Welivesecurity.com - SEO Checker

Overview of the SEO Check
Meta information
77% 
Page quality
41% 
Page structure
79% 
Link structure
41% 
Server
100% 
External factors
100% 
SEO Score
Response time
0.12 s
File size
83.90 kB
Words
821
Media files
22
Number of links
76 internal / 10 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Award-winning news, views, and insight from the ESET security community
The page title should be shorter than 580 pixels. It is 674 pixels long. Optimize title
There are no duplicate words in the title
Meta description
(Critically important)
WeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
The length of the meta description is perfect. (861 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.welivesecurity.com/en/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: en
Language defined in HTML: en
Server location: United States of America
The following language is defined by HTML: en
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
No favicon is linked in the HTML code.

Meta tags

NameValue
viewportwidth=device-width, initial-scale=1
robotsindex, follow, max-image-preview:large, max-video-preview:-1
descriptionWeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
langen
twitter:titleAward-winning news, views, and insight from the ESET security community
og:typearticle
og:titleAward-winning news, views, and insight from the ESET security community
og:descriptionWeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.
charsetutf-8

Test up to 1.000 webpages of welivesecurity.com with our free plan!

Try For Free
No trial. It's just free!

Page quality

Content
(Critically important)
The average number of words per sentence of 228 words is high.
This page contains 821 words. That's ok.
23.8% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
The page contains a listing, which indicates a good text layout.
11 paragraphs were found on this page.
The text content is perfect.
No placeholders texts or images were found.
There are no duplicates on the site.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
No Apple touch icon is specified.
A viewport "width=device-width, initial-scale=1" is provided.
Bold and strong tags
(Somewhat important)
The amount of tags is very high (18). We recommend using a maximum of 16 tags for this page.
The following tag is repeated too often: jakub souček and radek jizba
Image SEO
(Somewhat important)
Alt text (alternative text) is correctly used on all found images.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...kopye/telekopye-booking-sites-fraud.jpegTelekopye transitions to targeting tourists via hotel booking scam
/build/assets/users-588e179f.pngJakub Souček
...tor-air-gapped-systems-compromise-1.jpegMind the (air) gap: GoldenJackal gooses government guardrails
...x82/wls/2023/07/matias-porolli-eset.jpegMatías Porolli
...keeper-china-thailand-eset-research.jpegSeparating the bee from the panda: CeranaKeeper making a beeline for Thailand
...tatic.com/tn/-x82/wls/romain-dumont.jpegRomain Dumont
...services-cybersecurity-implications.jpegUntangling the hiring dilemma: How security solutions free up HR processes
.../3-2024/mdr-launch-wls-1920x1080-lq.jpegMDR: Unlocking the power of enterprise-grade security for businesses of all sizes
...ing-cars-electric-charging-stations.jpegQuishing attacks are targeting electric car owners: Here’s how to slam on the brakes
...nships-apprenticeships-scholarships.jpegAspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships
...4/week-security-goldenjackal-air-gap.pngGoldenJackal jumps the air gap ... twice – Week in security with Tony Anscombe
...kopye/telekopye-booking-sites-fraud.jpegTelekopye transitions to targeting tourists via hotel booking scam
...insurance-future-ratings-human-risk.jpegCyber insurance, human risk, and the potential for cyber-ratings
...tor-air-gapped-systems-compromise-1.jpegMind the (air) gap: GoldenJackal gooses government guardrails
...ttribution-ceranakeeper-mustangpanda.pngThe complexities of attack attribution – Week in security with Tony Anscombe
...keeper-china-thailand-eset-research.jpegSeparating the bee from the panda: CeranaKeeper making a beeline for Thailand
...erating-system-third-party-software.jpegWhy system resilience should mainly be the job of the OS, not just third-party applications
...-2024/cybersecurity-awareness-month.jpegCybersecurity Awareness Month needs a radical overhaul – it needs legislation
...maredon-cyberespionage-eset-research.pngGamaredon's operations under the microscope – Week in security with Tony Anscombe
...on/gamaderon-cyberespionage-ukraine.jpegCyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
...assets/apt-activity-report-4523d00f.webpApt Activity Report
...managed-detection-response-c7e1a71f.webpMDR Protection

Page structure

H1 heading
(Critically important)
There is no H1 heading specified.
Headings
(Important)
The structure of headings is missing one or more levels. Do not skip heading levels.

