you do excellent work for clients, create genuinely helpful resources, or build a reputation in your industry, links tend to follow naturally. People cite authorities. They reference useful resources. They link to businesses they trust.

This organic process might seem frustratingly slow compared to just buying a hundred links. But it’s the only approach that builds sustainable, long-term results without risk.

How to Clean Up If You’ve Used Link Schemes

If you’ve participated in link schemes in the past – either knowingly or unknowingly – here’s how to address it:

Audit Your Backlink Profile

Use Google Search Console to export all the links pointing to your site. Review them carefully. Look for patterns we’ve discussed: low-quality sites, obvious link farms, networks of sites that all link to you, and unnatural anchor text patterns.

Remove or Disavow Bad Links

For links you can control, remove them. Contact the site owners and request removal. For links you can’t control, use Google’s Disavow Tool to tell Google you don’t want those links counted.

Be aggressive in this cleanup. It’s better to disavow some legitimate links than to leave manipulative ones in place.

Submit a Reconsideration Request

If you have a manual penalty, you’ll need to submit a reconsideration request after cleaning up your links. Be honest about what happened and what you’ve done to fix it. Don’t make excuses or try to minimize the violation.

Focus on Legitimate Strategies Going Forward

Once you’ve cleaned up past mistakes, commit to building links the right way. It’s slower. It requires more patience. But it’s the only sustainable path.

The Bottom Line

Link farms and PBNs are tempting because they promise easy results. But they’re fundamentally at odds with how Google wants the web to work. And Google has proven they’re willing and able to detect and penalize these schemes.

The penalties are severe. The cleanup is difficult. And the long-term damage to your site’s reputation can be permanent.

Meanwhile, the businesses that focus on legitimate strategies – creating great content, building real relationships, and earning links naturally – build sustainable competitive advantages that can’t be taken away by an algorithm update.

There are no shortcuts in SEO that don’t eventually become sinkholes. The sooner you accept that, the sooner you can focus on strategies that actually work for the long term.

If you’re getting pitched on “high-quality backlinks from our network of sites,” now you know what you’re really being offered: a risk you can’t afford to take.

How to Tell the Difference Between Good Guest Posts and SEO Link Schemes

If you manage a business website, you’ve probably received emails from people wanting to publish articles on your site. Some of these are perfectly fine. Others could get your website penalized by Google. The tricky part is knowing which is which.

Over the years of managing websites for our clients and running our own site, we’ve learned to spot the difference. Here’s what we’ve found works.

Understanding What’s Actually Happening

When someone offers to write a guest post for your website, they’re usually after one thing: a link back to their site. That link helps their website’s SEO. This isn’t automatically bad—it’s how much of the internet works. The question is whether they’re offering genuine value in exchange, or if they’re running a link scheme that could hurt your site.

Google is pretty clear about this. They don’t mind natural links that happen because content is genuinely helpful. They do mind links that exist only to manipulate search rankings.

Red Flags That Signal Trouble

Here are the warning signs we watch for when evaluating guest post requests:

They Offer a Link Exchange

This is the biggest red flag. If someone says “I’ll publish an article on your site, and in return I’ll publish your content on these sites,” that’s a link exchange scheme. Google explicitly penalizes these.

The email might say something like: “In return, I could also publish an article on [list of websites].” That’s your signal to delete and move on.

The Email Feels Generic

Pay attention to how they reference your site. Do they mention your actual website name and specific content? Or do they use vague phrases like “your site” and “my latest article”?

If they can’t be bothered to personalize the email, they’re probably sending it to hundreds of websites. That’s not a real relationship.

Pro tip: does the signature say “Best” instead of Thanks, Sincerely or some other more human closing? Best is a popular closing used by Ai writers and the Google automation response. It can be a subtle tip off that you are being contacted en-mass. That is a red flag.

They Reference Old Articles You Don’t Remember

Sometimes these emails claim they previously published something on your site. If you can’t find that article or don’t remember approving it, something’s off. Either they’re lying, or someone else managed to slip content onto your site without proper review.

The Sites They Mention Look Questionable

If they offer to publish your content in exchange, take a look at those sites. Are they legitimate businesses with real content and clear purposes? Or are they thin websites that exist mainly to host guest posts?

A quick Google search usually reveals the truth pretty fast.

