Google added a new section to its Quality guidelines category entitled “Prevent Abuse on Your Site and Platform” about 24 hours ago. Most of the content is not new, mainly sourced from a 2017 Google blog post about protecting your site from user-generated spam, now incorporated into the documentation.
Spammers often use open comment forms and other user-generated content to generate spam on the sites of unsuspecting victims. Hosting platforms are also vulnerable to abuse; Spammers can create a large number of websites that violate Google quality guidelines and add little or no value to the web.
It’s usually not difficult to prevent your platform or website from being abused by spammers. Even simple deterrents, such as unusual challenges that users must complete before interacting with your property, can deter spammers.
In recent years, Google has done an excellent job of consolidating content and improving Google Help documentation, particularly in the area of Google Search.
Google’s suggestions for preventing abuse of sites and platforms include:
- Let users know that you don’t allow spam on your service
- Identify spam accounts
- Use manual approval method for suspicious user interactions
- Use block lists IPs to prevent repeated spam attempts
- Block automatic account creation
- Monitor your service for abuse
How To Prevent Spam And Abuse?
It is significant to tell users you do not allow spam and abuse on your website by publishing a clear abuse policy and identifying and blocking the spam accounts. If your website or blog has a comment section, use the no follow, no index tags to prevent spammers from submitting irrelevant and spooky comments. Furthermore, manually approve each comment submitted to make sure not a single abusive or spam comment gets published on your site or platform.
If you find a spam profile, delete it and add it to the permanent block list of the IPs if you see multiple spam profiles from the same IP address. For CMS (like WordPress), there are plugins like Akismet that can help you permanently block users, by adding IP addresses to your firewall’s reject list can also be very effective.
Source: Google Search Central
Featured Image: Rawpixal/FreePik