SEO Content Performance Audit

Audit existing SEO content to identify what to improve, update, or remove.
Marketing - SEO - SEO Content Performance Audit

Who it's for

SEO specialists,Content teams,Agencies,Marketing managers,Founders

Get Ready

Prepare the Required Inputs listed in the Workflow Prompt. Use as much detail as necessary.

How to use this prompt

1. Copy the Workflow Prompt.
2. Paste it into your AI tool.
3. Replace the "Required Inputs"
4. Run the prompt.

🔒

Unlock the Full Workflow

Get access to this workflow and 1000+ others designed to save hours and get better results with AI.

Workflow Prompt

				
					Audit SEO content performance.

### Required Input
- Content List: [URLs or titles]
- Performance Data: [Traffic, rankings, conversions]
- Target Audience: [Who content is for]
- Primary Goal: [Traffic, leads, engagement]

### Instructions
1. Validate inputs and request missing details.
2. Analyse performance of each content piece.
3. Identify high performers, underperformers, and outdated content.
4. Recommend actions: update, consolidate, remove, or expand.
5. Provide reasoning for each recommendation.

### Output
- Content item
- Performance summary
- Issue identified
- Recommended action
- Priority level
				
			

Optional advanced instructions

				
					Focus on quick wins that can improve traffic within 30 days.
				
			

Example output

SEO Content Performance Audit for a B2B Cybersecurity Blog

Inputs reviewed: Content List and Performance Data: “What Is Phishing?” receives 7,500 monthly visits, ranks positions 2 to 5 for awareness keywords, and generates few demo requests. “Ransomware Prevention Checklist” receives 1,100 monthly visits, ranks position 11, and generates 18 leads per month. “Best Endpoint Security Software” receives 420 monthly visits, ranks position 16, and generates 9 demo requests. “Cybersecurity for Small Businesses” receives 300 monthly visits, declining 35 percent year over year, and generates 2 leads. “Zero Trust Security Guide” receives 2,000 monthly visits, ranks position 7, but has weak engagement. “Cloud Security Compliance Checklist” receives 150 monthly visits, ranks outside the top 30, and has no conversions. Target Audience: IT managers, security leads, compliance managers, and small business owners. Primary Goal: Generate qualified leads while maintaining traffic growth.

Audit Summary

The content portfolio has a mix of high-traffic awareness content and under-optimised commercial content. The highest priority is to improve pages already near page one, especially “Ransomware Prevention Checklist”, “Best Endpoint Security Software”, and “Zero Trust Security Guide”. The awareness article “What Is Phishing?” should be conversion-optimised rather than heavily rewritten. Declining or weak content should be refreshed, consolidated, or repositioned toward stronger search intent.

Content Recommendations

  • Content Item: What Is Phishing? Performance Summary: Strong traffic and top-five rankings, but low demo conversion. Issue Identified: Search intent is mostly educational and calls to action are not aligned with early-stage visitors. Recommended Action: Expand with examples, add a phishing prevention checklist, include internal links to email security and employee training pages, and offer a downloadable phishing awareness template. Priority Level: Medium.
  • Content Item: Ransomware Prevention Checklist. Performance Summary: Moderate traffic, ranking just outside page one, and strong lead generation. Issue Identified: High conversion potential but not ranking high enough. Recommended Action: Update with current prevention steps, add expert quotes, improve title and headings, include a downloadable checklist, add schema, and build internal links from related ransomware and backup articles. Priority Level: High.
  • Content Item: Best Endpoint Security Software. Performance Summary: Low traffic, position 16, but strong demo intent from existing visitors. Issue Identified: Commercial page is underperforming in rankings and may lack comparison depth. Recommended Action: Expand into a full comparison guide with feature tables, use cases, pricing considerations, buyer criteria, and competitor comparisons. Add stronger demo calls to action. Priority Level: High.
  • Content Item: Cybersecurity for Small Businesses. Performance Summary: Declining traffic and weak lead generation. Issue Identified: Content may be outdated, too broad, or losing relevance to stronger competitor pages. Recommended Action: Refresh with current threats, small business security checklist, budget guidance, and links to managed security service pages. Consider splitting into separate pages for “small business cybersecurity checklist” and “cybersecurity services for small businesses”. Priority Level: Medium.
  • Content Item: Zero Trust Security Guide. Performance Summary: Good traffic and ranking position 7, but weak engagement. Issue Identified: Content likely does not satisfy practical implementation intent. Recommended Action: Add implementation steps, diagrams, maturity model, examples by company size, and internal links to identity, endpoint, and cloud security pages. Priority Level: High.
  • Content Item: Cloud Security Compliance Checklist. Performance Summary: Low traffic, poor rankings, and no conversions. Issue Identified: Page may be too thin or not mapped to a specific compliance framework. Recommended Action: Rework into separate checklist pages for ISO 27001, SOC 2, GDPR, and cloud security audits, then consolidate weak overlap into a stronger hub page. Priority Level: Medium.

Priority Ranking

  • High Priority: Ransomware Prevention Checklist because it is close to page one and already converts.
  • High Priority: Best Endpoint Security Software because it targets commercial searchers and demo intent.
  • High Priority: Zero Trust Security Guide because it has ranking momentum but needs better engagement and practical depth.
  • Medium Priority: What Is Phishing? because it has strong traffic but needs better lead capture rather than a full rewrite.
  • Medium Priority: Cybersecurity for Small Businesses because it is declining but may recover with clearer intent targeting.
  • Medium Priority: Cloud Security Compliance Checklist because it needs restructuring before it can perform.

Expected Outcomes

  • Higher rankings for pages currently in positions 7 to 16.
  • More qualified demo requests from commercial and checklist content.
  • Improved engagement from practical examples, templates, and internal links.
  • Reduced content decay through refreshes and consolidation.

When to reuse this workflow

You may also like...

🔒

Unlock the Full Workflow

Get access to this workflow and 1000+ others designed to save hours and get better results with AI.

No guesswork. Just proven systems.

  • Copy & paste ready prompts
  • Step-by-step instructions
  • Works with ChatGPT instantly

Buyer Persona Creation

Build detailed buyer personas that reflect real decision-makers and buying behaviour.

Ideal Customer Profile (ICP) Definition

Define a clear, actionable ICP to focus sales efforts on high-fit, high-value prospects.

Audience Growth Strategy

Create a social audience growth plan with content, distribution, collaborations, and measurement.

Unlock the full library.

Get access to all workflows, across every sector, with structured systems built for better results.

Get Free Access