Heading structure

Heading levelContent
H2 Let us keep you up to date
H3 Latest Articles
H3 Follow us
Some internal link anchor texts are too long.
Some internal links have dynamic parameters. All internal URLs, which are not marked as nofollow, should not contain dynamic parameters.
Some anchor texts are used more than once.
The number of internal links is ok.
There are 10 external links on this page.
LinkAttributesAnchor text
/en/A-TITLE WeLiveSecurity
/es/Español
A-TITLE Español
/de/Deutsch
A-TITLE Deutsch
/pt/Português
A-TITLE Português
/fr/Français
A-TITLE Français
/en/Text duplicate A-TITLE WeLiveSecurity
/en/tips-advice/TIPS & ADVICE
A-TITLE TIPS & ADVICE
/en/business-security/BUSINESS SECURITY
A-TITLE BUSINESS SECURITY
/en/about-eset-research/About ESET Research
A-TITLE About ESET Research
/en/eset-research/Blogposts
A-TITLE Blogposts
/en/podcasts/Podcasts
A-TITLE Podcasts
/en/white-papers/White papers
A-TITLE White papers
/en/threat-reports/Threat reports
A-TITLE Threat reports
/en/we-live-science/WeLiveScience
A-TITLE WeLiveScience
/en/ukraine-crisis-digital-sec...Ukraine crisis – Digital security resource center
A-TITLE Ukraine crisis – Digital security resource center
/en/we-live-progress/WeLiveProgress
A-TITLE WeLiveProgress
/en/covid-19/COVID-19
A-TITLE COVID-19
/en/resources/Resources
A-TITLE Resources
/en/videos/Videos
A-TITLE Videos
/en/cybersecurity/Digital Security
A-TITLE Digital Security
/en/scams/Scams
A-TITLE Scams
/en/how-to/How to
A-TITLE How to
/en/privacy/Privacy
A-TITLE Privacy
/en/cybercrime/Cybercrime
A-TITLE Cybercrime
/en/kids-online/Kids online
A-TITLE Kids online
/en/social-media/Social media
A-TITLE Social media
/en/internet-of-things/Internet of Things
A-TITLE Internet of Things
/en/malware/Malware
A-TITLE Malware
/en/ransomware/Ransomware
A-TITLE Ransomware
/en/secure-coding/Secure coding
A-TITLE Secure coding
/en/mobile-security/Mobile security
A-TITLE Mobile security
/en/critical-infrastructure/Critical infrastructure
A-TITLE Critical infrastructure
/en/about-eset-research/Threat research
A-TITLE Threat research
/en/company/about-us/About WeLiveSecurity
A-TITLE About WeLiveSecurity
/en/our-experts/Our Experts
A-TITLE Our Experts
/en/company/contact-us/Contact Us
A-TITLE Contact Us
/en/English
A-TITLE English
/es/Text duplicate Español
A-TITLE Español
/de/Text duplicate Deutsch
A-TITLE Deutsch
/pt/Text duplicate Português
A-TITLE Português
/fr/Text duplicate Français
A-TITLE Français
/en/eset-research/telekopye-hi...Jakub Souček and Radek Jizba • 10 Oct 2024 • 11 min. read ESET Research Telekopye transitions to targeting tourists via hotel booking scam Jakub Souček and R...
IMG-ALT Telekopye transitions to targeting tourists via hotel booking scam
A-TITLE Telekopye transitions to targeting tourists via hotel booking scam
/en/eset-research/mind-air-gap...Matías Porolli • 07 Oct 2024 • 29 min. read ESET Research Mind the (air) gap: GoldenJackal gooses government guardrails Matías Porolli • 07 Oct 2024 • 29 min...
IMG-ALT Mind the (air) gap: GoldenJackal gooses government guardrails
A-TITLE Mind the (air) gap: GoldenJackal gooses government guardrails
/en/eset-research/separating-b...Romain Dumont • 02 Oct 2024 • 11 min. read ESET Research Separating the bee from the panda: CeranaKeeper making a beeline for Thailand Romain Dumont • 02 Oct...