They’re Too Eager or Pushy

Legitimate writers understand that website owners need time to consider requests. If someone is pushing hard for a quick yes or sending multiple follow-ups right away, that urgency often signals they’re trying to place links before you think too carefully about it.

Green Flags for Legitimate Guest Posting

Not every guest post request is bad. Here’s what good ones look like:

The Content Is Actually Relevant

The writer is offering content that genuinely fits your website’s focus and would help your readers. For a business website, that might mean articles about your industry, practical advice for your customers, or insights into topics your audience cares about.

If you run a dermatology practice and someone wants to write about roofing contractors, that’s not a good fit. If they want to write about skincare routines or sun protection, that makes sense.

The Writer Has Real Credentials

Look them up. Do they have a legitimate website? A portfolio of published work? A clear professional identity? Real writers and content creators exist—they’re building their reputation and authority through quality content.

Check their website. If it’s an actual business or publication with substance, that’s a good sign. If it’s a bare-bones site with nothing but generic content and outbound links, walk away.

They’re Not Asking For Or Offering Anything Sketchy

A legitimate guest blogger might ask for an author byline with a link to their website or professional profile. That’s normal. What’s not normal is asking you to link to multiple sites, include specific anchor text, or participate in any kind of exchange program.

The Relationship Feels Natural

Good guest posting relationships often develop over time. Maybe they’ve commented on your content. Maybe you’ve interacted on social media. Maybe they reached out with a genuine compliment about your site before pitching an article.

Schemes feel transactional. Real relationships feel like actual people talking to each other.

Their Outbound Links Make Sense

If they send a sample article, look at where the links go. Are they linking to authoritative sources that support the content? Or are all the links going to random SEO tools and questionable sites?

Natural writing includes links when they help the reader. Link schemes include links because they’re trying to manipulate rankings.

What to Do If You Find Questionable Content Already on Your Site

Maybe you’re reading this and realizing you already have some suspicious guest posts published. Here’s what to do:

  1. Check the backlinks – Use Google Search Console to see what sites are linking to that post. If you see links from low-quality sites or the domains mentioned in link exchange emails, that confirms your suspicions.
  2. Evaluate the content quality – Is it actually helpful to your visitors? If it’s thin, off-topic, or clearly written just to hold links, it’s not serving your site well.
  3. Look at the traffic – Check your analytics. Is this post bringing legitimate visitors? If it’s just sitting there gathering dust, it’s not helping you.
  4. When in doubt, remove it – You can just delete questionable posts. For posts that have somehow gotten legitimate traffic, you can 301 redirect the URL to a relevant page on your site. But in most cases, deletion is fine.

A Simple Decision Framework

When you get a guest post request, ask yourself these three questions:

1. Would this content genuinely help my website visitors?

If the answer is no, nothing else matters. Your website exists to serve your customers and prospects, not to be a link repository for SEO schemes.

2. Does this person have legitimate credentials and a real presence?

Five minutes of research usually tells you everything you need to know. Real people have real professional identities. SEO schemers have thin websites and generic personas.

3. Are they asking for anything beyond a simple author byline?

One link back to their legitimate website or professional profile is normal. Link exchanges, specific anchor text requests, or placement on multiple domains are not.

If you get “yes, yes, no” to these three questions, the guest post is probably fine. Any other combination should make you cautious.

The Bigger Picture

Guest blogging done right is good for the internet. It helps writers build their reputation, helps websites get quality content, and helps readers find useful information. The problem is people who abuse the system for SEO manipulation.

Your website’s reputation with Google matters. A few questionable links aren’t worth the risk of penalties or ranking losses. When in doubt, err on the side of caution.

We’ve seen too many businesses get hurt by link schemes they didn’t understand. They thought they were getting free content. What they actually got was a liability.

Need Help Evaluating Guest Post Requests?

If you’re not sure about a guest post request you’ve received, we’re happy to take a look. We can review the proposal, check the requester’s credentials, and give you an informed opinion about whether it’s legitimate.

Managing your website’s content and SEO is part of what we do. Sometimes that means knowing what not to publish, which can be just as important as knowing what to add.

Feel free to forward any questionable requests to us. We’d rather you ask than guess wrong.

5 Site Optimization Strategies for Voice Search and Smart Assistants

In the rapidly evolving digital world, people are continually seeking faster and more efficient ways to accomplish tasks. For many, typing a question into a search bar can feel slow or inconvenient. This has led to the rise of a more natural and faster alternative — voice search. Whether it is asking a smartphone for directions or a smart assistant for a recipe, speaking requests is becoming second nature. 

