Transition from call ads to responsive search ads with call assets

Google Is Killing Call-Only Ads: Here’s What You Need to Do

If you’ve been running Google Ads for a while, you may have gotten an email recently with the subject line “Action Required: Transition from call ads to call assets.” Google has been talking about this change for a while, but now it’s official. Call-only ads are going away, and if you don’t make some updates, your ads will stop showing.

Here are the key dates:

February 2026 is when you lose the ability to create new call-only ads. February 2027 is when your existing call-only ads stop running entirely.

So you have time, but not unlimited time. Let’s walk through what this means and what you need to do.

First, Check If This Even Affects You

Not everyone needs to worry about this. Call-only ads are a specific ad type where the only thing the ad does is trigger a phone call. There’s no website link. When someone taps the ad, it just dials your number. These were popular with service businesses like plumbers, auto repair, locksmiths, and anyone else who just wanted the phone to ring.

If you’re running regular search ads that happen to have a phone number attached, you’re already set up the way Google wants. That phone number is a “call asset,” and you’re good to go.

To check, log into your Google Ads account and look at your ads. If you see ads that have a website URL and a phone number, those are search ads with call assets. You’re fine. If you see ads where the only action is “Call” with no website destination, those are call-only ads, and those are the ones you need to replace.

Why Google Is Making This Change

Google wants everyone using responsive search ads. These are the ads where you provide multiple headlines and descriptions, and Google’s system mixes and matches them to find the best performing combinations for different searches.

The old call-only ads were simple. You wrote your headlines, attached your phone number, and that was it. Google is moving away from that kind of static ad format across the board. They want the flexibility to test different combinations and optimize automatically.

Whether that’s actually better for your business is a fair question, but it’s the direction things are going and it is always good to stay in compliance.

How to Make the Switch

If you do have call-only ads that need to be replaced, here’s the process:

Start by documenting what you have. Look at your existing call-only ads and write down the headlines, descriptions, and which campaigns they’re in. Note the performance numbers too so you have a baseline to compare against later.

Next, create your call asset. Go to Assets in the left menu, then click the plus button and select Call. Enter your business phone number. You can set it to only show during your business hours, which is useful if you don’t want calls coming in at 10pm.

Then create a new responsive search ad in the same campaign or ad group where your call-only ad was running. You’ll need at least 3 headlines and 2 descriptions, but you can add up to 15 headlines and 4 descriptions. Use the copy from your old call-only ad as a starting point, then add variations.

Once your new responsive search ad is running with the call asset attached, let both ads run side by side for a few weeks. Compare the results. When you’re confident the new setup is performing well, pause the old call-only ad.

So to recap here is what you need to do:

Create responsive search ads with call assets.

This is the actual migration. You’ll need:

  • 3-15 headlines (at least 3 required)
  • 2-4 descriptions (at least 2 required)
  • A call asset attached at the campaign or ad group level with your phone number

Set up the call asset

This is under Assets > Call. You can set it to show only during business hours, which is nice for a service business like auto glass.

Let both run in parallel for a bit

Compare performance before sunsetting the old call-only ads.

Don’t Wait Until the Last Minute

You have until February 2027 before your call-only ads stop serving entirely, but I wouldn’t recommend waiting that long. Making the switch now gives you time to test and optimize. If something isn’t working, you want to find out while you still have your old ads as a backup.

If you need help with this transition or want someone to handle it for you, feel free to reach out.

Hiring a Writer vs Hiring a Voice Clone

We talk to a lot of small business owners. One of the most common things we hear is this: “I know I need to be putting out more content. I just do not have the time to write it.”

This is a real problem. Written content (emails, social media posts, blog articles) are often the biggest bottleneck for small businesses. The owner knows their business better than anyone. They know what makes it special. They know how to talk to their customers. But they are also running the business, which does not leave much time for writing.

The Usual Solutions are not always solutions.

Most business owners try one of two paths.
The first is AI. Tools like ChatGPT can generate first drafts quickly, and that is genuinely helpful. But the output tends to sound like ChatGPT. It is polished in a generic way. It does not sound like you.

The second is hiring a writer. This can work, but it is tricky. Professional American writers are expensive, and many small businesses cannot afford them. Writers on platforms like Upwork can fit the budget, but the results are often disappointing. You send them a ChatGPT draft and some direction. You get back something that is not much better than what you started with.

The writer is polishing AI-generated content rather than actually writing in your voice.

The core problem is that most writers do not know how you think, how you talk, or what makes your perspective different from everyone else in your industry. And teaching them is hard, especially when you are already short on time.


There is another option that has worked well for us, and for the clients we have recommended it to. It is called a voice clone writer.

Here is how it works. You spend about an hour on the phone with the writer. They interview you. They ask about your business, your customers, your goals, your opinions. They are not just gathering information. They are listening to how you say things. The rhythm of your sentences. The words you reach for. The way you explain complicated ideas.
Then you provide a few examples of your existing work. Emails you are proud of. Social posts that performed well. Anything that sounds like you at your best.

The writer takes all of this and creates a style template based on you. Not a generic brand voice guide, but an actual model of how you communicate. And then they use that template to write content that sounds like you wrote it yourself, on a day when you had plenty of time and a clear head.


It is a little wild, honestly. The first time you read something back and think “that sounds exactly like me,” it catches you off guard.


What does a voice clone cost?