IMG-ALT Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
A-TITLE Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
/en/business-security/untangli...Business Security Untangling the hiring dilemma: How security solutions free up HR processes
IMG-ALT Untangling the hiring dilemma: How security solutions free up HR processes
A-TITLE Untangling the hiring dilemma: How security solutions free up HR processes
/en/business-security/mdr-unlo...Business Security MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
IMG-ALT MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
A-TITLE MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
/en/scams/quishing-attacks-tar...Scams Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes Scams Quishing attacks are targeting electric car owners: Here’s h...
IMG-ALT Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes
A-TITLE Quishing attacks are targeting electric car owners: Here’s how to slam on the brakes
/en/cybersecurity/aspiring-dig...Digital Security Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships Digital Security Aspiring digital defender? E...
IMG-ALT Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships
A-TITLE Aspiring digital defender? Explore cybersecurity internships, scholarships and apprenticeships
/en/videos/goldenjackal-jumps-...Video GoldenJackal jumps the air gap ... twice – Week in security with Tony Anscombe Video GoldenJackal jumps the air gap ... twice – Week in security with T...
IMG-ALT GoldenJackal jumps the air gap ... twice – Week in security with Tony Anscombe
A-TITLE GoldenJackal jumps the air gap ... twice – Week in security with Tony Anscombe
/en/eset-research/telekopye-hi...ESET Research Telekopye transitions to targeting tourists via hotel booking scam ESET Research Telekopye transitions to targeting tourists via hotel booking ...
IMG-ALT Telekopye transitions to targeting tourists via hotel booking scam
A-TITLE Telekopye transitions to targeting tourists via hotel booking scam
/en/business-security/cyber-in...Business Security Cyber insurance, human risk, and the potential for cyber-ratings Business Security Cyber insurance, human risk, and the potential for cyber...
IMG-ALT Cyber insurance, human risk, and the potential for cyber-ratings
A-TITLE Cyber insurance, human risk, and the potential for cyber-ratings
/en/eset-research/mind-air-gap...ESET Research Mind the (air) gap: GoldenJackal gooses government guardrails ESET Research Mind the (air) gap: GoldenJackal gooses government guardrails ESET ...
IMG-ALT Mind the (air) gap: GoldenJackal gooses government guardrails
A-TITLE Mind the (air) gap: GoldenJackal gooses government guardrails
/en/videos/complexities-attack...Video The complexities of attack attribution – Week in security with Tony Anscombe Video The complexities of attack attribution – Week in security with Tony ...
IMG-ALT The complexities of attack attribution – Week in security with Tony Anscombe
A-TITLE The complexities of attack attribution – Week in security with Tony Anscombe
/en/eset-research/separating-b...ESET Research Separating the bee from the panda: CeranaKeeper making a beeline for Thailand ESET Research Separating the bee from the panda: CeranaKeeper mak...
