Tip of the Week: 4 Ways to Help Prevent Comment Spam

b2ap3_thumbnail_what_to_do_with_comment_spam_400.jpgWhile it might be nice to imagine making $500 a day by working from home, this is the type of thing only really seen in a website’s spam comments. If these annoyances are common, know that you’re not alone. Even the most innocent sites can be stricken with this issue. So, how can you minimize spam comments?

It’s important that you consider the repercussions of leaving these comments on your company’s website. They’re harmful to your social media and website presence, and can give your site visitors and fans the impression that you don’t take care of your website. Furthermore, they might feel discouraged about leaving legitimate comments, which might nip a potential customer relation success in the bud before it even has a chance to blossom.

To help fight spam on your website comments, you can take advantage of several options. However, it’s important to note that none of these are a sure-fire way of eliminating comment spam.

Disable All Comments
This option should only be used as a last resort. The reasoning is simple; even negative comments are valuable to your business for the purpose of understanding how you can improve your services or product. Comments show that people find your website and its content valuable. Even search engines pick up on comments and use them to give your website a higher search ranking. The positive thing about negative comments is that you have the chance to address these issues personally to improve your reputation. This shows that you care about the customer’s experience. Therefore, the only reason you should ever turn off comments on your site is if you plan on performing minimal maintenance to it.

Approve All Comments Before They Go Public
If a moderator is keeping an eye on comments that are submitted, it makes it much easier to spot spam before it’s posted to your comments. However, you should be on the lookout to ensure you don’t get fooled into approving a spam comment. Spammers are known for their remarkable ability to trick users, so don’t feel bad if one or two get through. You can always remove them yourself later. If you are fooled by a comment spammer by letting one slip by, then take solace in the wisdom of former President George W. Bush: “Fool me once, shame on you. Fool me... you can’t get fooled again.”

Use a Recaptcha
A recaptcha is a great tool that can help you ensure that all users who comment on your posts are real people, and not spam bots designed to blow up websites with worthless comments. This can be as easy as entering in the numbers or letters that appear on the screen in an image, and it’s usually enough to prevent most spam bots from making it through to the posting. However, this tool isn’t 100 percent effective because a dedicated human comment spammer will fill in the required Recaptcha numbers.

Block the Spammers’ IP Addresses
If you happen to come across a spammer, your website platform should allow you to block the user’s IP address from accessing your website. By looking at some spammer statistics from Imperva, you will see how blocking a comment spammer’s IP address will go a long way toward taking care of the problem:

80 percent of the comment spam originates from less than one-third of the spammers, and a mere 17 percent of comment spammers actually account for a majority of the comment spam traffic. Imperva also found that nearly 60 percent of comment spammers are active for long periods of time.

However you decide to take the fight to spammers, the best way to do so is to remain vigilant and consistent with the measures you take to keep spam at a minimum. As always, keeping your site’s maintenance up to date is the preferred option, and even a few comments can potentially make your organization look negligent. What are some of your favorite ways to keep comment spam to a minimum? Let us know in the comments… but not if you’re a robot.

Develop Your Own Knowledge Management System and S...
Don’t Fix an IT Problem Just to Have to Fix it Aga...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, May 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows Electronic Medical Records Holiday lunch and learn Fraud BYOD Information Technology Youtube e-waste Politics Cost Management Security Cameras SMART Services Web Design App store Financial Technology Cloud Recovery App Touchscreen Remote Computing Tablets Keyboard Network Security Android Windows 10 Wearable Technology Laptop Files Access Control Settings Microsoft Excel MySalesResults Business Technology Samsung Employer-Employee Relationship The Internet of Things Productivity Technology Mobile Social Networking Storage Remote Monitoring Screen Mirroring Uninterrupted Power Supply Managed IT Services Machine Learning Scott White iPhone Network Office malware USB Shortcut IIAI Extreme Technology Makeover Small Business Data Evernote Google Drive Display Budget Bandwidth Operating System holidays Security Peripheral HIPAA Google Docs SharePoint Chromebook User Error Operating Sysytem Passwords Jerry Fetty Microsoft Office 2010 Printer Wasting Time Medical IT Voice over Internet Protocol Telephone Systems Communication Virtual Assistant Computer Care Data Loss File Storage Data Breach End of Support Trending Managed IT Service Remote Workers Testing Hybrid Cloud Audit Company Culture PC Alert Business Intelligence Phishing Current Events Gifts Debate robot Sports Students Analytics Paperless Office Regulation Going Green In the News Quick Tips Social Employees Windows 10s Benefits Tip of the Week Apps Data Management Telephone Buisness Inbound Marketing User SMB Data Recovery Admin Backup Collaboration Apple MAIA Tutorial Advertising Virus Alexa for Business Steve Anderson press release Virtual Reality Applications Project Management Best Practice Managed IT Office Tips Wiring Keyboard Shortcuts Money WannaCry Professional Services Government Personal Information Gmail Lifestyle video Work Station Consultant Networking Emails Bryant Caudill Legal Memory CrashOverride IT Consultant Computer Fan IT solutions Computing Saving Time SaaS Printers Antivirus Private Cloud ebay Wireless Charging Employee-Employer Relationship Computers Smart Tech Gadgets Law Enforcement Cast BDR Workers Information IT Solutions Language agency automation Presentation Worker Commute Wireless Internet IT Technicians spam Branding Gift Giving Surge Protector Education Phone System Unsupported Software Miscellaneous Customer Service Updates Help Desk Email Outlook Wireless Technology Data Theft Employer Employee Relationship Data Security Downtime Hard Drive NFL Humor Windows 8 Redundancy Taxes Automobile Edge Smartphones Identity Theft Google Disaster Business Continuity Data Protection Tablet Printer Server Streaming Media Conferencing Websites WIndows 7 Television Chrome Sales Co-Managed Services Music Transportation Two-factor Authentication Hetrick and Associates Utility Computing Excel Entertainment Encryption IT Support ISP hackers DocStar Devices Regulations Tech Support Big Data Biometrics Application Microsoft Outlook Cybercrime GLAD Patch Management Specifications Administrator Camera Unified Communications Router Identity SMARTweb Defense Facebook Virtualization Users Risk Management IoT Gamification Battery Cloud Computing Adobe Payment Cards Microsoft Office Wayne Joubert Back Up Cortana iPad Efficiency Access Smartphone Ciminal Outsourced IT Management DDoS Applied TAM Human Resources Comparison Best Practices Wireless Ransomware Net Neutrality Backup and Disaster Recovery Nanotechnology Save Time Payroll Server Chevy HHR Lithium-ion battery Fun Workplace Tips WPA3 Spyware Text Messaging PowerPoint Business Computing Root Cause Analysis Virtual Desktop hacker Customer Relationship Management Vulnerability Meetings Touchpad 5G Twitter Wasting Money Webinar Microblogging Thank You WIndows Server 2008 Microsoft Outlook 2007 Monitoring Administration Health Bloatware Privacy Science eWaste Computer repair Scam Software Fax Server Business Management Maintenance Hardware Projects Data Privacy Commerce FAQ Mobile Devices Upgrade How To Credit Cards History Accessory Smart Technology social media Microsoft Business Best Available OneNote Hosted Solutions Sabotage Virtual Private Network Artificial Intelligence Document Management Instant Messaging Microsoft Word Software as a Service Augmented Reality PDF Search Supercomputer Data Storage Charger Printing Running Cable Password VPN Office 365 Legislation Hard Disk Drive Blockchain Mouse Mobile Computing Wi-Fi Content Filter Network Congestion Retail Disaster Recovery Phishing Scam Books Mobile Device Managed Service Provider Near Field Communication Connectivity File Sharing Online Currency Windows Ink Reputation Vendor Teamwork Scalability Distributed Denial of Service Experience Training Hard Drives Safety Google Maps Domains Managed IT Services Blogging Mobile Security Financial Windows 10 email encryption Video Surveillance Emergency Social Engineering Colocation Programming Saving Money Nokia E-Commerce Productivity Intranet IT Budget Internet Data Backup data backups Mobile Device Management Hyperlink Identities User Tips Tech Tip Reliable Computing Backkup OneDrive Avoid Downtime Analysis Images MSP Unified Threat Management Cameras Innovation Computer Forensics Amazon iOS IT Service Internet of Things Kleinschmidt Insurance Update Black Market website Take Your Agency to the Next Level Congratulations Compliance Doug Vanni Tech Term Managing Stress Mircrosoft Chromecast Save Money Windows 7 Solid State Drive Jessica Stevenson webinar Mobile Office Managed Service automation Telephony Bluetooth Bring Your Own Device HBO Browser Mobility communications Avoiding Downtime Marketing Google Assistant insurance Computer Licensing Sync Internet Exlporer Point of Sale Vendor Management Video Games Proactive IT Support Word WiFi HaaS Work/Life Balance Computer Accessories Proactive IT Hiring/Firing Co-managed IT Employee Firewall IT consulting Travel Cleaning Content Filtering Upgrades Value 3D Printing Hacking IT Management Cybersecurity Prodcutivity Hosted Solution Break/Fix Dark Web Device Security Shadow IT IT Services VoIP HITECH Act Flexibility Media Consumption Ubuntu Microsoft Windows 7

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *