SEO Nɔtsie Ɖe 7: Lɛkɛtɔ — Gǒgǒ Fia Vɔli wo Ɖe 2026
SEO Nɔtsie Ɖe 7: Lɛkɛtɔ
Eyi ne Nɔtsie Ɖe 7 ƒe 13-Nɔtsie SEO Nɔtso. Lɛkɛtɔ nyɛ nɛ fɔfɔ Tsilɛ — eye ɔka nɛ kɔ hɔ kɔtsɔ ayi wɛnitsɔ. Google de HTTPS yɛ nɔtso kɔmɛkɛ ƒe lɛdɔwo fi 2014 kɔ, eye apɔ wòame tɔwɔ bɔ le.
Aƒe nyɔnu atsi nɛ lɛkɛtɔ aɖe nɔɔ — "Yɛwɔ SSL, enti yɛ wɛb lɛkɛ." Nɛ bɔbɔkɔ, Google di akɔ ze aɖe lɛkɛtɔ tɔmɛ. Wɛbsite a do lɛkɛtɔ edzi, mɔkɔ me na wɛb lɛkɛ aɖe wɔ tɔsisi SSL ndɔ zeresi lɛdɔwo — nʋnyɔ emoji fɔ.
Fia nyɔnu: | dɔme aɖe | abɔ lɛfɛ | nɔxɔ nyitsɔ | ---|---|---|---| | Ʋɔlɔmɔ yo | Ʋɔlɔmɔ ze da fɔlɔ kɔ lɛgbɔ | Hɛ ɖe wɛb lɛkɛ bɔkɔ | | Fɔvin bɔ | Yɛntɔwɔdɔ ngɔ | SSL Labs nyɛtɔ | | TLS 1.2+ | Ʋɔl ɔtɛda fɔ na hɛ | SSL Labs nyɛtɔ | | Nyelɔ SHA-1 | Kɔ ɖi, wɛb lɛkɛ ha | Tɛdɔ nɔ | | SAN bɔ | www eye non-www nyɛ nyɛyɔ | Tɛdɔ nɔ | | Autɔ-renewal | Fɔ dɔ aɖe | Let’s Encrypt / provider config |
SSL test:
100% = Ʋɔlɔmɔ yo + Fɔvɛlɔmɔ + TLS 1.3 + Ʋɔlɔmɔ pɔlɔmɔ + Autɔ-renew
0% = Ʋɔlɔmɔ dra vɔdɔ de ɖe
Nɛ yɔ ɔkɔbɔ:
- Ʋɔlɔmɔ dɔ aɖe nɛ fɔlɔ dɔ nyɔnu — Kɔ afomɔlɔ (Nɔtsie 6) aɖe aɖe 30 ƒe dɔda
- Fɔvɛlɔmɔ afɔ — Server bo nyɛ mɔ fɔ ɖa mɔ kɔ yɔ
- Mixed content — HTTPS aɖe kɔ HTTP dɔlɔmɔ fɔ (ɔmɔ, aɖe, tɛtɛ)
- Redirect loops — HTTP → HTTPS → HTTP kɔ gɔ mɔ
- Non-www vs www kɔ afɔ — Ʋɔlɔmɔ bo a fɔ a, dɔ tɛmɔ lɛ ebi gɔ
Mekɔ bokɔ: Kɔ hebɔmɔ SSL Labs (ssllabs.com/ssltest). Nɛ nɛ dɔ "A" a lo o Meri na ebi egbɔ. Aɖe provider bɔ tɔkɔ lɛ fɔ ɖe kɔɔ.
Lɛkɛtɔ Edzi
Lɛkɛtɔ edzi nye HTTP edzi lɛ anɔ yɔrɛ aɖɔ ahe. Wɔ agboglaalo le rɔtsɔtɔwɔ hɛ — Google nsinye hɔ tɔsisi nɔnu be enwɛ o.
Lɛkɛtɔ edzi tɔ aɖe:
Content-Security-Policy (CSP)
CSP nye lɛtɔ edzi tɔ alede. Emaa nyɔlɔ hɛn fɔfɛ aɖe (aɖɔ, tɛtɛ, ɔmɔ, aasɔlɔ) a nyɔ hɛn lɛ.
Content-Security-Policy: default-src 'self'; script-src 'self' https://cdn.example.com; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; connect-src 'self' https://api.example.com; frame-ancestors 'none';
Dɛn CSP bɔ:
- Cross-site scripting (XSS) ɓɔ
- Data injection ɓɔ
- Clickjacking (via
frame-ancestors) - Únɔla script nsiyɔ (cryptominers, ad injectors)
CSP efri bɔko:
- Gbegbɔ
Content-Security-Policy-Report-Only(na aɖe hɛn fɔlɔ) - Bɔkɔ wɔ reports lá azɔtɔ 1-2 ƒelɔ
- Hɔxɔ wɛn nɔni
- Switch wɔ enforcing mode
- Kɔ
report-urimatou wèi reportiɖi hɛn nɔ
X-Frame-Options
Lɛkɛtɔ aɖɔ aɖe fa wɛb lɛkɛ me gɔn gwo ahe (clickjacking lɛ ɔ).
X-Frame-Options: DENY
Or si wɛb lɛkɛ fɔlɔn mi mɔ gɔn ɖe:
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options
Mɔ lɛ ahe aɖe kɔnwɔ update (interpreting files tɔna mɛdzɛu).
X-Content-Type-Options: nosniff
Eyi bɔ le eŋhɔdɔ ahe a .jpg file a tso ahe ahe a browser hɛn tɔ nɛ.
Referrer-Policy
Sɔdɔ ɖɔkɛ le, síbɔ ɖɔ ni yɔa gonger ipɔ ahe a yɔrɛ.
Referrer-Policy: strict-origin-when-cross-origin
Eyi yɔa gʋn dɔ kɔ aɖee a same-domain ƒomɔ agɔ a ewu so but bɔ yɔa heec (domain) a cross-domain.
Permissions-Policy
Lɛkɛtɔ awi mai browsers no (camera, microphone, geolocation, etc.) a wɛb.
Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=()
Dɔ ahe nyɔna a bɔmi to prevent third-party scripts frɛ nua dɓɔ to.
Header implementation example (Next.js):
// next.config.js
module.exports = {
async headers() {
return [{
source: '/(.*)',
headers: [
{ key: 'X-Content-Type-Options', value: 'nosniff' },
{ key: 'X-Frame-Options', value: 'SAMEORIGIN' },
{ key: 'Referrer-Policy', value: 'strict-origin-when-cross-origin' },
{ key: 'Permissions-Policy', value: 'camera=(), microphone=(), geolocation=()' },
{ key: 'Strict-Transport-Security', value: 'max-age=31536000; includeSubDomains; preload' },
]
}]
}
}
Header implementation (Apache .htaccess):
Header always set X-Content-Type-Options "nosniff"
Header always set X-Frame-Options "SAMEORIGIN"
Header always set Referrer-Policy "strict-origin-when-cross-origin"
Header always set Permissions-Policy "camera=(), microphone=(), geolocation=()"
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
Header implementation (Nginx):
add_header X-Content-Type-Options "nosniff" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
Mekɔ bokɔ: Fa 5 lɛkɛtɔ aɖe si na server configuration. Eyi fa 5 da bɔme ne da ho bɛ dae to.
HSTS Preload
HTTP Strict Transport Security (HSTS) hɛ browser lɔ na malɔ HTTP a de bɛ hesasɛma — gɔkɔ vɔdɔtɔ wɛm.
HSTS header:
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Lɛkɛtɔ mǎ aɖe:
| Directive | Ʋɔdɔ | |-----------|-------| | max-age=31536000 | Kɔ lɛ fi kɔ 1 dɔ (ɛdɔ) | | includeSubDomains | Bɔ aɖi kɔ subdomain | | preload | Tɔ aɖe ai wɛ browser preload list |
HSTS preload list:
Dɔ aɖe kɔ HSTS lɛ kɔ. Browsers nyɔ bɛ aɖe lɛ no na ga bɔ HTTPS. Kɔ hstspreload.org de bɛ:
- Sɔkɔ fiawo yɔ HTTPS a wɛn (nɩ HTTP → HTTPS redirect)
- Impossible wɔ gɔtɔ kwekɔ
- Bɔ lɛmekɔ (ɛbadɔ lɔtɔ bi)
Nkɔdo bɔ HSTS preload:
- Ʋɔlɔmɔ yo HTTPS
- Redirect gbogbo HTTP kɔ HTTPS (subdomains so)
- HSTS header ma
max-age>= 31536000 - HSTS header yɛ
includeSubDomains - HSTS header yɛ ‘preload’
- All subdomains ɛyɔ sɛ HTTPS
Nkɔdo: Nyɛ preload nɔ subdomains nɛ bɔ a yɛ HTTPS. includeSubDomains durusé kɔ a HTTP only one bɛme be nayi yɛ lɛwɔ.
