Connect with us

Real Estate Technology

These forms let you get quick feedback from your site visitors without being a techie

(TECHNOLOGY) Insight Stash can help your website go from drab to fab with user feedback and you don’t even have to be a techie to understand it.

Published

on

insight stash

Website TLC

You can realize your website needs a little help without being an expert, but figuring out what exactly you need to fix is a different story. Great news! You can improve user experience without being a tech wizard.

bar
The best UX consultants are your site visitors, and Insight Stash lets you engage with them in real-time with their “fast, simple feedback forms.” The platform lets you easily build your own surveys and embed them into your website so your site visitors can give you real-time feedback about your products, services, and site functionality.

What features do users like and dislike? Why?

Customizable forms let you design survey-style feedback forms on the fly for specific cases and create your own target segments, meaning you can launch different surveys for different people every week.

Ask whatever you want, however you want.

You can choose from a variety of question types including the old favorite Net Promoter Score (NPS) question “How likely are you to recommend us to a friend?,” matrix table fields, a simple thumbs up, and more. To increase completion rates, you can group questions into steps that make logical sense and stay relevant to the person filling out the form.

Choose which page your surveys will pop up.

Maybe focus on a different page each week, or just change up your survey to ask about different aspects of the same page.

Embedding surveys in your website might sound tricky, but it’s actually super easy. Just Copy and paste script block provided by Insight Stash and it creates custom buttons that float on your site pages to launch feedback forms.

What can this feedback teach you?

Slice and dice results however you want, measuring by attributes like browser and URL information, location, time, sentiment, device type and more. Users’ responses can help you find out why people are opting out in certain places so you can make changes to improve funnel conversion.

View reports in an easily navigable admin panel, or integrate them into your existing reporting services or Excel chart.

While Insight Stash does let you collect reviews from site visitors, the platform is really more effective for user experience research. If you’re looking for feedback on your products and services, the best way to go about this is a review management platform that specializes in automating review requests at critical moments such as immediately after a transaction.

Interested? Different pricing plans are available based on the number of hits per month, ranging from 10,000 hits to 100,000. Each plan starts off with a free 30-day trial. What are you waiting for? Go get your site optimized!

#InsightStash

Helen Irias is a Staff Writer at The Real Daily with a degree in English Literature from University of California, Santa Barbara. She works in marketing in Silicon Valley and hopes to one day publish a comically self-deprecating memoir that people bring up at dinner parties to make themselves sound interesting.

Continue Reading
Advertisement

Real Estate Technology

KRACK is the wifi vulnerability Y2K wishes it was

(TECHNOLOGY NEWS) It was recently discovered that there is a vulnerability in all wifi networks, know how to keep your information from slipping through the KRACK!

Published

on

krack internet wifi

A security researcher has discovered a new vulnerability that affects literally all WiFi networks – and now that they know about it, it won’t be long before hackers know about it too.

The vulnerability, discovered by security researcher Mathy Vanhoef, lies within the WPA2 encryption used by all WiFi devices and routers. It’s called KRACK, which stands for Key Reinstallation Attacks.

By taking advantage of KRACKs, a hacker can snatch up data that we previously thought was encrypted and totally safe, including credit card numbers, passwords, messages in chat and email, and photographs. A hacker could even hack into your devices with cameras and get a live stream into your home.

They can also inject ransomware or malware into your device.

Security experts are urging all device makers and internet service providers (ISPs) to release updates to patch over KRACKs as soon as possible. In the meantime, there are a few suggestions for how you can protect yourself.

First of all, make sure all of your devices and routers are updated, and turn on auto-updates so that if any new KRACK patches come in, you’ll be sure to get them right away. If you got a router from your ISP, you should call them and bother them until they release a security patch for KRACKs.

In the meantime, use your router’s user guide to find the administrative options and make sure everything is up to date and that you have the strongest privacy settings selected.

If your ISP is slow to respond, you might consider using an Ethernet cable to connect to the Internet, since KRACKs are only a problem with WiFi networks.

You can also disable WiFi on your smartphone and use your cellular data instead – although this could get expensive if you pay extra for cellular. You should also pull you Internet of Things devices, especially ones with cameras and assistants like Alexa, off of WiFi until your ISP has a KRACK patch.

It also helps to access the web through encrypted websites whenever possible.

Many sites offer either unencrypted access (HTTP) or encrypted access (HTTPS). You can download an extension called HTTPS Everywhere that tells your browser to automatically use encrypted access whenever available.

It’s available for Chrome, Firefox, and Opera.

Lastly, be aware that Android devices 6.0 or later are more vulnerable to KRACKs attacks than other devices. Good luck, and keep your information from slipping through the KRACKs!

Continue Reading

Real Estate Technology

Dot coms are on their way out when it comes to Realtors’ sites

(TECHNOLOGY NEWS) NAR is making moves to secure their Realtors sites with .Realtor and .realestate authentications.

Published

on

dot com .realtor

dot realtor

The National Association of Realtors (NAR), the governing body of American realtors, has offered the .REALTOR domain to those who are members and has extended its initial kick off program until 2018.

bar
Currently, members of NAR can acquire a .REALTOR for one free year, as well as branded domain email and website creation. After the first year, REALTORS will pay $39.95 for their domain. NAR is also working on acquiring the domain .realestate for those in its membership as well.

Pile on the pros

This change can affect the online presence of a realtor in many number of ways. Because the .realtor domain is strictly policed by NAR and top level domain (TLD) registration group Internet Corporation for Assigned Names and Numbers (ICANN), this allows for a certain amount of trust and credibility to be made with a future customer. Due to the NAR’s deal with ICANN, those who use .REALTOR has that his or her domain registration tied to their National Realtors Database System (NRDS) ID number.

NAR states that this process is similar to the verification process for a .gov or .edu address.

Another reason for the decision to layers of around the strict TLD verification is the protection of the NAR brand, as well as the word realtor. Laypeople frequently confuse the terms “realtor” and “real estate agent,” unaware of the fact that only a member of the NAR is officially a realtor, and licensed non members who sell property are actually real estate agents.

In 2015, .REALTOR was the fastest growing TLD that had authentic websites, i.e. not domains bought for the purpose of scalping.

The NAR is also the largest trade association in the United States, with 1.2 million members. The TLD process for the NAR made history by being the first brand using this type of verification that was previously only afforded to governmental bodies and educational institutions.

Added security

The internet is a vast superhighway of changing parts, and the modification of TLD is a selling point for enhancing a brand.

NAR is offering a service by allowing the TLD to be another source of credibility for its members, a perk few other trade organizations can match.

#DOTrealtor

Continue Reading

Real Estate Technology

Are your phone settings giving hackers a free pass to your life?

(TECHNOLOGY NEWS) If you are one to leave your bluetooth on 24/7 you might want to rethink. Doing so leaves you vulnerable to all sorts of hackers.

Published

on

bluetooth hackers

Bluetooth connectivity

Bluetooth is meant to keep you connected. By enabling it, your devices can sync up to one another without even being prompted. However, in this case, what is easier for you is typically also easier for hackers.

bar
Hackers are incessant and if they want to, can find a way in. But that doesn’t mean that you should hand them an all access pass.

Peace out privacy

With every technological advance, comes some relinquishment of privacy. When you use social media to share your experiences, it’s an open invitation for the world to know where you live, who you’re friends with and what you do.

Newsletters and email accounts require you to share personal information just to use their services.

Bluetooth is no different. Researchers from the group Armis have discovered a way for hackers to infiltrate your devices simply by having Bluetooth enabled.

They call it borne, Blueborne

No, Blueborne is not exactly like James Bond, but it does have the power to mysteriously infiltrate your devices. Researchers found that it takes less than 10 seconds for hackers to gain access to your devices through Blueborne.

You don’t even need to be using Bluetooth.

All it takes is for it to be on. Blueborne scans surroundings to find devices with Bluetooth enabled, and then is used to hack into such devises. From there, hackers gain control over the device and can steal data. Once one device is hacked, it can spread to another device, giving hackers the chance to access multiple devices without increasing their distance.

Prevent hackers

Samsung Galaxy, Google Pixel, iPhones, iPads, car audio systems as well as Android and Microsoft products are all vulnerable to a Bluetooth cyberattack. One line of defense is to make sure that devices are updated.

Last week, Google and Microsoft created security patches so that owner can update and secure their devices.

Just don’t do it

However, if there is one take away from the discovery of Blueborne it is this: don’t keep your Bluetooth on. Think of Bluetooth the same way as you think of locking your car. It’s obvious that not locking your car makes it easier for people to steal it. The same goes with Bluetooth.

The best way to prevent a cyberattack is to be aware of when Bluetooth is enabled, and to make sure it is off when not in use.

#BlueBorne

Continue Reading

Emerging Stories

Get The Real Daily
in your inbox

subscribe and get news and EXCLUSIVE content to your email inbox