Voice search also represents a major step forward in digital accessibility, empowering individuals who experience difficulty physically typing. This powerful combination of convenience and essential access is what makes optimizing for voice search a critical strategy for any forward-thinking business. 

What Is Voice Search?

Voice search is when people speak into their phone or ask their device’s smart assistant to look something up on the web for them. This mostly takes place on cellphones, but some smart assistants have a separate device that handles searches as well.

Voice Search’s Growing Importance

Voice search is growing in popularity. Around half of online shoppers use a voice assistant to research things they want to buy. Smart Internet of Things (IoT) devices like smart speakers, such as the Amazon Echo Dot or Google Home, often enable these capabilities. They can be called upon with a simple command, usually to look up something the user has a question about. 

These devices can be found in both personal spaces like homes and public spaces like the workplace. Their adoption is widespread, with 45% of U.S. households containing at least one IoT device and 56% of organizations already integrating IoT devices into their workplace strategies. The rapid rise of these voice search-enabling devices proves that businesses need to adapt their SEO strategies to directly respond to this growing search format.

How to Optimize for Voice Search and Smart Assistants

So, what can small and medium-sized businesses do to adapt to this shift in how users are conducting searches? It is important to learn how to optimize your website to fit this new search method. Below are some strategies to help you stay at the top of search results, even with voice search or smart assistants in the picture.

  1. Keep it Conversational

Because people are using their voices to search, it is important for the writing on a site to be more conversational to match the tone of the search inquiry. Some ways to do this include making content more conversational, using question-based phrases and incorporating long-tail keywords, which are typically over three words in length.

  1. Make it Mobile Friendly

Most people will be voice searching via their cellphones. Therefore, you must make sure your site is mobile-friendly. This includes ensuring the site loads quickly when first accessed and that the content is easy to navigate and read on a smaller screen. This avoids frustration from the user and increases the likelihood of them visiting your site again.

  1. Create Content with Fast Voice-Optimized Responses

Your website will need to have brief, direct content that caters to the vocal response methods of a smart assistant. This means having featured snippets that a smart assistant can easily grab and present to the user. Ensure the snippets are concise, as they are more likely to be selected. FAQ pages are also a good way to deliver fast voice responses. 

It is also important to ensure that your brand has a unified, consistent voice to develop familiarity and trust with customers. If the user conducts a voice search for a trustworthy or reliable place, a strong brand voice that is clearly presented on the website may be more likely to be chosen and presented to the user.

  1. Incorporate Local SEO

Small businesses often rely on word-of-mouth and local sales to drive their business. Tailoring your SEO to local voice searches can increase users’ likelihood of making a purchase. Using terms like “near me” in your website’s content can help with this. Additionally, keeping your Google Business Profile up to date and collecting reviews from satisfied customers enhances your local SEO.

  1. Embrace Multilingualism 

If people are talking on their phones when making searches, they may be speaking a different language. To integrate this into your small business’s website, you could try to offer different translations of your website or research keywords tailored to users who speak a variety of languages. This could increase your outreach and customer base.

Voice Searching Is the Future

Voice searching is becoming more and more popular, and with many people buying smart assistants, it becomes increasingly important for small businesses to adapt their SEO strategies to accommodate this change. This can involve making content more conversational and sites mobile-friendly or improving your SEO through reviews. Regardless of the strategy, it is essential to take some steps to address the growing trend of voice search.

How Much Data Should You Actually Collect in Lead Forms?

Every business wants leads. After all, they’re the lifeblood of the sales funnel. The tricky part is deciding how much information to request in a lead form. Ask too many questions and visitors are likely to abandon it halfway. Ask too few and you may not gather enough details to improve your interactions. Finding the right balance can seem so complicated, but it’s crucial for strong marketing performance and higher conversion rates.

What’s the Ideal Number of Fields?

The sweet spot between quality and quantity is anything between three and five fields. While it’s tempting to create a longer questionnaire to attract high-quality leads every time, it can be counterintuitive. The two are inversely related. When the number of boxes goes up, conversion rates tend to drop.

Think of it this way — longer pages can filter out low-intent prospects, but they’re less likely to finish a form if it feels too long or tedious. This is especially true for casual consumers who prefer quick interactions and convenience.