Mekɔ bokɔ: Sɛ wòlɔ HTTPS wɔ kantite subdomains áyiyá kɔ HSTS header kpɛ submit ɖe hstspreload.org. Ɔndry yɛwɔn hɛ ʋ egbɔ rɔ vãdɛme.
Vɔlɔbɔla Lɛkɛ
Vɔlɔbɔla lɛkɛ a kɔ ahe a kɔ senɛmɔyáló sɔsɔ a jito lɛkɛ mɔfɔ yɔmɔ fɔ.
Vɔlɔbɔla lɛkɛ a hɔɖe:
- Swiss software: WordPress, plugins, JavaScript libraries a wɔdɔ CVEs
- Fa file a wɛ:
.env,.git,wp-config.php, database dumps - Ahe dɔsɔ: Server version headers, debug mode, stack traces
- Default credentials: Admin pages a wɔdɔ bona, default passwords
- Open ports/services: Unnecessary services exposed to the internet
- Injection points: Forms nɔ CSRF gɔmɔ mɔbɔmúnɔ, unvalidated inputs
Ami ausɔ gɔmɔ fa platform:
| Platform | Top Ʋɔlɔbɔla | Fix | |----------|-------------------|-----| | WordPress | Outdated plugins | Auto-update + WAF | | Shopify | Third-party app permissions | Audit app list quarterly | | Next.js | Exposed API routes | Auth middleware + rate limiting | | Static sites | CDN misconfiguration | Review cache rules | | Custom | SQL injection | Parameterized queries |
Bɔla frequency:
- Bɔkɔ: Automated surface scan (SSL, headers, exposed files)
- Wɔyɛ: Dependency vulnerability check (npm audit, WordPress plugin scanner)
- Wɔmɔ: Deep scan with authenticated testing
- Ʋɔha ofe: Regression check
Mekɔ bokɔ: Run npm audit (Node.js) anaa check your CMS plugin list fa outdated components. Fi bɔ critical/high severity issues bɛ nɔɔ.
Mixed Content
Mixed content a gɔ a HTTPS a kɔ resources (ɔmɔ, aɖɔ, tɛtɛ, ahe) kie HTTP. Eyi nɔ nɛ kɔ nɛdze ne horoso le.
Ami mixed content:
| Type | Ʋɔdɔ | Nzé | Browser Behavior | |------|----------|---------|------------------| | Active | High | HTTP script, iframe, CSS | Blocked by default | | Passive | Medium | HTTP ɔmɔ, video, audio | Loaded with warning |
Active mixed content yɔne gɔme alede browsers — entikɔ yɔ a si a dɔ frɛ bo yɛne. Passive mixed content loads bu a fɔkɔ.
Finding mixed content:
- Open Chrome DevTools → Console
- Kɔ "Mixed Content" warnings
- Alternatively, scan with a crawler (Screaming Frog, LANGR)
Nɛ mixed content hɔ yɔ:
- Hardcoded
http://URLs wɔ content (blog posts, product descriptions) - Third-party widgets loading HTTP resources
- Embedded content (YouTube old embeds, social media widgets)
- CSS
background-imagefa HTTP URLs - Fonts loading a HTTP
Nzete mixed content:
<!-- Kɔ de -->
<img src="http://example.com/image.jpg" />
<!-- Kɔ de ke -->
<img src="https://example.com/image.jpg" />
<!-- Kɔ de (protocol-relative, adapts to page protocol) -->
<img src="//example.com/image.jpg" />
Database fix (WordPress):
UPDATE wp_posts SET post_content = REPLACE(post_content, 'http://yourdomain.com', 'https://yourdomain.com');
UPDATE wp_postmeta SET meta_value = REPLACE(meta_value, 'http://yourdomain.com', 'https://yourdomain.com');
Mekɔ bokɔ: Open your homepage in Chrome, أسس F12, check the Console tab for mixed content warnings. Fi bɔ dɔ de de — mɔ ɛfɛga be Google tɔ.
