📢 Marketing
Comprehensive SEO Topic Cluster & Content Planner
Build high-authority SEO topic clusters. Generates a pillar page concept and supportive sub-topics to dominate search engine results.
0Reviews
Prompt
Act as an elite Technical SEO Director. Create a comprehensive Topic Cluster strategy for the core subject: [Core Subject]. Provide the strategy with the following strict structure: Pillar Page Strategy: Define the title, target primary keyword, search intent, and structural URL for the definitive pillar page. Cluster Content (x8): Generate 8 supportive cluster blog post ideas. For each, provide the target long-tail keyword, proposed title, and a brief outline of the content. Internal Linking Plan: Explicitly map how the cluster articles should internally link back to the pillar page using optimized anchor text. E-E-A-T: Recommend 3 specific ways to integrate subject matter experts (SMEs) or proprietary data to build authority within this cluster. Tone: Professional, calm, and confident. Avoid marketing jargon where direct terminology suffices.
Instructions
Choose a broad core subject: Select an overarching topic that is broad enough to support at least 8-10 sub-topics. Analyze keyword difficulty: Cross-reference the proposed long-tail keywords with your SEO tool to ensure they are winnable. Follow internal linking: Adhere strictly to the suggested internal linking structure to maximize SEO impact. Incorporate SMEs: Actively execute the E-E-A-T recommendations to stand out from AI-generated baseline content.
Examples
Example Input
Act as an elite Technical SEO Director. Create a comprehensive Topic Cluster strategy for the core subject: [Remote Work Cybersecurity for Small Businesses]. Provide the strategy with the following strict structure: Pillar Page Strategy: Define the title, target primary keyword, search intent, and structural URL for the definitive pillar page. Cluster Content (x8): Generate 8 supportive cluster blog post ideas. For each, provide the target long-tail keyword, proposed title, and a brief outline of the content. Internal Linking Plan: Explicitly map how the cluster articles should internally link back to the pillar page using optimized anchor text. E-E-A-T: Recommend 3 specific ways to integrate subject matter experts (SMEs) or proprietary data to build authority within this cluster. Tone: Professional, calm, and confident. Avoid marketing jargon where direct terminology suffices.
Example Output
Here’s a full Topic Cluster Strategy for Remote Work Cybersecurity for Small Businesses, adhering to your requested structure, tone, and SEO best practices. Pillar Page Strategy Title: Remote Work Cybersecurity Guide for Small Businesses Target Primary Keyword: remote work cybersecurity for small businesses Search Intent: Informational/Definitive Guide – Small business owners or IT managers seeking comprehensive guidance to secure remote teams and sensitive data. Structural URL: /remote-work-cybersecurity-guide Pillar Page Structure (Example Sections): Introduction – Importance of cybersecurity in remote work for SMBs Common Remote Work Threats – Phishing, ransomware, unsecured Wi-Fi, insider threats Security Policies and Best Practices – VPN, MFA, password management, device policies Cloud Security Considerations – SaaS applications, cloud storage, and compliance Employee Training and Awareness – Regular cybersecurity training, simulated phishing tests Incident Response and Recovery – Steps to mitigate breaches and restore operations Tools & Resources – Recommended cybersecurity software and monitoring tools Conclusion & Action Plan – Checklist and next steps Cluster Content Ideas (x8) # Target Long-Tail Keyword Proposed Title Brief Outline 1 best VPN for small business remote work Top VPN Solutions for Secure Remote Work in Small Businesses Compare VPN solutions, setup guides, pros/cons, and pricing; emphasize SMB needs. 2 small business multi-factor authentication guide How to Implement Multi-Factor Authentication for Remote Teams Step-by-step MFA setup, types of authentication, and enforcement policies. 3 employee cybersecurity training remote work Remote Employee Cybersecurity Training: A Practical Guide Curriculum ideas, training frequency, gamified learning, and phishing simulations. 4 secure cloud storage for small business Securing Cloud Storage for Remote Small Business Teams Cloud storage risks, encryption, access control, and compliance best practices. 5 phishing prevention tips for remote workers Phishing Prevention Tips for Remote Workers in Small Businesses How to identify phishing emails, set up email filters, and run internal tests. 6 endpoint security tools for small business Choosing the Right Endpoint Security Tools for Remote Teams Discuss antivirus, EDR, mobile device management, and cost-effective SMB solutions. 7 secure remote access policies small business Creating Secure Remote Access Policies for Small Businesses Outline policy framework, access control, network segmentation, and compliance checks. 8 ransomware protection strategies for SMBs Ransomware Protection Strategies for Remote Small Businesses Preventive strategies, backup solutions, incident response, and case studies. Internal Linking Plan Each cluster article should link back to the pillar page with contextual, keyword-rich anchor text. Example: Cluster Article Anchor Text to Pillar Page Top VPN Solutions for Secure Remote Work “comprehensive guide to remote work cybersecurity” How to Implement Multi-Factor Authentication “remote work cybersecurity best practices” Remote Employee Cybersecurity Training “training strategies for secure remote teams” Securing Cloud Storage “small business remote work cybersecurity guide” Phishing Prevention Tips “protecting remote employees from cybersecurity threats” Choosing the Right Endpoint Security Tools “complete remote work cybersecurity framework” Creating Secure Remote Access Policies “remote work cybersecurity policies for SMBs” Ransomware Protection Strategies “remote work cybersecurity action plan” Tip: Where appropriate, cluster articles can also interlink between each other to reinforce topic authority and improve dwell time. E-E-A-T Recommendations Subject Matter Experts (SMEs): Include quotes, insights, or co-authorship from certified cybersecurity professionals (e.g., CISSP, CISM, or vendor security architects). Proprietary Data: Integrate survey results or statistics from small businesses about remote work security incidents, breaches, or compliance challenges. Authoritative References: Cite government cybersecurity resources (e.g., CISA, NIST Small Business Guidelines) and case studies from verified SMB cybersecurity incidents. This strategy builds a definitive resource hub, supports targeted long-tail traffic, and demonstrates trustworthiness and authority through expert insights and data-backed recommendations.