Meanwhile, shorter forms increase submissions but may lack the details needed for effective personalization. It also attracts casual or unqualified leads, which may not be your target. To make email marketing work, aim to collect just enough data to enable segmentation and tailored communication.

High-Value Offers

There are instances where users don’t mind a few extra clicks, mainly if the reward feels worth their effort. These include deals that pack real value, such as free consultation, a tailored demo or a quote that would normally set them back a few hundred dollars. If the deal feels like a fair trade, they’ll gladly hand over more detailed information. Just make sure every question in the form earns its keep.

Low Value Bids

For smaller asks like a newsletter signup, free eBook or a discount code, keep it short and sweet. Nobody wants to share their life story for 10% off. Requesting a name and email address is reasonable. Asking for their phone number or company name might feel too intrusive and send your would-be leads running for the exit.

How to Design Smart Lead Forms That Convert

Even a modest 1% boost in conversion rates can translate to up to a 20% jump in revenue — all without increasing your marketing spend. That lift can start with something as simple as a well-crafted lead form. An effective one should feel effortless to fill out while quietly doing the heavy lifting for your goals. Here’s how to design one that works in your favor.

Imagine the Final Form

Before adding fields, picture what you’ll actually do with the data once it’s collected. If your goal is to send personalized follow-up emails, you might only need a first name and email address as the rest becomes trimmings.

Think ahead to your next step. What information could be essential to drive the conversation forward? Build your form around the material you’ll truly use, not what simply looks useful on paper. After all, personalization drives 40% more revenue for companies, but that’s only if users trust you enough to share their data. 

What Data to Collect

Identify which fields are almost always useful for SMBs and marketers. Some of these are:

  • Name: The first name is helpful for personalizing communication, particularly for follow-up, as it builds familiarity and trust. This adds a human element even if your outreach is automated. However, using the full name might sound too formal. Still, it won’t hurt to collect both.
  • Email: This is your main communication line. It’s the standard way to do business, send updates and nurture them through your sales funnel.
  • Company name: Knowing where someone works helps you gauge lead quality. Small firms have different needs from enterprises. This lets you tailor your messaging based on company size, industry or relevance to your offer. 
  • Job title or role: This tells you who you’re talking to. Understanding their position helps you adjust your pitch when you know you’re speaking to a decision-maker versus an end user.
  • Business need or interest: This section gives context to show what your lead is looking for and how you can fulfill the need. It also helps prioritize follow-ups and craft more relevant value-driven responses.

What to Leave Out

There’s a fine line between getting to know your prospects and making them want to click the X button fast. Asking for sensitive details, such as complete home addresses, birthdays and financial information, is invasive and triggers instant distrust. Plus, collecting this information can also lead to privacy concerns. If your company’s gathered data is among the 30%-45% of data that remains unencrypted, it can be immediately read and used by threat actors in the event of a breach or leak. The less personal information you can collect, the safer your customers will feel if their data is ever exposed.

Even seemingly harmless fields, such as gender or sex, can backfire, despite being useful for tailoring marketing efforts to specific audiences. If you offer only two options, you risk alienating those who don’t identify with them. If you add more, you might offend those with more traditional views. It’s safer to leave it out unless it’s truly relevant to your product or service.

Instead, stick to what’s necessary for follow-up qualification. For B2B, include business-relevant data like company name or job title. B2Cs may settle for a name and email to do the job. 

Also, avoid long free-text sections unless absolutely necessary. Typing manually is perceived to be a high cognitive effort. Consider dropdowns, checkboxes or multiple-choice questions to reduce friction while still capturing relevant information.

Strategies to Balance Data Collection

Quantity does not always guarantee quality. Fortunately, some strategies help balance out what you need with what users are comfortable sharing. 

  • Progressive profiling: Don’t ask for everything upfront. Start with essentials like name and email and then collect more details, such as company size or needs, over time as you build trust with customers. 
  • Multistep forms: Instead of one long sheet, break it down into bite-sized steps so that it feels more manageable. 
  • Dynamic or conditional fields: Personalize the experience by showing only relevant sections based on previous answers. For example, if a user selects “Individual,” don’t show company-related questions. This keeps forms shorter and more contextual.
  • Test and optimize: In reality, no rulebook defines which way is best for your business. That’s why it’s important to conduct A/B testing to see what works and what doesn’t.

Forms are often psychological. Small tweaks in field order, color or wording can influence how people respond and you won’t know what works until you test it. The structure you’ve refined today might not be the one that performs best tomorrow. Continuous adjustments based on user behavior keep it effective and relevant. With 50% of marketers ranking lead generation as their top priority, optimizing forms is a direct path to better results.

Trust First, Data Second

While details about prospects help drive sales, trust remains the most valuable currency in business. People are more likely to share their information when they believe you’ll handle it responsibly. Collect only the data you genuinely need to qualify and follow up on leads — nothing more, nothing less. The goal isn’t to gather as much input as possible but to build lasting relationships that turn first-time visitors into loyal customers.

Don’t Fall for This (not a real) Red Bull Job Scam: How to Spot and Avoid Phishing Employment Fraud

A fake job offer landed in my inbox yesterday, and it’s a perfect example of how scammers are preying on desperate jobseekers. Here’s what you need to know to protect yourself.


The job market is brutal right now. With layoffs hitting every industry and competition fiercer than ever, jobseekers are more vulnerable to scams than they’ve been in years. Scammers know this, and they’re exploiting people’s desperation with increasingly sophisticated fake job offers.


Yesterday, I received this email that perfectly demonstrates how these scams work:

Hi Designweb,

It’s a great time to join Red Bull. We’re actively building teams across functions, and we believe your experience could be highly relevant. Rather than place you into a predefined role, we’d like to explore possibilities directly with you.

Use the link below to set up a short chat: https://www.redbull.com@rebrand.ly/join-redbull-for-career-growth-and-opportunities

For your convenience and data security, we use Facebook login to confirm identity, reduce duplication, and automatically fill required fields.

I’m here to support if needed.

Best regards, Joanne – Red Bull Careers

This might look legitimate at first glance, but it’s packed with red flags that scream “SCAM.”

The Red Flags That Give This Scam Away

1. The Malicious URL Structure

The biggest giveaway is that suspicious link: redbull.com@rebrand.ly/join-redbull-for-career-growth-and-opportunities

Real corporate websites don’t work this way. This URL structure means:

  • The actual destination is rebrand.ly (a URL shortener)
  • The redbull.com@ part is just window dressing to fool you
  • Clicking this link takes you wherever the scammer wants—definitely not Red Bull’s website

Legitimate Red Bull career pages would be hosted directly on redbull.com, like careers.redbull.com or redbull.com/careers.

2. The Facebook Login Trap

The email claims they use “Facebook login to confirm identity, reduce duplication, and automatically fill required fields” for your “convenience and data security.”

This is complete nonsense. Legitimate employers:

  • Don’t require social media logins for job applications
  • Use their own secure application systems
  • Never ask for access to your personal social media accounts

This Facebook login request is designed to steal your credentials and give scammers access to your entire social network.

3. Vague, Too-Good-To-Be-True Language

Notice how the email is deliberately vague:

  • No specific job title or department mentioned
  • No requirements or qualifications listed
  • No mention of how they found my contact information
  • Promises of special treatment: “Rather than place you into a predefined role, we’d like to explore possibilities directly with you”

Real recruiters are specific about roles, requirements, and why they’re contacting you.

4. Missing Legal Requirements

Here’s something most people don’t know: under the CAN-SPAM Act, commercial emails must include the sender’s physical address and clear unsubscribe options. This email has neither—a dead giveaway that it’s not from a legitimate company.

5. Generic Greeting and Poor Targeting

“Hi Designweb” which not only isn’t our business name, (It’s Designweb Louisville) it’s not even a name at all, which suggests this is a mass email sent to thousands of people using junk data they scrapped from the internet. A real Red Bull recruiter would use your actual name and reference specific skills or experience that caught their attention.

What These Scammers Are Really After

Job scammers aren’t just looking for quick money—they’re after something much more valuable: your personal information and digital identity.

Immediate Goals:

  • Steal your Facebook login credentials
  • Access your social media profiles and contacts
  • Harvest personal information (name, email, phone, work history)
  • Gain access to other connected accounts

Long-term Exploitation:

  • Identity theft using your personal data
  • Target your friends and family with similar scams
  • Sell your information to other criminal networks
  • Use your professional information to create fake profiles

Secondary Scams: Once they have your information, expect follow-up scams like fake background check fees, equipment purchases, or “training” costs.

How to Protect Yourself from Job Scams

Before You Click Anything

Verify Independently:

  • Go directly to the company’s official website
  • Search for the recruiter’s name on LinkedIn
  • Call the company’s main number to verify the opportunity
  • Check the company’s careers page for similar openings

Analyze the Email:

  • Look for specific job details and requirements
  • Check if your name is used (not just your email handle)
  • Verify that links go to official company domains
  • Look for proper corporate contact information

Red Flags That Should Make You Stop

  • Unsolicited job offers that seem too good to be true
  • Requests for social media logins or passwords
  • Vague job descriptions with no specific requirements
  • Immediate job offers without an application or interview process
  • Requests for personal information upfront (SSN, bank details, etc.)
  • Poor grammar, spelling, or unprofessional language
  • Missing company contact information or legal disclaimers

Safe Job Search Practices

Stick to Legitimate Channels:

  • Apply through official company websites
  • Use reputable job boards (LinkedIn, Indeed, company career pages)
  • Work with established recruiting agencies
  • Attend job fairs and networking events

Protect Your Information:

  • Never provide SSN, bank details, or passwords in initial communications
  • Be cautious about sharing too much personal information on public profiles
  • Use a separate email for job applications if possible
  • Trust your instincts—if something feels off, it probably is

The Bottom Line

The current job market has created a perfect storm for employment scams. Desperate jobseekers are more likely to overlook red flags, and scammers are taking full advantage.

Remember: legitimate employers don’t need your Facebook password, won’t ask you to pay for training or equipment, and will always provide clear contact information and detailed job descriptions.

When your job hunting, desperation can cloud your judgment. Take a step back, verify everything independently, and remember that if an opportunity seems too good to be true, it probably is. Also, don’t feel bad if you do fall for a scam. Even the best and brightest can sometimes fall prey to clever tricks. Identity theft is a multi-billion dollar industry, with recent data showing that annual losses in the United States alone amount to tens of billions of dollars. The crime continues to grow in scale and sophistication, affecting millions of individuals and businesses. So as embarrassing as it may feel to fall victim to these kinds of messages, you are not alone.

Stay safe out there, and don’t let scammers profit from your career ambitions. If you do get tripped up, be sure to take additional measured to secure your personal or private information and accounts. You can even protect yourself in advance by using two-factor authentication and possibly using a credit freeze to block thieves from opening new accounts in your name, should your information become compromised.

When Does Scrolljacking Work for SMB Websites — and When Does It Backfire?

Scrolljacking is a widely used but polarizing web design technique. Although it could help your small business meet visitor traffic goals, there are specifics to consider before implementing it. 

What Is Scrolljacking?

Scrolljacking — or scroll hijacking — occurs when website design decisions cause unexpected behavior when people progress through content. That may mean text and images appear on pages at a different rate than the scrollbar’s movement suggests, or that the scrollbar disappears altogether. 

What Are the Pros and Cons of Scrolljacking? 

Like virtually all design possibilities, scrolljacking has both advantages and disadvantages. Small businesses frequently use it to trigger animation, which catches attention and increases dwell time. 

Some people strongly dislike scrolljacking because it can feel disorienting and remove their sense of control. It often prevents site visitors from verifying their page position. One web designer who criticized it likened scrolljacking to conveyor-belt content, especially when vertical pages seem to go on forever. 

Because scrolljacking encourages site users to focus on what designers want to emphasize, it is helpful in guiding them through the content to tell stories, highlight product features or announce companies’ recent achievements. Unrestricted use of the scrollbar inevitably means people may skip over content that brands deem essential. There are also more advisable ways to get visitors to the right places. One best practice is to use single-column layouts and hamburger menus, which look great on all screen sizes and support a minimalist design. 

Scrolljacking can also make websites less accessible. As one digital accessibility blogger points out, people use various methods to navigate through online content, including screen readers, keyboards and their voices. That blogger suggests never making scrollbars invisible or changing their colors because that may frustrate users. Scrolljacking forces people to go through content in a rigid, predefined way, which does not suit everyone. 

How Should Small Business Websites Utilize Scrolljacking? 3 Real-World Case Studies

Small businesses can use scrolljacking to build their brand and emphasize style. New York’s SVA Branding Studio is a small design program that successfully relies on this approach to amplify the visual appeal while advertising its Masters in Branding program. As people scroll through the content, images gradually appear on the screen, making it seem like visitors are moving through space. Many graphics — such as a pencil and a New York City street sign — relate to the school’s discipline and location to strengthen recognition. 

Scrolljacking also prevents distractions, as the designers of Qode Interactive understood when creating a portfolio page for this WordPress development company. This example prevents people from scrolling and encourages them to browse horizontally aligned content. Clicking on each entry activates eye-catching animation and briefly describes individual projects, capitalizing on the creators’ potential. 

Small-business owners should also consider using scrolljacking when presenting content chronologically. That was the technique applied to part of the website for Chaletbau Matti, clarifying its history. This family-owned Swiss firm specializes in luxury home construction and design. Rather than scrolling through the content, people hold the down-arrow key as words and images gradually appear on the screen. The website’s main sections also appear on the screen’s borders, allowing visitors autonomy over what they see and when.  

Is Scrolljacking the Right Strategy for Your Site?

Although scrolljacking can improve users’ focus and steer them through the content, some people dislike giving up the control their scrollbars formerly provided. Consider your primary goals before implementing this option, and assess whether some of its downsides may unintentionally drive frustrated users away. 

Choosing site engagement metrics to track is also valuable. Those statistics can show whether people spend more or less time browsing the content when scrolljacking principles are applied. Let individual feedback guide your decisions, too. Screen sizes, internet connection speeds, computer setups and other particulars can influence whether someone has a positive experience on websites designed with scroll hijacking. Users’ opinions can help you determine if good experiences significantly outweigh the occasional annoying ones.

How SMBs Can Stay Competitive Online in the Age of AI Overviews

AI Overviews (AIO) now appear on top of many search engine results pages (SERPs). They summarize answers before a click and nudge users to decide faster. Small businesses that want traffic and leads must adapt content, structure, and measurement so visibility turns into action. The playbook has shifted but not disappeared.

What AI Overviews Change About User Behavior

Independent user experience (UX) research shows people skim AIO panels hard and click sparingly. In testing across 70 searchers, only 19% on mobile clicked an AIO citation, and just 7.4% did so on desktop. The median scroll depth inside the panel hit 30%, which means most users never read past the top third. When they leave, about a third go to Reddit, YouTube or forums to validate what they saw.

That pattern creates two imperatives for small businesses — earn visibility high in the AIO panel and win the follow‑up click wherever users validate, especially on community and video platforms. The SERP still matters, but so does being the credible brand that shows up in the places people check next.

Where Small Businesses Still Win in Search

The tactics that work share a simple idea — match intent fast, show proof and invite action. Before listing them, it helps to frame the goal. AIOs compress attention, so the first screen of content and the way a page describes itself to machines carries weight. Each tactic below pushes visibility up the screen and gives people a next step.

Ship “Answer Pages” With Structured Data

When a page answers a specific question, mark it up so machines understand the page type. For e-commerce, use Product and Product Variant structured data to clarify sizes, colors, or other variants. For service businesses, add LocalBusiness markup to reinforce hours, locations and services. These formats help Google qualify rich results and keep key details visible.

Front-Load Originality

AIOs summarize what already exists. Small businesses can beat sameness with proprietary elements — price tables, local checklists, before‑and‑after galleries, mini case studies, short expert quotes and troubleshooting flowcharts. Place the distinctive element in the first 200-300 words so skimmers see it.

Answer + Proof + Next Action

Structure key sections with a tight answer, one piece of proof, then a call to action. For example, for a roofing contractor, “Average shingle roof lasts 20-25 years in Bakersfield. Our 2024 installs average 21.8. Get a same‑day estimate.” That format works in snippets, AIO citations and landing pages.

Publish Content that Earns Non‑SERP Clicks

Users often validate on social video and forums. Pew Research data shows YouTube remains the most widely used platform among U.S. adults, with TikTok growing. Short explainers, tool demos and honest teardown videos meet users where they check for proof.

Make FAQs Scannable and Eligible

Add a compact frequently asked questions (FAQ) block answering search‑phrased queries. Keep answers short, unique and helpful. Pair it with the correct FAQ structured data and monitor eligibility in the Search Console.

Content that Still Earns Clicks in a Zero‑Click World

Attention behaves like a spotlight, and pages that win clicks create value the summary can’t replace. The following approaches work across industries:

  • Localized “how much” and “how long” explainers: People want time and cost. A dentist can compare whitening options with clear price ranges, treatment time and sensitivity notes. A home services company can publish permit timelines by city with a printable checklist.
  • Visual evidence beats generic claims: Use photo carousels with captions, quick reels, annotated screenshots and short table summaries. Users skim and stop when proof shows up.
  • Tools and calculators: Build a simple estimator, a self‑audit checklist or a “fit finder.” These artifacts can generate bookmarks, shares and branded search later.
  • Opinionated takes from real practitioners: Experience, Expertise, Authoritativeness and Trustworthiness gets clearer when a named expert explains what they would choose and why. Attribute content to the practitioner and add a short bio.

Content marketing rewards expertise, creativity and consistency more than oversized ad budgets, which makes it one of the friendlier ways to attract, engage and convert a target audience. Positive return on investment (ROI) means the business earns more than it spends, and negative ROI means the opposite.

Use AI Smartly — Not Everywhere

Teams raced to implement artificial intelligence (AI) last year. Then reality kicked in. One 2025 study found that while 63% of respondents ran five or more AI use cases in 2024, 64% now run fewer than five. Leaders narrowed bets to proven, profitable workflows. For small businesses, that often means a short list, like ad copy ideation, first‑draft outlines, customer support summaries and lead triage.

Google points small businesses to similar high‑leverage tasks inside Workspace — drafting emails and posts, summarizing customer communications, organizing Sheets and building quick visuals in Slides. Tools help, but humans decide tone, accuracy and action.

Measure What Matters When Clicks Drop

Reporting needs a refresh when AIOs absorb intent. Before the list, set one expectation — impressions and branded search volume will matter more as directional signals, and conversion rates from qualified pages will tell the real story:

  • Track impressions and position by query in search console: Watch impressions rise even when clicks flatten. Pair position and impression trends to spot where AIOs appear more often and where you still win traditional clicks.
  • Monitor Google Business Profile (GBP) actions: Calls, messages, website clicks and direction requests show local demand independent of website visits. GBP’s Performance view reports these actions for Search and Maps.
  • Instrument scroll depth and time to first interaction: Skimming dominates AIO behavior, so pages must load fast and present value above the fold. Track scroll and first interaction events to validate that.
  • Tag every surface: Use UTM parameters on GBP links, social bios and email footers so non‑SERP discovery gets proper credit in analytics.

Practical SEO Moves for AIO visibility

Many teams ask what to do first. The best starting moves create both machine and human clarity:

  • Tighten the “entity layer:” Add organization-structured data to the homepage, make your name, address and phone consistent, link to active social profiles and key directory listings, and ensure author bios exist on expert pages. This disambiguates the brand in knowledge graphs.
  • Upgrade product and service markup: E-commerce stores should implement Product Variant markup so Google can display variant details in search. Service entities should use LocalBusiness markup on location pages with precise hours, operating areas and booking actions.
  • Build a “proof bar” above the fold: Add trust signals early — star rating source, number of projects, certifications, a short testimonial with a name and a photo badge. Skimmers decide fast.
  • Consolidate thin pages into topic hubs: A single strong hub with jump links usually beats five thin posts. It also gives AIOs a clean citation target.

Quick Plays That Work With AI Overviews Now

These ideas require modest effort and deliver an outsized impact. The approach is simple — ship once, compound over time, like the following:

  • An FAQ hub that answers search‑phrased questions for each flagship product or service, with FAQ structured data and one clear next step on every answer
  • A comparison page — your service vs DIY, your brand vs common alternatives, or solution A vs solution B with pros, cons and use cases
  • Short video proof on YouTube and Shorts for each core page — 60-90 seconds that show how something works or what to expect, then link back to the page to meet users where they are
  • A price or estimator page with plain ranges, inclusions, and exclusions linked on every sales email and profile
  • A “best of” local resource that curates vendors or steps people need before they hire you

Small businesses that trim AI experiments to a few proven use cases, invest in original content and use visibility tools will keep winning. Teams should treat AIOs as a new display shelf, not a dead end. The shelf rewards clarity, fast proof, and strong brands across web, video and community.

Win AI Overviews with Unmistakable Usefulness

Small businesses don’t need louder messages — they need sharper ones. AIOs compressed the buyer’s glance into seconds, so the team that answers with authority, shows proof and offers the next step first will keep earning attention. Build pages that help people finish a task, and the clicks that still happen will be the ones that count.