Third-Party Script Risks
Every external script you load is a potential lɛkɛtɔ (eye performance) ahead. Third-party scripts dɔ:
- Be compromised (supply chain attacks)
- Track your users without consent (GDPR violation)
- Slow your site (render-blocking, network latency)
- Break functionality (version updates, outages)
- Inject unwanted content (ad scripts gone wrong)
Audit your third-party scripts:
| Script | Necessary? | Risk Level | Alternative | |--------|-----------|------------|-------------| | Google Analytics | Often yes | Low | Server-side tracking | | Chat widgets | Maybe | Medium | Self-hosted solutions | | Social share buttons | Rarely | Medium | Static share links | | A/B testing | Sometimes | High | Server-side testing | | Retargeting pixels | Business decision | High | First-party data | | Font CDNs | Convenient | Low | Self-host fonts |
Risk mitigation for essential third-party scripts:
- Subresource Integrity (SRI): Hash verification prevents tampered scripts from loading
<script src="https://cdn.example.com/lib.js"
integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxAE+sO0..."
crossorigin="anonymous"></script>
- CSP restrictions: Only allow scripts from known domains
- Sandboxed iframes: Isolate third-party widgets
- Regular audits: Quarterly review of all external resources
- Monitoring: Alert on new external domains appearing in your pages
Mekɔ bokɔ: Fa lɛkɛtɔ hɛn tag da lɔ a loading from external domain. Bɛ lɛni bɔ a kwenye mɛ yi mɔ be bɔ a si a yɛ lɛ.
Malwa Detection & Google Safe Browsing
Google mɛta Safe Browsing list a wɛ a ne malware ana ahe phishing content. Nɔ lɛ yína torture ɔme SEO — Google displays a full-page warning before allowing users to visit your site.
Dɛn a site e flag:
- Compromised site distributing malware (hacked WordPress, etc.)
- Injected scripts redirecting to malicious sites
- Phishing pages hosted on your domain
- User-generated content linking to malware
- Hosting files flagged as dangerous
Checking your Safe Browsing status:
https://transparencyreport.google.com/safe-browsing/search?url=yourdomain.com
Or in Google Search Console: Security Issues section.
Prevention:
- Keep all software updated (CMS, plugins, libraries)
- Use strong, unique admin passwords + 2FA
- Monitor file integrity (detect unauthorized changes)
- Scan user-uploaded content
- Remove unused plugins/themes
- Review admin users regularly
If you get flagged:
- Identify and remove the malware/phishing content
- Update all software and change all passwords
- Request a review in Google Search Console
- Reviews typically take 1-3 days
- Monitor closely for 30 days (re-infection is common)
Mekɔ bokɔ: Check your site at transparencyreport.google.com. Sɛ lɛ eyo, yɛ run yo CMS eye all plugins dey wulɔ yɔdɛ wa wɔ.
Lɛkɛtɔ SEO Checklist
- [ ] Ʋɔlɔmɔ yo wɛ SSL de autɔ-renewal kɔ
- [ ] HTTP → HTTPS redirect wɔ all pages (301, nɔ 302)
- [ ] HSTS header adɔ ma max-age >= 31536000
- [ ] Content-Security-Policy header kɔ
- [ ] X-Content-Type-Options: nosniff
- [ ] X-Frame-Options: DENY or SAMEORIGIN
- [ ] Referrer-Policy: strict-origin-when-cross-origin
- [ ] Permissions-Policy disabling unused features
- [ ] No mixed content (HTTP resources wɔ HTTPS pages)
- [ ] No sensitive files exposed (.env, .git, config files)
- [ ] Server version headers removed or generic
- [ ] All software/plugins up to date
- [ ] Google Safe Browsing status: clean
- [ ] Third-party scripts audited and minimized
- [ ] SRI hashes on critical external scripts
Aƒe Yɔlɔa Lɛkɛtɔ (Njɔdɔ fí SEO Impact)
- Ʋɔlɔmɔ dra vɔdɔ — Immediate ranking drop + browser warning
- Mixed content — Degrades trust signals, partial encryption useless
- No HSTS — First request vulnerable, signals weak security posture
- Missing CSP — Allows any script to execute (XSS vector)
- Exposed sensitive files —
.envwith API keys,.gitwith source code - Outdated CMS/plugins — Known exploits, eventual compromise
- No security headers at all — Signals you haven't considered security
- Over-permissive third-party scripts — Security holes you can't control
What's Next?
Nɔtsie 8: AI Visibility — Lɛ mɛ nɔtsie kɔmɛkɛ SEO a 2026. Dɛn na yɛ ga optimize fa Google AI Overview, ChatGPT citations, Perplexity references, eye Gemini — the fastest-growing discovery channel most competitors haven't even considered.
Eyi ne LANGR nɔtsie 13-ŋɔ SEO mɛlɛ. Run a free audit hɛn a kpɔ hɛn site hɔn kɔ vɔɔ yi na 13 disciplines.