All Posts by Chris Hardee

Website Review:

Website Review:

This week, I'm reviewing the website for Drag, a Gmail plugin that "transforms Gmail into organized lists (like Trello, in Gmail)":


Let's start with some wins. Drag has a nice looking website with several things done right:


I love the "get launch pricing" countdown at the top of the screen; it adds a sense of urgency. 

You offer great social proof:
"Featured in Chome Store (with 5 stars)."
"10K+ users trust Drag including some well-recognized brands"

Adding a public road map in Trello informs both users and prospects where your company is going.

You provide an authentic video that shows exactly how transforming our Gmail into organized lists will look with Drag.

"Adding people to your email list without their consent isn't going to win their trust or make them want to work with you." - Croissants vs. Bagels: Strategic, Effective, and Inclusive Networking at Conferences by Robbie Samuels

Here are a few opportunities for improvement that can help improve sales:

Opportunities for improvement:

  • check-circle-o
    Instead of using cold email for lead generation, offer a free giveaway and use it to get them to opt-in to your email list. This will allow you to create an email series that is helpful while promoting your product.
  • check-circle-o
    Move your countdown timer farther down the page so the reader understands the benefits of purchasing your product before you tell them how long they have to get it.
  • check-circle-o
    Security is critical to our emails. However, the only reference you have to security is in a link at the bottom of the page. Make security content more prevalent on the page. This could be a powerful addition to your marketing.
  • check-circle-o
    On the home page, you mention 10K+ users trusting Drag, but on your pricing page, it has 14K+. Make these the same.
  • check-circle-o
    You've done such a great job with your authentic video, you should make it easier for people to access. You could test adding a video image to the home page to make it more noticeable.
  • check-circle-o
    Nice job adding testimonials at the bottom of the home page. However, it would be more authentic if you added the names (and possibly a picture) of the people that gave the testimonials.

The Final Verdict:

You already have an impressive website, and by addressing these Opportunities for Improvement you can make it even better.

Check out this review of

Would like to request a review of your website? If so, please contact me at reviews [at]

How Social Engineering Can Make You a Better Copywriter

Adrian Lamo, Kevin Mitnick, and Kevin Poulson

A few years ago, when I started interviewing subject matter experts (SMEs) about their products and services, I struggled with knowing the proper lingo (cybersecurity SMEs have their own jargon), asking the right questions, having enough confidence, and ultimately being a good enough “listener” to pick up more than just the words being spoken.

As a tech guy from way back (any Commodore 64 fans out there?), I've had a fascination with hackers like Kevin Mitnick and how they are able to get their marks to trust them enough to give them access to confidential information. I like studying what they do, and find their exploits fascinating.

Who is Kevin Mitnick?

In case you're not familiar with Kevin Mitnick, he is a famous hacker who is known for breaking into large technology companies like Motorola, Sun Microsystems, and Novell in the 1980s and 90s. While these days it seems like a lot of hackers are destructive in nature, Mitnick never destroyed anything. He gained access (usually through social engineering) and made copies of information.

One of Mitnick's biggest assets is the ability to use social engineering to get people to trust him and give him the information he needs. He has the ability to get people on the phone and ask them questions in such a way that they feel comfortable enough to give him confidential information.

Unfortunately for Mitnick, his addiction to hacking destroyed his marriage and he ended up being on the FBI's Most Wanted Cyber Criminal list before being arrested in 1995.

Building trust with social engineering

As copywriters, we aren't hackers and we don't break into institutions to steal information. We don't even dumpster dive for critical pieces of information (well, not usually). However, we do need to be able to get on the phone with clients, their customers, and others and get them to trust us so that we can ask them the right questions and get them to give us honest answers.

Maybe it's asking about the customer's business or wanting to hear about their needs. It's all about getting people to know, like, and trust us, and in this way social engineering can help us obtain this goal.

Here are three things I learned from social engineering that can help you build trust when interviewing someone for your next copywriting project:

1. Know the lingo

In social engineering, when you talk to your mark, you need to know the lingo if you are going to get them to trust you. For example, if you can’t talk tech to a systems administrator, it’s unlikely they’ll give you the information you need.

The same is true when you interview a subject matter expert. If you’re discussing the latest hacking exploits and don’t know the buzzwords, you’re likely to lose credibility and they won’t trust you to write the content.

2. Dive deep into your research

When hacking, Mitnick often took several steps in order to infiltrate a system. For example, it may start with doing research and then searching for information that would help him gain access. The next step may be to call a person with insider access and build trust so they will give him the login credentials he needs.

The same is true for copywriting. We need to research our subjects and create the right questions before we get on the phone or video conference. This includes a full immersion to learn intimately about the company, its market, the product or service, its subject matter experts, and the competition.

3. Listen to more than just the words

While practicing social engineering, Mitnick needed to listen to the person on the other end of the phone and pay attention to more than just the words. Based upon their voice, is the mark buying into the story? Am I building trust or are they about to end the conversation and call the FBI?

As a copywriter, it helps to listen to more than just the words. That can include intonation and, if possible, body language. You need to empathize with your clients to help build trust. This includes understanding their stresses, causes of anxiety, and concerns. “Listening” to more than just the words can help you pick up on your client’s driving motivation and tailor your services to meet their needs.

What if you’re not a master of social engineering like Kevin Mitnick? The good news is that you don’t have to be in order to benefit from these tips. By knowing the lingo, doing your research, and listening to more than just words, you can build trust when you interview SMEs, CEOs, and more. Once you’ve established that trust, your copywriting will improve.

Fixing your follow-up emails


In this video, I'm going to teach you a simple trick that many businesses get wrong with their follow up emails.

Recently, I attended a conference, got my badge scanned, and started receiving emails a few weeks later. Now, I'd like to share with you some clips that I've found are common practice from these emails:

  • "I noticed we were both at Black Hat last week"
  • "I didn’t get a chance to introduce myself"
  • "I am not sure if you have seen this"
  • "If interested, I would love to provide a more in-depth, live demonstration of our platform."

As you can tell, these clips are filled with "I's".

My solution is to focus on the reader instead using AIDA.

This stands for:

Attention: The opening line pulls the reader in by referencing the conference

Interest: It piques her interest by telling them about the current state of cyber criminals

Desire: What the fear of missing out is really going to do.  What will do when the next cyber attack hits?

Action: What action do you want them to take?