IMG-ALT Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
A-TITLE Separating the bee from the panda: CeranaKeeper making a beeline for Thailand
/en/cybersecurity/system-resil...Business Security Why system resilience should mainly be the job of the OS, not just third-party applications Business Security Why system resilience should ...
IMG-ALT Why system resilience should mainly be the job of the OS, not just third-party applications
A-TITLE Why system resilience should mainly be the job of the OS, not just third-party applications
/en/cybersecurity/cybersecurit...Digital Security Cybersecurity Awareness Month needs a radical overhaul – it needs legislation Digital Security Cybersecurity Awareness Month needs a radical...
IMG-ALT Cybersecurity Awareness Month needs a radical overhaul – it needs legislation
A-TITLE Cybersecurity Awareness Month needs a radical overhaul – it needs legislation
/en/videos/gamaredons-operatio...Video Gamaredon's operations under the microscope – Week in security with Tony Anscombe Video Gamaredon's operations under the microscope – Week in security ...
IMG-ALT Gamaredon's operations under the microscope – Week in security with Tony Anscombe
A-TITLE Gamaredon's operations under the microscope – Week in security with Tony Anscombe
/en/eset-research/cyberespiona...ESET Research Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023 ESET Research Cyberespionage the Gamaredon way: A...
IMG-ALT Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
A-TITLE Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
/en/?page=1Subdomain 1
A-TITLE 1
/en/?page=1Subdomain ...
A-TITLE ...
/en/?page=2Subdomain 2
A-TITLE 2
/en/?page=3Subdomain 3
A-TITLE 3
/en/?page=4Subdomain 4
A-TITLE 4
/en/?page=542Subdomain Text duplicate ...
A-TITLE ...
/en/?page=542Subdomain 542
A-TITLE 542
/en/?page=2Subdomain >
A-TITLE >
/en/eset-research/eset-apt-act...New window Subdomain IMG-ALT Apt Activity Report
A-TITLE Apt Activity Report
https://www.eset.com/int/busin...New window External Subdomain IMG-ALT MDR Protection
A-TITLE MDR Protection
https://www.facebook.com/eset/External Subdomain A-TITLE Join our facebook fan site!
https://youtube.com/esetglobalExternal A-TITLE Watch our videos at YouTube Channel.
https://twitter.com/ESETExternal A-TITLE Visit the official WLS Twitter page.
https://www.linkedin.com/compa...External Subdomain A-TITLE Follow us on LinkedIn.
/rss-configurator/Subdomain A-TITLE Don´t miss a single post!
/en/A-TITLE Welivesecurity
/en/company/about-us/About us
A-TITLE About us
https://www.eset.com/External Subdomain ESET
A-TITLE ESET
/en/company/contact-us/Contact us
A-TITLE Contact us
/en/company/privacy/Privacy Policy
A-TITLE Privacy Policy
/en/company/legal-information/Legal Information
A-TITLE Legal Information
/en/Manage Cookies
A-TITLE Manage Cookies
/en/rss/feed/RSS Feed
A-TITLE RSS Feed
https://www.facebook.com/eset/External Subdomain Text duplicate A-TITLE Join our facebook fan site!
https://youtube.com/esetglobalExternal Text duplicate A-TITLE Watch our videos at YouTube Channel.
https://twitter.com/ESETExternal Text duplicate A-TITLE Visit the official WLS Twitter page.
https://www.linkedin.com/compa...External Subdomain Text duplicate A-TITLE Follow us on LinkedIn.
/rss-configurator/Subdomain Text duplicate A-TITLE Don´t miss a single post!

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.welivesecurity.com/en/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
This page uses GZip for compressed data transmission.
Performance
(Somewhat important)
The page response time is excellent with 0.12 seconds.
The file size of the HTML document is fine (84 kB).

HTTP Response Header

NameValue
content-typetext/html; charset=UTF-8
referrer-policyno-referrer-when-downgrade
x-xss-protection1; mode=block
x-content-type-optionsnosniff
access-control-allow-origin*
content-security-policydefault-src 'none'; child-src https://disqus.com https://vars.hotjar.com; connect-src 'self' http://ad.doubleclick.net https://*.akamaihd.net https://*.akstat.io https://*.eset.com https://*.hotjar.com https://*.hotjar.io https://adservice.google.com https://captcha.welivesecurity.com https://cc.welivesecurity.com https://cdn.esetstatic.com https://cdn.linkedin.oribi.io https://in.hotjar.com https://px.ads.linkedin.com https://region1.google-analytics.com https://stats.g.doubleclick.net https://trial-eum-clientnsv4-s.akamaihd.net https://trial-eum-clienttons-s.akamaihd.net https://vc.hotjar.io https://ws22.hotjar.com https://ws32.hotjar.com https://www.facebook.com https://www.google-analytics.com https://www.google.com https://www.googletagmanager.com https://www.opinionstage.com wss://*.hotjar.com wss://ws1.hotjar.com; font-src 'self' data: https://script.hotjar.com; form-action 'self' https://enjoy.eset.com; frame-ancestors 'self'; frame-src 'self' https://*.slideshare.net https://bid.g.doubleclick.net https://c.disquscdn.com https://disqus.com https://m.facebook.com https://open.spotify.com/ https://platform.twitter.com https://player.vimeo.com https://share.transistor.fm https://tpc.googlesyndication.com https://vars.hotjar.com https://www.buzzsprout.com https://www.facebook.com https://www.googletagmanager.com https://www.instagram.com https://www.opinionstage.com https://www.podbean.com https://www.screencast.com https://www.slideshare.net https://www.youtube-nocookie.com https://www.youtube.com; img-src 'self' data: https://*.ads.linkedin.com https://*.esetstatic.com https://adservice.google.com https://analytics.twitter.com https://c.disquscdn.com https://captcha.welivesecurity.com https://connect.facebook.net https://googleads.g.doubleclick.net https://px.ads.linkedin.com https://referrer.disqus.com https://region1.google-analytics.com https://script.hotjar.com https://secure.eset.com https://syndication.twitter.com https://t.co https://twitter.com https://www.facebook.com https://www.google-analytics.com https://www.googletagmanager.com https://www.hotjar.com https://www.linkedin.com https://www.youtube.com; manifest-src 'self'; media-src 'self' https://web-assets.esetstatic.com; object-src 'self' https://content.screencast.com; script-src 'self' 'unsafe-eval' 'unsafe-inline' https://a.disquscdn.com https://assets.esetstatic.com https://cdn.esetstatic.com https://connect.facebook.net https://embed.playbuzz.com https://googleads.g.doubleclick.net https://platform.twitter.com https://script.hotjar.com https://snap.licdn.com https://static.ads-twitter.com https://static.hotjar.com https://tpc.googlesyndication.com https://welivesecurity.disqus.com https://www.buzzsprout.com https://www.google-analytics.com https://www.googleadservices.com https://www.googletagmanager.com https://www.instagram.com https://www.opinionstage.com https://www.youtube.com; style-src 'self' 'unsafe-inline' https://assets.esetstatic.com https://c.disquscdn.com https://cdn.esetstatic.com; worker-src 'self'; report-uri https://www-welivesecurity-com.api.cspconsole.com/v1/csp/report; report-to csp-endpoint;
reporting-endpointscsp-endpoint="https://www-welivesecurity-com.api.cspconsole.com/v1/csp/report"
x-edps-request-statusnormal
strict-transport-securitymax-age=15724800
x-akamai-transformed9 - 0 pmb=mRUM,2
content-encodinggzip
cache-controlpublic, max-age=84535
dateTue, 15 Oct 2024 10:02:15 GMT
content-length20204
varyAccept-Encoding
set-cookie100 Characters
server-timingcdn-cache; desc=HIT
statuscode200
http_versionHTTP/2

External factors

This page is referenced by wikipedia.
This website has excellent links from other websites.
This page has backlinks from 108 referring domains.
This page has 723 backlinks.
This page has backlinks from 91 different ip addresses.

Search preview

www.welivesecurity.com
Award-winning news, views, and insight from the ESET security commu...
WeLiveSecurity comes from the brains at ESET - experienced researchers with in-depth knowledge of the latest threats and security trends.

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
security66%Check
ESET security63%Check
ESET58%Check
ESET security community57%Check
ESET RESEARCH52%Check
Latest50%Check
Business Security50%Check
Security Solutions50%Check
security industry50%Check
Digital security50%Check

Test up to 1.000 webpages of welivesecurity.com with our free plan!

Try For Free
No trial. It's just free!

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions