It’s increasingly difficult sorting the good companies from the bad ones on the Internet. There are still ways to find the best, reliable web development companies. We’ve compiled this recommended checklist as a starting point. The order these are in isn’t necessarily important since ALL the points are very important!
Check to see if your web development company:
□ will ensure that YOU own your website when it’s paid for
□ is legitimately registered to do business within its State: NH MA ME VT
□ has been in business for at least 10 years
□ has several or more people
□ carries workman’s compensation on its employees
□ carries liability insurance
□ maintains a committed presence in networking groups
□ is accredited and has a good rating with the Better Business Bureau (https://BBB.org)
□ understands your community and reciprocates by referring business to you
□ has a phone contact where one can at least leave messages
□ has an email contact where one can send information
□ provides automatic site updates at no additional ongoing charge
□ backs up websites every night for at least a month
□ provides website encryption (SSL) at no additional ongoing charge
□ does not require hosting or domain contracts
□ does not overcharge you by selling sell inflated monthly maintenance plans
□ provides partial hour web work billing (9 minutes work charged 9/60 of hourly rate)
□ can respond to most maintenance requests in 3-4 days
□ has general familiarity with trademark and copyright issues
□ is proficient with WordPress through experience and training
Over upcoming weeks check here for details about each. Contact us with any questions, we exist to serve you!
Whether face to face or on the web, there’s only one chance to make a first impression. This short checklist contains “must haves” for a website. It’s unbelievable to leave them off a website. We’ve seen web developers as well as web do-it-yourselfers not provide the following.
Phone number – You’ve lost credibility right away if there is no phone number. Many people – yes even today – understand that talking actually accomplishes more faster.
Contact email – We recommend posting an email address. Some use forms keeping email hidden. Forms are easily “spammed” making more work.
Business location – Tell visitors at least what city you’re in. Customers wanting to deal locally appreciate this.
Hours of operation – Whether you expect foot traffic or take appointments, there’s nothing worse than guessing whether you’re open or not.
Who to deal with – Let visitors know who they can deal with. Staff shrouded in anonymity don’t appear helpful.
Aesthetics – Websites should appear clear and organized. Visitors expect some things in certain places – like navigation. Make it easy find items/topics and get around the site.
Website success happens by building visitors’ confidence in your business. Providing as much information as possible will help immensely with this process. Contact your web services provider for assistance. They, just like we at CharlesWorks, should be there to help.
Last week I wrote about possible dangers of “FREE” offerings.
While verbiage varies, the end result is the same if you follow their link: headaches of an unimaginable magnitude for you!
Here’s an example of many I see each day in our company emails:
Dear firstname.lastname@example.org ,
Your mailbox quota is full.
This may cause your mailbox to be disabled or you may no longer be able to receive more emails
to continue using your mailbox. You will need to upgrade your mailbox quota immediately. This service is free.
Re-update your account
Note: Failure to update your account might lead to permanent deactivation of your account.
The Security team. 2019
Clicking lands you on an extremely convincing page. One wanting me to enter my email login information even had “© 2018 CharlesWorks” in it.
These work based on two principles: Offering the FREE “we’ll fix it” service and threat of imminent services loss. Together they convince you to bite. Especially that sense of urgency! Remember the world isn’t going to halt if you don’t act right away – it can wait until you deal with it properly.
Companies don’t have you “verify” your email account this way. If anything seems fishy concerning your email, call your email provider and ask for assistance. That’s what you pay them for!
With 20+ years in the web business, scams and schemes to steal from people still amaze me.
Several web clients have made me aware of a scam to frighten them into making a bitcoin payment.
They’re from addresses like “Anonymous Hacker” or even your own email. Subjects are “You have been hacked” or similar. They gloat they’ve infected you through some (usually unsavory) site you visited. They explain how they did it in terms most folks don’t understand – making you think they are really an expert – and frighten you into believing they’re monitoring your computer.
They threaten to send very personal items and even videos of you to everyone you know unless you comply with the demand within some short time period. They warn if you report them, they’ll distribute the “dirt” on you immediately.
We try to force these messages to spam on our servers. Sometimes they get through. We reassure several people each week they are a scam because they usually are.
However, devices DO get hacked. If you truly believe you’ve been hacked, you should see your IT person or someone who specializes in “cleaning” computers ASAP. We can recommend folks who can help.
We’ve gone off the deep end attempting to communicate entirely via email. Are we saying what we mean so say?
The “Subject:” should reflect the current content – especially in replies where the original idea has changed.
To ensure questions are responded to, keep the message simple and stick to expecting one answer about one question. People generally do not answer multiple questions.
Use a courteous greeting and closing. Email does NOT have voice inflection. Words appear demanding when you USE ALL CAPITAL LETTERS or numerous exclamation points – or terse when you treat email like text messages.
Including the previous message helps recipients understand your response. Generalities cause confusion and unnecessary back and forths.
It’s polite to include a “signature” with your name, your affiliation, your phone number and perhaps your address to enable easy followup.
Attachments are not meant to blast information to many. A giant file to a huge group is wasteful and rude. Large emails over phones is frustrating.
Messages requiring immediate attention are best dealt with via phone calls. Don’t assume people check email constantly.
Check the recipients list. Replying to ALL sends to ALL recipients. It might be shared with unexpected recipients.
Be careful what your message contains!
Compromised email can be an important component of identity theft. People take much of today’s electronic communications for granted.
Think about what’s connected to your email accounts – activities like shopping and even online banking to name a couple. Hackers getting into your email can give them an open doorway into many aspects of your financial and personal life. The losses incurred through compromised email can be enormous.
Good security practices are great deterrents. Start by using strong passwords to mitigate such losses.
Wireless connections can be “sniffed”, meaning hackers can wait nearby and record the information being sent and received over the connection.
Always access your email using encryption. Encryption makes it close to impossible to decode the wireless traffic. With email clients like Outlook, Thunderbird, Apple Mail or even a mail apps on phones, make sure encryption is turned on. With webmail through web browsers be careful to access it using https:// to ensure an encrypted email server connection.
Free wireless hotspots are a haven for hackers. You are pretty safe as long as you are using encrypted connections.
If you don’t understand how to set up and use encryption, call your web hosting, email or device provider for help. Don’t risk potential losses.