Google makes continuous algorithm updates designed to improve user experience. Every few months, Google rolls out core updates. These updates prioritise the most relevant results for search queries.
Changes to the algorithm can impact websites and where they rank in SERPs. This can be both positive and negative.
It can take years for a website to recover if an update lowers its SEO score. Because of this, Google has begun pre-warning webmasters about upcoming changes. Google uses the @SearchLiason twitter to communicate.
2020 Google Search Algorithm Updates:
May 2020 Core Update:
The latest Google Algorithm Update was the May 2020 Core Update. This was a ‘broad core’ update and not specific to any region or category of websites. The May 2020 update focused on a large array of quality issues based on SEO compliance and usability.
January 2020 Core Update:
The January 2020 Core Update focused on the YMYL (Your Money or Your Life) category. This update penalised ‘thin’ content across websites.
A negative impact from a google algorithm update does not mean your content or pages have errors. It means Google has found more authoritative content to rank above yours.
The LinkLess Ecosystem:
Links to your website aren’t the only way people can hear about your brand. Mentions are now a primary resource for Google’s algorithms.
Google tracks mentions of your brand or organisation and uses this to measure trust.
Google is updating its ranking mechanics to prioritise original reporting. SERPs show the latest and most comprehensive versions of news stories. With this in mind, Google News has stated changes are being made for first reports to stay at the top of SERPs for longer.
The way we use the internet has become much more organic in recent years. As we change how we interact with our devices, our online ecosystem evolves with us.
Digital Identity and Security
Cogito Group is an award-winning cybersecurity company specialising in authentication, cloud security, identity management and data protection. Cogito Group protect the authentication methods used to access information through the use of Identity and other security technologies.