We charge around $55 an hour for this kind of work. That is not nothing, but it is also not the $150 to $300 an hour that top-tier American copywriters charge. And the return on investment is significant, because you are not just getting content. You are getting content that actually represents you.


The interview takes about an hour. After that, you have a style template that can be used again and again. The ongoing writing becomes much faster because the writer already knows your voice.

Your voice is one of the few things that cannot be commoditized. Anyone can use the same website template. Anyone can run the same kind of ads. But nobody else sounds like you, thinks like you, or has your specific perspective on your industry.


The problem is that capturing voice is hard.

It requires someone who knows how to listen, how to ask the right questions, and how to translate what they hear into written words. That is a real skill, and it is worth paying for.


If written content is your bottleneck (and for most small businesses, it is) this might be worth exploring.


Design Web Louisville is an employee-owned web development company. We build websites, and we believe your voice is worth preserving.

AI Is Just the Newest Tool in the Artist’s Kit

We have been building websites for a long time now. Long enough to watch tools come and go, and long enough to notice a pattern.

Every time a new tool arrives, people push back. They say art made with the new tool is not really art. They said it about the printing press. They said it about the camera. They said it about Photoshop and Illustrator. They are saying it now about AI. And we understand, change is hard. It can feel like something is being lost.

But we have come to embrace these new tools, because we have seen what they actually do: they open doors.

Some believe art cannot be art unless it is made by an artist. But who decides who qualifies as an artist? We already celebrate conceptual artists who work entirely in ideas, artists whose vision is the art itself, executed by others or by machines or by time. The concept is the contribution.

Who is an artist?

So what about a small business owner who has a vision for their brand? They know exactly what they want to communicate. They understand their customers, their community, their story. If they use AI to bring that vision into the world, why should we dismiss them?

We think they are artists too.

Here is what we have seen and why we believe what we believe.

At Design Web Louisville, we have had clients come to us with AI-generated images, a logo concept they created, a visual direction they explored. They ask us to refine it, to convert it into proper file formats, to make it work across their website and print materials. Sometimes that means completely redrawing the design in vector format. Sometimes it means significant revision.

And honestly, this is not new.

Back in the day, people brought us logos drawn on napkins. Rough sketches. Ideas scribbled in the margins of notebooks a magazine ad with text written across an image they liked. The execution was never the point, the vision was. AI is just a different way of sketching. It’s the newest best napkin sketch and it’s so helpful for those who are afraid to try to create with their hands.

Ai opens doors to new artists who create with ideas.

We respect all artists. Firstly, we pay our artists well; photographers, illustrators, developers who create animations. They all use different tools. What they share is vision, and the ability to direct their tools toward that vision. So before you start in with how Ai is stealing jobs, at least for our small part of this industry we still pay the same artists the same wages. Partly because we love our team and entirely because they deserve to be compensated for their work, regardless of the tools they use.

A hammer does not build a house. A camera does not take a photograph. And AI does not create art. People do. The tool is just the tool.

This pattern repeats throughout history. In 1492, the German abbot Johannes Trithemius wrote that “printed books will never be the equivalent of handwritten codices.” In 1474, a Venetian scribe named Filippo de Strata called the printing press a “meretrix” (prostitute) and petitioned the Doge to ban it entirely. In Paris in 1476, a group of scribes attacked and physically destroyed a printing press, fearing it threatened their craft and their livelihoods.

Nearly four centuries later, the same arguments emerged against photography. In 1859, the French poet Charles Baudelaire called photography “art’s most mortal enemy,” warning that it would corrupt true art thanks to “the stupidity of the multitude.” Many painters believed the camera required no skill, no vision, and that it was purely mechanical, and therefore could never be art.

And more recently, in the 2000s, digital artists faced the same dismissals. Traditional artists rolled their eyes at Photoshop. The criticism was familiar: the computer was doing the work, not the artist. Digital art was not “real” art.

And here we are, still full of art, still creating, still animating and building and producing. The best work is still guided by the vision of the person behind it.

The raw truth, Ai isn’t even faster than traditional art. You still have to research the design, check it against IP that already exists, scour it for little failures like extra fingers and other funny things like oddly shaped stars in flags. It is not a fast tool because it requires so much QA and scrutinizing, it’s not even a cheap tool, costing more per month than most stock photography membership services when you use the professional level of access and use, and that price is bound to increase since the current model is running at a loss.

What Actually Matters

It is the humanity in the words, not the perfection in the grammar. It is the person, not the polish. The direction is what is beautiful. That is what we respect, and that is what we look forward to seeing, hearing, and experiencing more of, from anyone brave enough to pick up the tools and try.

AI will change everything. But it will stay the same too.


Design Web Louisville is an employee-owned web development company. We build websites, and we believe anyone with a vision deserves help bringing it to life.

Why Your Business Needs a Website Recovery Plan (+ How to Create One)

Your website is often the first place customers interact with your brand, especially as more people shop or research online. If it goes down, whether intentionally or not, it could impact customer trust and revenue. A website recovery plan becomes indispensable in these situations. Setting one up early provides a solid safeguard when you actually need it.

What Is a Website Recovery Plan?

A website recovery plan is an organized and documented strategy that outlines how your organization will restore its site after an unexpected disruption. It aims to get the site back online as soon as and as securely as possible, with minimal losses in data or functionality.

Website downtime can happen for various reasons. It could come from malicious attacks, human error or server downtime. In October 2025, an Amazon Web Services outage took hundreds of websites that relied on its services down with it, including major brands and institutions like WhatsApp, The New York Times, Venmo and even the British government’s website and tax services.

Why a Recovery Plan Is Nonnegotiable

With over 1.1 billion websites on the internet, some downtime is inevitable. Still, actively fixing the situation through a recovery plan is essential to minimize losses and ensure business continuity. These are some of the key reasons why your business needs a website recovery plan.

Financial Protection

Website downtime costs money. Lost sales, missed leads, delayed campaigns and customer refunds can add up. A clear recovery process allows you to restore your website from trusted backups and avoid rushed fixes, protecting your finances and everyday operations.

Reputation Management

Customers expect reliability. Website issues without a clear response can affect their confidence in your company. Even if the problem is temporary, broken pages and unresponsiveness make you appear unreliable. 

A website recovery plan enables you to develop a consistent and professional response for most scenarios. It defines how you address issues and share updates, ensuring you maintain credibility while fixing technical problems.

Reduced Employee Stress

Around 83% of U.S. employees report experiencing daily work-related stress, and reducing anything contributing to this number means happier employees, higher productivity and less turnover. When a website goes down, and the business has no documented plan, teams become stressed. They scramble to identify the problem, and pressure escalates, which usually happens outside their regular working hours or responsibilities.

A recovery plan brings clarity and reduces this burden. Employees know what to do and who to ask for assistance. This structure lowers anxiety and leads to more effective problem-solving.

5 Steps to Create a Website Recovery Plan

A website recovery plan should be tailored to each business, as each has unique priority assets or security needs. These steps present a quick guide to help you get started.

1. Identify and Assess Risks

The first step in forming a website recovery plan is identifying realistic threats, such as hosting outages, accidental deletions or cyberattacks. Then, evaluate how likely and damaging each would be. This assessment helps you prioritize planning efforts and ensures the recovery plan focuses on scenarios that can affect you the most.

2. Inventory Your Website Assets

A complete inventory ensures all critical assets can make it through the restoration process and that your website can remain functional. This inventory should include:

  • Hosting provider and login credentials
  • Domain registrar details
  • Content management system admin access
  • Database information
  • Essential plugins, themes and third-party integrations (APIs)

3. Define Roles and Responsibilities

An effective recovery plan clearly defines who is responsible for initiating recovery, restoring backups, contacting vendors and communicating updates to customers. Clear ownership ensures accountability and efficiency, minimizing confusion or missed steps.

4. Back Up All Critical Data

According to the Disaster Recovery Journal, only 42% of organizations recover all their data after a restoration process. This data highlights the importance of regular backups. You never know when an outage or attack can occur, so it’s essential to stay prepared.

Set up automated, frequent backups of files and databases to ensure you always have updated versions of your files. It’s also best to maintain multiple backup versions and keep them in an off-site or cloud-based storage solution separate from your hosting environment.

5. Test and Validate Your Plan

Regular testing through drills or mock restores can help you find gaps or outdated information in your current plan. It also builds confidence within your team by allowing staff to learn through practice, which can help them respond faster and more calmly when an incident does occur.

Preparation Pays Off

A website recovery plan is a practical tool to ensure resilience in a volatile online environment. It protects your revenue and reputation and maintains operational stability amidst high-stress situations. The risk of downtime will always exist. It’s what you do to protect your business that matters.

Why are my styles missing?

WordPress 6.9 Is Doing Something Weird With Your Styles

Well, WordPress 6.9 dropped on December 2nd, and if your website suddenly looks like it forgot to get dressed this morning, you’re not alone.

What’s Happening

The WordPress core team made some performance improvements to how stylesheets load. The short version: they increased the inline style limit from 20KB to 40KB and changed how block styles load on-demand for classic themes. These are genuinely good changes for page speed.

The problem is that some themes and plugins—Elementor sites in particular—are now missing CSS. Layouts are collapsing. Fonts are wrong. Hero sections have wandered off somewhere. It’s the kind of thing that makes you stare at your screen and quietly say “huh” for longer than you’d like to admit.

The Fix

There’s a one-line code snippet that tells WordPress to load block styles the old way:

add_filter( 'should_load_separate_core_block_assets', '__return_false', 100 );

You can drop this into your theme’s

functions.php

file or create a simple must-use plugin. If those words mean nothing to you, that’s okay. Keep reading.

Your Options

Option 1: Turn off automatic updates and wait

This is the “I’ll deal with it when they fix it” approach. WordPress will patch this. They always do. In the meantime, you can disable auto-updates for core and stay on 6.8.3 until the dust settles.

To disable auto-updates, add this to your

wp-config.php:

define( 'WP_AUTO_UPDATE_CORE', false );

Option 2: Apply the fix yourself

If you’re comfortable editing theme files or creating a must-use plugin, the code snippet above should sort you out. Back up your site first. Always back up your site first.

Option 3: Hire someone to fix it

If you’d rather not touch code, we can apply the patch for you. It takes us just a few hours to get in there, verify the issue, apply the fix, and test everything. Our rate for this kind of quick fix is $500.

Contact us to schedule a patch.

Should You Panic?

No. This is just WordPress being WordPress. The open-source sausage gets made in public, and sometimes a piece of gristle gets through. The core team is aware of the issue, Elementor is working on compatibility updates, and life will go on.

If your site looks fine, congratulations. You can close this tab and get back to your day.

If your site looks like a ransom note made of mismatched fonts and collapsed columns, well, now you know why.


Design Web Louisville helps businesses and nonprofits keep their WordPress sites running smoothly. If you’d rather not think about things like inline style limits and block asset loading, we offer monthly maintenance plans that handle updates, backups, and the occasional “WordPress is doing something weird” situation.

The Web Professional’s Guide to Industry-Specific Cybersecurity Standards

For modern web professionals, building a great website is only half the battle — the other critical half is securing it. Cybersecurity is not a one-size-fits-all strategy because different industries have unique and often legally mandated standards. Every designer, developer and business owner must understand these industry-specific standards to protect their clients and their businesses. 

This guide walks you through the different cybersecurity rules governing e-commerce and finance, health care, education and general data privacy, so you can build sites with confidence.

E-commerce and Finance — Complying With PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a global rulebook created by the Payment Card Industry Security Standards Council to protect payment data from the moment it is captured through transmission and storage. It applies to any business that accepts or transmits credit card information. 

Protecting this data is a top priority. According to a PwC report, 78% of organizations expect their cyber budget to increase over the next 12 months, as businesses continue to face a widening array of cyber risks. Investment in artificial intelligence was identified as the top priority, followed by cloud security, network security and data protection. This points to greater scrutiny, more tools and higher expectations on anyone building checkout experiences. 

For web professionals, the golden rule is never to store card data. Storing credit card numbers, expiration dates or CVV codes on the server creates a massive and unnecessary liability. While the client is responsible for compliance, the design and development choices directly affect their ability to follow standards. 

The most effective way to handle this is to offload risk by integrating PCI-compliant gateways that handle sensitive fields in their own secure environment. On the developer’s side, a hardened network and application stack must be maintained. The standard expects strong passwords, patched software and no vendor-supplied defaults on any device or app that could touch the card data environment. These basics are directly addressed by the Council and remain among the leading causes of breaches among small merchants. 

Health Care — Adhering to HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) sets national rules for protecting health information. The Privacy Rule limits when protected health information can be used or disclosed, while the Security Rule requires administrative, physical and technical safeguards for electronic protected health information (PHI). 

The health care industry has been a frequent target for attackers, and the fallout can include exposed records, regulatory penalties, class action lawsuits and lasting loss of patient trust. High-profile incidents from recent years at major insurers and hospital systems have shown how a single compromised portal or third-party tool can compromise millions of records and disrupt care operations. 

The cases of Anthem, Excellus, Premera and the UCLA Health System in 2015 alone exposed millions of patient records. These cases highlighted that overlooked systems, such as printers and portals, can be the weak link that triggers heavy regulatory and financial fallout. Anthem, for example, found its database of potentially up to 80 million people exposed after its administrator’s credentials were hacked. In the same year, up to 11 million client records under Premera Blue Cross were compromised.

The Meaningful Use program is designed to reward organizations for improving quality, safety and patient privacy by digitizing health records. Yet within most health care institutions, it is typical that 25%-35% of patient data is in analog format. This creates a need for IT to secure the flow of information and transfer physical documents into the digital world. 

As a web professional, your projects should encrypt data in transit and at rest on servers that host any PHI. Use secure forms that never send protected details through standard email, and choose hosting and key vendors willing to sign a Business Associate Agreement, since they become part of the compliance chain. Enforce role-based access so only authorized users can see protected data, and document a risk analysis process that you can repeat with each major feature release. 

Education — Understanding FERPA

The education industry is governed by the Family Educational Rights and Privacy Act (FERPA). This law protects student record privacy, including grades, class schedules, disciplinary records and other personally identifiable information. It applies to all schools that receive funds from the U.S. Department of Education, as well as to third parties acting on their behalf. 

If you are building for an educational institution, design with those rights in mind. Student portals must require individual, secure logins. Do not publish grades or schedules on public pages, and use role-based access so students, parents and staff see only what their role allows. The Department of Education’s student privacy program provides guidance for edtech vendors, which you can use as a checklist during procurement and integration. 

A practical pattern is to centralize authentication and authorization, then pass only the minimum data needed for each tool. Maintain an inventory of vendors that receive student information and map the fields you send to prevent accidental data sharing. 

General Data Privacy — Navigating GDPR and CCPA

Beyond specific industries, general data privacy laws have a huge impact on web development. The two most prominent are the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA). These laws are not industry-specific. They are location-based and focus on giving individuals rights over their personal data. If you work with visitors from these regions, your site must respect these frameworks. 

For day-to-day builds, this means three things:

  • Writing privacy policies in clear language, explaining what you collect and why
  • Presenting consent controls for cookies that process personal data, with an option to reject on the first layer and no pre-checked boxes 
  • Preparing for user data requests by incorporating the export and deletion processes into your operational workflow 

GDPR and CCPA require fundamental changes to how a site is built and managed, so focus on structured development from the outset. You can standardize privacy features across projects, such as preference centers, consent banners and data request forms by using well-documented, reusable parts. You can save money and stay compliant by designing versatile and easy-to-understand modules. This way, you do not have to write the same logic and behavior stays consistent across sites. 

Building Trust Through Security

Security is part of your job. Knowing the different industry-specific security rules is not only important to avoid sanctions, but also to build trust, keep users safe and establish a reputation for quality and safety. Be a proactive collaborator with your clients as they work on their security.

Understanding Link Farms and Private Blog Networks: Why Google Penalizes Them (And How They Catch You)

If you’ve been managing a website for any length of time, you’ve probably heard warnings about link farms and Private Blog Networks (PBN). Maybe you’ve even been approached by someone offering to get you “high-quality backlinks” through their network of sites. These offers can sound tempting, especially when legitimate link building feels slow and difficult.

But there’s a reason Google explicitly prohibits these practices. And there’s a reason they’ve gotten increasingly good at catching people who use them.

Let’s talk about what these schemes actually are, how they work, why they fail, and what Google does to the sites that participate in them.

What Is a Link Farm?

A link farm is exactly what it sounds like – a website or group of websites that exist primarily to create links. These sites aren’t built to serve readers or provide genuine value. They’re built to manipulate search engine rankings by artificially inflating the number of backlinks pointing to target websites. With Ai making content development much easier and faster this is going to be the next big issue to worry over in the Google updates to come.

How Link Farms Work

The basic operation is straightforward. Someone creates multiple low-quality websites or acquires domains specifically for linking purposes. These sites get filled with thin content – articles that exist only to hold links. Then they sell links on these sites to anyone willing to pay.

The articles often look somewhat legitimate on the surface. They might be about real topics and contain actual sentences. But if you read them carefully, you’ll notice they’re generic, poorly researched, and exist mainly to justify the presence of several outbound links. They are created quickly, often without even being read or reviewed.

A most recent example would be the scandal over an article written that reviewed current popular books, but as the internet would soon discover, those books? They didn’t exist. They were part of an Ai hallucination. No one read the article, they just pumped it out and published it to get some link backs. It is happening more an more often too. Here is another example of an AI-generated summer reading list featuring fake books: https://www.npr.org/2025/05/20/nx-s1-5405022/fake-summer-reading-list-ai

Link farms operate at scale. A single operator might run dozens or hundreds of sites, churning out content continuously and selling links across all of them. The whole operation is designed to look natural to search engines while being completely artificial.

Why People Use Them

The appeal is simple: speed and control. Earning legitimate backlinks takes time. You have to create genuinely valuable content, build real relationships, and wait for other websites to discover and link to your work organically.

Link farms promise to skip all that. For a fee, you get backlinks right now from sites that appear to have authority. For businesses under pressure to show SEO results quickly, that can seem like an attractive shortcut.

The problem is that shortcuts in SEO almost always become sinkholes eventually. SEO needs a solid foundation. If you build your marketing foundation on bad decisions, quick cheats and cut corners, then just like a real house, it will not hold up for long.

What Is a Private Blog Network (PBN)?

A Private Blog Network is a more sophisticated version of a link farm. Instead of obvious low-quality sites, PBN operators create what look like legitimate blogs and websites. They might use expired domains that used to be real businesses. They might fill the sites with decent content. They might even generate some real traffic.

But underneath all that camouflage, the purpose is the same: to create controlled links that manipulate search rankings.

How PBNs Differ from Link Farms

PBNs try harder to look legitimate. Where link farms are obviously thin and artificial, PBNs invest more effort in their facade:

  • They use diverse domain names and hosting providers
  • They create content that sounds more authoritative
  • They might interlink between network sites to simulate a real web of related content
  • They vary their link patterns to avoid obvious fingerprints
  • They sometimes mix in legitimate content alongside their paid links

The goal is to make each site in the network look like an independent, authentic website that just happens to link to the target sites. In reality, they’re all controlled by the same operator and exist for the same manipulative purpose.

The Economics of PBNs

Running a PBN requires more investment than a basic link farm. Operators need to buy or lease multiple domains, pay for hosting across different providers, create more convincing content, and maintain the sites to keep up appearances.

They recoup these costs by charging more for links. A link from a PBN site might cost anywhere from fifty dollars to several hundred, depending on how established and legitimate-looking the network appears.

For the PBN operator, it’s a business model. For the people buying links, it’s a gamble. And for Google, it’s a violation of their guidelines.

How Google Detects Link Schemes

Google has spent nearly two decades getting better at identifying artificial link patterns. What worked in 2005 doesn’t work now. What might slip past their algorithms today probably won’t work next year.

Here’s how they catch these schemes:

Pattern Recognition at Scale

Google’s algorithms analyze billions of links across the web. They look for patterns that deviate from natural linking behavior:

  • Large numbers of low-quality sites all linking to the same targets
  • Sites that link out to many unrelated websites with no clear editorial reason
  • Sudden spikes in backlinks from sites with no previous relationship
  • Networks of sites that share hosting infrastructure, WHOIS information, or content patterns
  • Links that use overly optimized anchor text across multiple sites

When Google’s systems spot these patterns, they flag the sites involved for further review.

Content Quality Signals

Google’s algorithms evaluate the quality of the content surrounding links. They can identify thin content, keyword-stuffed articles, and text that exists only to justify links.

If a site consistently publishes low-quality content with suspicious linking patterns, that site loses credibility in Google’s eyes. Links from that site stop passing value. Eventually, the site might be removed from search results entirely.

Network Footprints

PBN operators try to hide the fact that multiple sites are part of the same network. But hiding those connections is harder than it looks:

  • Similar WHOIS registration information across domains
  • Shared IP addresses or hosting providers
  • Similar site templates or design patterns
  • Overlapping Google Analytics or AdSense IDs
  • Similar content structures or writing styles
  • Cross-linking patterns between network sites

Google’s algorithms are specifically designed to detect these footprints. When they identify one site in a network, they can often uncover the entire operation.

Human Review

Beyond algorithms, Google employs human reviewers who manually evaluate suspected violations. If your site gets flagged for suspicious links, a real person might look at it and make a judgment call.

Manual reviews are particularly common for competitive industries where the stakes are high and people are more likely to push boundaries.

Competitor Reports

Google also accepts spam reports from webmasters who notice suspicious link patterns pointing to competitor sites. While Google doesn’t act on every report, documented patterns of link manipulation can trigger investigations.

This means even if Google’s algorithms don’t catch a scheme immediately, someone else in your industry might spot it and report it.

What Happens When Google Catches You

Google doesn’t issue warnings before penalizing link scheme participation. When they detect a violation, they act. The consequences depend on the severity and nature of the violation, but none of them are good for your business.

Algorithmic Devaluation

This is the most common outcome. Google’s algorithms simply stop counting the manipulative links. Your rankings drop to where they would have been without those artificial backlinks – or lower, if Google applies a ranking suppression.

You might not even receive a notification. You’ll just notice your traffic declining and your rankings falling. When you check Google Search Console, you might see a message about “unnatural links” or you might see nothing at all.

Manual Penalties

For more egregious violations, Google issues manual actions. These are penalties applied by human reviewers. They’re more severe than algorithmic devaluations and require active work to remove.

Manual penalties come in two forms:

Partial matches: Only some pages on your site are affected. Searches that would normally show those pages won’t.

Site-wide matches: Your entire website is demoted or removed from search results. This is devastating for businesses that rely on search traffic.

Manual penalties remain in effect until you remove the offending links and submit a reconsideration request. Even then, Google might not reinstate your rankings immediately – or ever.

Permanent Damage

Even after addressing the violation, your site’s reputation with Google may be permanently damaged. Sites that have been penalized often struggle to regain their previous rankings, even after the penalty is lifted.

Think of it like a credit score. Violations stay on your record and affect how Google evaluates your site going forward.

Wasted Money and Time

Beyond the direct penalties, there’s the opportunity cost. The money spent on artificial links is gone. The time spent dealing with penalties and cleanup could have been invested in legitimate marketing. And the traffic and revenue lost during the penalty period doesn’t come back.

Businesses that chase artificial link schemes often end up worse off than if they had just focused on legitimate strategies from the beginning.

Why Link Schemes Keep Failing

Google’s entire business model depends on showing users the most relevant, highest-quality results. Link manipulation undermines that goal. So Google invests heavily in detecting and penalizing it.

Every time someone figures out a new way to game the system, Google’s engineers work to close that loophole. The cat-and-mouse game has been going on for decades, and Google keeps winning.

The Arms Race You Can’t Win

PBN operators constantly adapt their techniques to avoid detection. They change their patterns, hide their footprints better, and develop new methods. But they’re fighting against a company with unlimited resources and some of the world’s best engineers.

Google processes billions of searches every day. They have more data about link patterns than any individual SEO operator ever could. They use machine learning to detect patterns humans can’t even see.

The people selling links might claim they’ve figured out how to avoid detection. They might point to current clients whose sites haven’t been penalized yet. But “hasn’t been caught yet” is very different from “won’t be caught.”

The Downside Is Catastrophic

Even if a link scheme works temporarily, the eventual downside is huge. A site that loses its search rankings can lose 50% to 90% of its traffic overnight. For businesses that depend on that traffic, it’s often a fatal blow.

Compare that risk to the modest benefit of getting some artificial links. The math doesn’t work. You’re risking your entire business for a temporary ranking boost that might not even materialize.

What Legitimate Link Building Looks Like

Not all link building is manipulative. There’s a huge difference between artificial schemes and legitimate strategies that earn links naturally.

Creating Content Worth Linking To

The most sustainable link building strategy is creating content that people genuinely want to reference. Original research, comprehensive guides, useful tools, and insightful analysis all tend to attract organic links over time.

This takes more work than buying links. But the links you earn are permanent, valuable, and completely safe from penalties.

Building Real Relationships

Legitimate partnerships with complementary businesses, guest posts on actual publications in your industry, and relationships with journalists all create natural linking opportunities.

These relationships develop slowly. But they’re built on genuine mutual benefit rather than payment for manipulation.

Letting Quality Work Speak for Itself

When you do excellent work for clients, create genuinely helpful resources, or build a reputation in your industry, links tend to follow naturally. People cite authorities. They reference useful resources. They link to businesses they trust.

This organic process might seem frustratingly slow compared to just buying a hundred links. But it’s the only approach that builds sustainable, long-term results without risk.

How to Clean Up If You’ve Used Link Schemes

If you’ve participated in link schemes in the past – either knowingly or unknowingly – here’s how to address it:

Audit Your Backlink Profile

Use Google Search Console to export all the links pointing to your site. Review them carefully. Look for patterns we’ve discussed: low-quality sites, obvious link farms, networks of sites that all link to you, and unnatural anchor text patterns.

Remove or Disavow Bad Links

For links you can control, remove them. Contact the site owners and request removal. For links you can’t control, use Google’s Disavow Tool to tell Google you don’t want those links counted.

Be aggressive in this cleanup. It’s better to disavow some legitimate links than to leave manipulative ones in place.

Submit a Reconsideration Request

If you have a manual penalty, you’ll need to submit a reconsideration request after cleaning up your links. Be honest about what happened and what you’ve done to fix it. Don’t make excuses or try to minimize the violation.

Focus on Legitimate Strategies Going Forward

Once you’ve cleaned up past mistakes, commit to building links the right way. It’s slower. It requires more patience. But it’s the only sustainable path.

The Bottom Line

Link farms and PBNs are tempting because they promise easy results. But they’re fundamentally at odds with how Google wants the web to work. And Google has proven they’re willing and able to detect and penalize these schemes.

The penalties are severe. The cleanup is difficult. And the long-term damage to your site’s reputation can be permanent.

Meanwhile, the businesses that focus on legitimate strategies – creating great content, building real relationships, and earning links naturally – build sustainable competitive advantages that can’t be taken away by an algorithm update.

There are no shortcuts in SEO that don’t eventually become sinkholes. The sooner you accept that, the sooner you can focus on strategies that actually work for the long term.

If you’re getting pitched on “high-quality backlinks from our network of sites,” now you know what you’re really being offered: a risk you can’t afford to take.

How to Tell the Difference Between Good Guest Posts and SEO Link Schemes

If you manage a business website, you’ve probably received emails from people wanting to publish articles on your site. Some of these are perfectly fine. Others could get your website penalized by Google. The tricky part is knowing which is which.

Over the years of managing websites for our clients and running our own site, we’ve learned to spot the difference. Here’s what we’ve found works.

Understanding What’s Actually Happening

When someone offers to write a guest post for your website, they’re usually after one thing: a link back to their site. That link helps their website’s SEO. This isn’t automatically bad—it’s how much of the internet works. The question is whether they’re offering genuine value in exchange, or if they’re running a link scheme that could hurt your site.

Google is pretty clear about this. They don’t mind natural links that happen because content is genuinely helpful. They do mind links that exist only to manipulate search rankings.

Red Flags That Signal Trouble

Here are the warning signs we watch for when evaluating guest post requests:

They Offer a Link Exchange

This is the biggest red flag. If someone says “I’ll publish an article on your site, and in return I’ll publish your content on these sites,” that’s a link exchange scheme. Google explicitly penalizes these.

The email might say something like: “In return, I could also publish an article on [list of websites].” That’s your signal to delete and move on.

The Email Feels Generic

Pay attention to how they reference your site. Do they mention your actual website name and specific content? Or do they use vague phrases like “your site” and “my latest article”?

If they can’t be bothered to personalize the email, they’re probably sending it to hundreds of websites. That’s not a real relationship.

Pro tip: does the signature say “Best” instead of Thanks, Sincerely or some other more human closing? Best is a popular closing used by Ai writers and the Google automation response. It can be a subtle tip off that you are being contacted en-mass. That is a red flag.

They Reference Old Articles You Don’t Remember

Sometimes these emails claim they previously published something on your site. If you can’t find that article or don’t remember approving it, something’s off. Either they’re lying, or someone else managed to slip content onto your site without proper review.

The Sites They Mention Look Questionable

If they offer to publish your content in exchange, take a look at those sites. Are they legitimate businesses with real content and clear purposes? Or are they thin websites that exist mainly to host guest posts?

A quick Google search usually reveals the truth pretty fast.

They’re Too Eager or Pushy

Legitimate writers understand that website owners need time to consider requests. If someone is pushing hard for a quick yes or sending multiple follow-ups right away, that urgency often signals they’re trying to place links before you think too carefully about it.

Green Flags for Legitimate Guest Posting

Not every guest post request is bad. Here’s what good ones look like:

The Content Is Actually Relevant

The writer is offering content that genuinely fits your website’s focus and would help your readers. For a business website, that might mean articles about your industry, practical advice for your customers, or insights into topics your audience cares about.

If you run a dermatology practice and someone wants to write about roofing contractors, that’s not a good fit. If they want to write about skincare routines or sun protection, that makes sense.

The Writer Has Real Credentials

Look them up. Do they have a legitimate website? A portfolio of published work? A clear professional identity? Real writers and content creators exist—they’re building their reputation and authority through quality content.

Check their website. If it’s an actual business or publication with substance, that’s a good sign. If it’s a bare-bones site with nothing but generic content and outbound links, walk away.

They’re Not Asking For Or Offering Anything Sketchy

A legitimate guest blogger might ask for an author byline with a link to their website or professional profile. That’s normal. What’s not normal is asking you to link to multiple sites, include specific anchor text, or participate in any kind of exchange program.

The Relationship Feels Natural

Good guest posting relationships often develop over time. Maybe they’ve commented on your content. Maybe you’ve interacted on social media. Maybe they reached out with a genuine compliment about your site before pitching an article.

Schemes feel transactional. Real relationships feel like actual people talking to each other.

Their Outbound Links Make Sense

If they send a sample article, look at where the links go. Are they linking to authoritative sources that support the content? Or are all the links going to random SEO tools and questionable sites?

Natural writing includes links when they help the reader. Link schemes include links because they’re trying to manipulate rankings.

What to Do If You Find Questionable Content Already on Your Site

Maybe you’re reading this and realizing you already have some suspicious guest posts published. Here’s what to do:

  1. Check the backlinks – Use Google Search Console to see what sites are linking to that post. If you see links from low-quality sites or the domains mentioned in link exchange emails, that confirms your suspicions.
  2. Evaluate the content quality – Is it actually helpful to your visitors? If it’s thin, off-topic, or clearly written just to hold links, it’s not serving your site well.
  3. Look at the traffic – Check your analytics. Is this post bringing legitimate visitors? If it’s just sitting there gathering dust, it’s not helping you.
  4. When in doubt, remove it – You can just delete questionable posts. For posts that have somehow gotten legitimate traffic, you can 301 redirect the URL to a relevant page on your site. But in most cases, deletion is fine.

A Simple Decision Framework

When you get a guest post request, ask yourself these three questions:

1. Would this content genuinely help my website visitors?

If the answer is no, nothing else matters. Your website exists to serve your customers and prospects, not to be a link repository for SEO schemes.

2. Does this person have legitimate credentials and a real presence?

Five minutes of research usually tells you everything you need to know. Real people have real professional identities. SEO schemers have thin websites and generic personas.

3. Are they asking for anything beyond a simple author byline?

One link back to their legitimate website or professional profile is normal. Link exchanges, specific anchor text requests, or placement on multiple domains are not.

If you get “yes, yes, no” to these three questions, the guest post is probably fine. Any other combination should make you cautious.

The Bigger Picture

Guest blogging done right is good for the internet. It helps writers build their reputation, helps websites get quality content, and helps readers find useful information. The problem is people who abuse the system for SEO manipulation.

Your website’s reputation with Google matters. A few questionable links aren’t worth the risk of penalties or ranking losses. When in doubt, err on the side of caution.

We’ve seen too many businesses get hurt by link schemes they didn’t understand. They thought they were getting free content. What they actually got was a liability.

Need Help Evaluating Guest Post Requests?

If you’re not sure about a guest post request you’ve received, we’re happy to take a look. We can review the proposal, check the requester’s credentials, and give you an informed opinion about whether it’s legitimate.

Managing your website’s content and SEO is part of what we do. Sometimes that means knowing what not to publish, which can be just as important as knowing what to add.

Feel free to forward any questionable requests to us. We’d rather you ask than guess wrong.

5 Site Optimization Strategies for Voice Search and Smart Assistants

In the rapidly evolving digital world, people are continually seeking faster and more efficient ways to accomplish tasks. For many, typing a question into a search bar can feel slow or inconvenient. This has led to the rise of a more natural and faster alternative — voice search. Whether it is asking a smartphone for directions or a smart assistant for a recipe, speaking requests is becoming second nature. 

Voice search also represents a major step forward in digital accessibility, empowering individuals who experience difficulty physically typing. This powerful combination of convenience and essential access is what makes optimizing for voice search a critical strategy for any forward-thinking business. 

What Is Voice Search?

Voice search is when people speak into their phone or ask their device’s smart assistant to look something up on the web for them. This mostly takes place on cellphones, but some smart assistants have a separate device that handles searches as well.

Voice Search’s Growing Importance

Voice search is growing in popularity. Around half of online shoppers use a voice assistant to research things they want to buy. Smart Internet of Things (IoT) devices like smart speakers, such as the Amazon Echo Dot or Google Home, often enable these capabilities. They can be called upon with a simple command, usually to look up something the user has a question about. 

These devices can be found in both personal spaces like homes and public spaces like the workplace. Their adoption is widespread, with 45% of U.S. households containing at least one IoT device and 56% of organizations already integrating IoT devices into their workplace strategies. The rapid rise of these voice search-enabling devices proves that businesses need to adapt their SEO strategies to directly respond to this growing search format.

How to Optimize for Voice Search and Smart Assistants

So, what can small and medium-sized businesses do to adapt to this shift in how users are conducting searches? It is important to learn how to optimize your website to fit this new search method. Below are some strategies to help you stay at the top of search results, even with voice search or smart assistants in the picture.

  1. Keep it Conversational

Because people are using their voices to search, it is important for the writing on a site to be more conversational to match the tone of the search inquiry. Some ways to do this include making content more conversational, using question-based phrases and incorporating long-tail keywords, which are typically over three words in length.

  1. Make it Mobile Friendly

Most people will be voice searching via their cellphones. Therefore, you must make sure your site is mobile-friendly. This includes ensuring the site loads quickly when first accessed and that the content is easy to navigate and read on a smaller screen. This avoids frustration from the user and increases the likelihood of them visiting your site again.

  1. Create Content with Fast Voice-Optimized Responses

Your website will need to have brief, direct content that caters to the vocal response methods of a smart assistant. This means having featured snippets that a smart assistant can easily grab and present to the user. Ensure the snippets are concise, as they are more likely to be selected. FAQ pages are also a good way to deliver fast voice responses. 

It is also important to ensure that your brand has a unified, consistent voice to develop familiarity and trust with customers. If the user conducts a voice search for a trustworthy or reliable place, a strong brand voice that is clearly presented on the website may be more likely to be chosen and presented to the user.

  1. Incorporate Local SEO

Small businesses often rely on word-of-mouth and local sales to drive their business. Tailoring your SEO to local voice searches can increase users’ likelihood of making a purchase. Using terms like “near me” in your website’s content can help with this. Additionally, keeping your Google Business Profile up to date and collecting reviews from satisfied customers enhances your local SEO.

  1. Embrace Multilingualism 

If people are talking on their phones when making searches, they may be speaking a different language. To integrate this into your small business’s website, you could try to offer different translations of your website or research keywords tailored to users who speak a variety of languages. This could increase your outreach and customer base.

Voice Searching Is the Future

Voice searching is becoming more and more popular, and with many people buying smart assistants, it becomes increasingly important for small businesses to adapt their SEO strategies to accommodate this change. This can involve making content more conversational and sites mobile-friendly or improving your SEO through reviews. Regardless of the strategy, it is essential to take some steps to address the growing trend of voice search.