Website Contact Form Use And Settings

 

When a website contact form is filled & submitted, that submission’s information is emailed to the address assigned in the form’s settings. And while email is convenient for busy people, there is always another reliable option: a website owner can login and review contact form submission messages in the website dashboard. For that option go to ‘Forms’ then to ‘Entries’ and all submission messages will be listed in reverse chronological order; however and with email being the preferred option, there is a common situation where something about the incoming email trips up email host spam & blocking filters. So let’s look at why and how to deal with it.

 

What To Do When Email Notifications Fail To Arrive In Inboxes

What should a business do if it is not receiving contact form email in a specific inbox?

1. First, check Spam folders for in case messages are being routed there. Like it or not, we have to own our spam files day to day.

1. a) If good messages are in a spam folder then mark as “Not Spam” using whatever option the email provider offers in order to prevent form entries from landing there again.

2. If the email are NOT in Spam, then login to the website and check to be certain the correct receive- email address is assigned in the form settings. Often, in the heat of design and development, an address is setup based upon logic at the time. In many cases, that email address later proves to be wrong for this purpose.

2. a) Also double- check the “Email to” field to be certain its entered correctly. If not then correct, re- set the app and test!

3. Because the issue may lie with the email hosts’ definition of spam and/ or its’ spam blocking setup, a business may want to have the form set up to email multiple addresses. If so, be sure to separate each address with a comma.

3. a) Once multiple addresses are setup, test the form and check each all email inboxes. If any receive an email it proves the contact form application works and the email host is the issue. 99% of the time we find this is the case because the apps work – its’ the email host who’s random definition of spam setup that is the issue.

4. Regardless of all the above, it is always pro- active to have the email inbox host whitelist both a) the website host IP address and b) the website/server/contact form host email address.

Delivering contact form email can be tricky and there are situations where incoming email is blocked by its’ host. Worse, the email host is less than cooperative in troubleshooting the issue. If contact form email notification messages do not arrive in the Inbox of choice or its’ Spam folder and the email host claims the website form application is at fault, well then a logical course of action may be to switch email hosts. If so, we recommend Gmail; preferably Google Apps class Gmail.

Domain OwnershipDomain Ownership: Your Domain Is A Valuable Business Asset


So, why should domain ownership (=URL) be a fundamental business priority? We see a lot of confusion over domains and their management, including not managing them at all! We want to advocate that business owners prioritize domain ownership here.
Often business owners either don’t know where they have registered their domain(s) or worse, they have asked someone else to buy them. In some cases, the affiliated email records are set for the same domain making matters even more difficult.Domains are such valuable business assets we felt compelled to support, so folks understand a little bit more about their domains. In our view and no matter what, you want to be in control of these important business assets. If you allow anyone else to control or own your domain, well then it is NOT really yours … is it?
 

To begin to understand it really starts with the fact there is a universally accepted need for web standards and organization. Without standards, nothing could ever be done safely or efficiently. So here are a series of definitions to help with any confusion you may have about your domain, which obviously relates to what you do online:


Domain Definitions List

 
Domain Name
Domains are names associated with a particular IP (i.e. Internet Protocol) address, and that translates to a unique sequence of numbers. To make a physical parallel think of it like this: there’s only one location for 100 Main St. in any given town and one person owns it. On the Internet, the domain name kineticknowledge.com might translate to a unique number sequence like 123.123.123.3 and only we own it. That number is inaccurate, by the way, but the point is … to a browser kineticknowledge.com really looks like a unique set of numbers.
 
Domain Registrar
Domain registrars are companies authorized to sell domain names available for registration, or better yet … not yet owned by anyone else. GoDaddy and Network Solutions are well-known registrars. They also sell various other services. 
 
Domain Host
GoDaddy & Network Solutions are also domain hosts, meaning they run DNS servers for the organization of registered domain(s). These DNS servers also support a domain owner’s ability to manage different records affiliated with their domains. For instance, a domain name record is an ‘A Name Record’; for subdomains a C Name Record; for email an MX Record and even for text there’s a Text Record. They will also host your website and email for a fee. 
 
DNS
DNS stands for Domain Name System. This ‘system’ is set up to safely organize domains. It’s kind of like the phone book of the web where, when you look for a NAME, that system identifies and then translates it to a ‘number sequence’ you can call. With the help of registrars, the DNS translates a URL or web address (i.e. kineticknowledge.com) to the affiliated IP address, which is also a sequence of numbers (i.e. 123.123.123.3). 
 
MX Records
Your URL or web address can be used for email (i.e. support@kineticknowledge.com). MX (i.e. Mail Exchange) records are DNS settings associated with a domain in order to direct its mail to servers hosting a users’ mail accounts.
 
And then while we’re at it …
 
Internet
It’s a network of interconnected computers. Computers worldwide!
 
Web
It’s an Internet application that supports getting people to websites. 
 
Browser
Is an application for retrieving & presenting specific web pages. 
 
Search Engines
Search Engines constantly crawl and consume all the information on web pages they possibly can, in order to prepare an updated index for when people search. The goal is to help people reach the current information that exists on web pages, as accurately & efficiently as is possible. 
 
 

Webmaster Service – Digital Assets Management For Business

Managing the digital assets a business needs in this day and age has become a huge distraction. Keeping track of domains, websites, proper hosting, various Google tools, search & directory listings, social media accounts, security, passwords, and various other applications is a huge headache for the average business owner. It’s why accountable responsive webmaster service has become necessary.

Business owners should have control over their digital assets, but can they truly manage them? Who can back a website database up? Who will manage updates when they come or if they break a website? What are the fundamentals of SEO? Does anyone know how to develop content, the right way? What about SSL certificates? How do you secure these assets affordably? Where are logos, graphics, image files, and documents stored?! How do you keep track of all the logins? A good webmaster service can help!

The ‘Big Company’ Answer

The ‘big solution companies’ choose to take advantage of the ‘short on technical knowledge’ business person. When service is needed, weaponized service people deal in confusion and the sale of unnecessary solutions. If you use one of these ‘big solution companies’ you are familiar with the situation. A serious business person should not have to tolerate it.


The Right Answer


 

Kinetic Knowledge offers responsive webmaster service and digital asset management support. We are an experienced firm offering a consultative approach to managing digital assets. We also believe a business should own and control its’ assets! If it resonates, please do not hesitate to ask us about how it is all done! 


Basic Webmaster Services Can Include:

  • WordPress Website Host Management 
  • WordPress Website Updates Management
  • WordPress Backups, Website & Database
  • WordPress Themes Management
  • WordPress Plugins Management
  • Google My Business Tools Basic Setup & Management 
  • Google Traffic Analytics
  • Google Search Console
  • Basic Security
  • Secure Image, Logo, Graphic, Video Files Storage
  • Passwords Storage
  • Malware Scans
  • Brute Force Blocking
  • Strong Password Enforcement
  • Bad User Lockouts
  • 404 Detection
  • Blacklist Checks
  • Update Alerts
  • File Change Alerts
  • Performance Checks
  • Vested Human Service
  • And more!

And Even More Advanced Support Options Can Include:

  • More Frequent Website Database Backups Options
  • Advanced Security Options
  • Advanced Google My Business Tools Setup Options
  • SSL Certificate Purchase & Installation  
  • SEO Options
  • PPC Options
  • Email Campaign Options 
  • Content Options
  • Search & Directory Listings Option
  • KeyWords Rank Tracking Option
  • Social Media Plan Options
  • Monthly Report Options
  • And more again!

personal security practicesWebsite Security Locally

In a previous post titled “So, Why Does Google Want Us To Use SSL?” we shared that there is NO security guarantee, especially because there are a few different areas of vulnerability. No area is more important than local or at the personal computer management level. The threat always evolves SO security is a continuous process. It as much about securing your local computer, your personal processes and behavior as it is managing website configurations.

Be assured – security stems from people, process and technology – they must all work together!

 

How To Improve Website Security Locally At The Personal Computer Level

As website administrators’ & owners, here are the actions we can all take to harden & improve our personal processes and behavior in order to improve website security:

  • Limit Access: Minimize administrative access to website dashboards. The fewer people with Admin’ status, the less exposure to mistakes.
  • Raise The Website Login Bar: Respect usernames & passwords, encrypt them with non-dictionary-based words and include a combination of lowercase & capital letters, numbers and/ or symbols;
  • Host Choice: A little knowledge (or help) for what different host & service packages offer will help. For instance, shared host plans may be a compromise. The cheaper the plan the more closely you may want to look; whereas, a good managed dedicated host plan should improve security a great deal.
  • Backups: Reliable database & theme backups, including testing to be sure a website can be restored from its backup if it is damaged.
  • Stay Up-to-Date: Stay up to date (or get help) with WordPress updates that not only advance the software’s features BUT harden its code against vulnerability. There should be an administrative support in place that checks the status of the site’s extensible components with some frequency.
  • Trusted Sources: Do not load plugin applications or themes from sources not vetted as trusted and reliable. Sorry folks, but FREE is becoming a recipe for disaster. Malicious people and organizations will distribute free ‘nulled’ plugins and themes with malicious code. So don’t just load up anything that comes down the pike.
  • Security Updates and News: Security vulnerability affects all software, WordPress being no different. To stay current, subscribe to reliable sources of information in order to be informed of the latest issues & trends.
  • Security Software: Use security software that not only helps protect in real-time by perpetually searching for Malware, Viruses and security vulnerabilities, but that firewalls identified attacker IP addresses. Even entire country blocking, temporarily or permanently, should be possible.
  • Working Environment: Be sure the local computer, browser and routers are up-to-date, free of spyware, malware, and virus infections. Antivirus ( = malware that spreads from PC to PC ) and anti-malware software is recommended. Also secure your mobile devices. Install any updates as soon as they are available.
  • Personal Passwords: The goal with a username & password is to make it difficult for others, including machines, to guess. Hard for even a brute force attack to succeed. A key to this is making it Complex, Long, and Unique. And if an IP fails to enter a couple times, maybe 3 times, than to deny that IP

And while personal practices and computer management are everyone’s responsibility, this post does not suggest busy professionals can handle it all; it does however suggest there should be knowledgeable WordPress support. And please, ask us about Advanced WordPress Security and Host Management


Related News:

So, Why Does Google Want Us To Use SSL? 
The Truth About Hacked Websites