SYS-CON MEDIA Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, William Schmarzo

Blog Feed Post

Goodbye Keyword Data (Kind Of), Plus a Super Secret Trick for Marketing Success

What if you went into your web analytics and saw no keyword data … at all? What if one of your best sources of intelligence on how buyers are finding you just – poof – went away?

Well, folks, that would be a big deal. And, unfortunately, it looks like that might be exactly what is about to happen. Search Engine Land offered this report earlier this week in Post-PRISM, Google Confirms Quietly Moving To Make All Searches Secure, Except For Ad Clicks:

In the past month, Google quietly made a change aimed at encrypting all search activity — except for clicks on ads. Google says this has been done to provide “extra protection” for searchers, and the company may be aiming to block NSA spying activity. Possibly, it’s a move to increase ad sales. Or both. Welcome to the confusing world of Google secure search.

Where we started: Google’s “not provided” challenge
In October 2011, Google began encrypting keywords and secure search for anyone logged into any Google product while searching. What many people didn’t understand at the time – and still don’t now – is the impact of the “not provided” result on their analytics. I covered this previously in the post Web Analytics: How to Handle Direct Traffic, Not Provided, Dark Social and Do Not Track:

…essentially what it means is that if people are logged into a Google product (think Gmail, YouTube, Google+, etc.) and conduct a search using Google, the referring keyword data is not passed through to your site. This is also commonly misunderstood as an issue with Google Analytics; in fact it doesn’t matter which analytics program you are using because Google search is holding the data and never passing it through to your website, regardless of whether you are using Google Analytics, Omniture, or any other application. For a significant number of the clients that I work with, “not provided” has become one of the top 3 keyword sources in organic keyword reports. This means that a significant amount of keyword data isn’t being captured; it’s just gone.

Secure search for all
From Google’s official statement to Search Engine Land on September 23, 2013:

We want to provide SSL protection to as many users as we can, in as many regions as we can — we added non-signed-in Chrome omnibox searches earlier this year, and more recently other users who aren’t signed in. We’re going to continue expanding our use of SSL in our services because we believe it’s a good thing for users…

The motivation here is not to drive the ads side — it’s for our search users.

At the time of the 2011 change, Google expected this to impact approximately 10 percent of search results. Fast forward and we now see “not provided” for most clients (and ourselves) in the range of 60 to 80 percent of search results, and we expect this to grow even higher as more users are switched to encrypted search. As an example, in the last 30 days our Marketing Trenches blog saw 79 percent of Google organic traffic as “not provided.”

Many folks think that as a marketing site (heck – the name marketing is right in the title) we are an outlier. As it turns out, our 79 percent is essentially in line with what other sites are seeing.

The incredibly helpful Not Provided Count tracks 60 sites and charts the progress of “not provided.” As you’ll see below, there’s been a sharp rise in the curve in the last few weeks, leading to a current average of 75.19 percent of Google organic traffic showing as “not provided.” That’s a whole lot of keyword data that’s being kept from site owners.

Keyword Search Report

So what?
“Why does it matter?” you may ask. “I have more than enough things to do in the day without worrying about keywords and analytics.” Some companies have a set-it-and-forget-it approach to web analytics and for them, maybe it doesn’t matter. However, for those of us who have relied on keyword data to understand our traffic sources and buyer behaviors, and use that data as one of a few different sources to build our search and content marketing strategy, we may be losing a vital tool in our tool belt.

Four things marketers should do
First, cry. Once you are over that, scream and yell at Google. OK, don’t really do that, because it won’t get you anywhere and won’t change a thing. So, with those options out the window, here are a few tricks to use to adjust to this major change:

  1. Use your Google Webmaster Tools data – While Analytics and Webmaster Tools have known data discrepancies – and Webmaster Tools is limited to 2,000 keywords and 90 days’ worth of data – for the time being, keywords are still captured in Webmaster Tools. Something is better than nothing, so make sure your site is properly configured and submitted, and that you regularly check your Webmaster Tools account.
  2. Leverage data from Bing and Yahoo! – While users of these search engines may not have the exact behavior and profile of Google users, according to August comScore data, Google sites led the U.S. search market with 66.9 percent market share, followed by Microsoft sites with 17.9 percent and Yahoo! sites with 11.4 percent. You will still get specific keyword data from Yahoo! and Bing … so use it.
  3. Closely monitor your URLs for traffic from and position in organic search – With continuous zoo-animal-named changes to Google’s algorithm favoring quality content that is shared and contains keyword concepts vs. specific SEO-optimized pages, keywords themselves have become a bit less important. By looking at which pages in your site receive significant traffic, you can begin to reverse engineer to measure your search effectiveness. By measuring your position in search results, you’ll also gain insight into how that impacts the traffic flowing through to your site.
  4. Continue to track your AdWords campaigns – Google seems less concerned about privacy for paid ads – all that data will continue to flow through. With this in mind, make sure that your Google Analytics and AdWords accounts are properly integrated and/or use AdWords as a platform to test and experiment.


Super secret magic trick No. 5
This one’s not for just anyone, but after you’ve taken whatever knowledge you can glean from the tips above, try this one on for size:

Understand the problems your buyers face, and educate them through helpful, useful content. (You can even Tweet this.) As we move away from a world of SEO smoke and mirrors and an overreliance on “push” marketing, the best marketing is the kind that’s useful to the buyer. So:

Time and time again, each change Google has made to the search algorithm favors quality content shared by humans. Even without full analytics data, I can tell you that one’s not going away anytime soon.

For more tips about how content can accelerate business growth, download our eBook, “How to Grow Your Business with Content Marketing.”

Read the original blog entry...

More Stories By Will Davis

Right Source Marketing helps organizations build their marketing strategy, organize the structure to accommodate that strategy, and deliver the specific services to execute that strategy. We do this through a unique model that provides senior level strategic consulting as well as specific services that cover every area of an organization’s marketing plan.

Latest Stories
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
Cloud is the motor for innovation and digital transformation. CIOs will run 25% of total application workloads in the cloud by the end of 2018, based on recent Morgan Stanley report. Having the right enterprise cloud strategy in place, often in a multi cloud environment, also helps companies become a more intelligent business. Companies that master this path have something in common: they create a culture of continuous innovation.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Sanjeev Sharma Joins November 11-13, 2018 @DevOpsSummit at @CloudEXPO New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
We are in a digital age however when one looks for their dream home, the mortgage process can take as long as 60 days to complete. Not what we expect in a time where processes are known to take place swiftly and seamlessly. Mortgages businesses are facing the heat and are in immediate need of upgrading their operating model to reduce costs, decrease the processing time and enhance the customer experience. Therefore, providers are exploring multiple ways of tapping emerging technologies to solve ...