SlideShare ist ein Scribd-Unternehmen logo
1 von 16
10 Tips to secure your
Joomla website

By convergence IT Services
https://support.convergenceservices.in/
What are we going to see here?
Why your Joomla website got hacked?
 10 ways to prevent Joomla website
hacking
 Who are we?
 Contact us

Why your Joomla website got
Hacked?
 Joomla is an open-source CMS, it is

supported and maintained by millions of
Joomla users around the world.
 Though it is not easy to hack a Joomla
website, because of its robust security
features, but at times due to the
negligence on part of developers the
website becomes vulnerable to hacking.
10 ways to prevent Joomla website
hacking
Keeping hackers at a distance is not a
rocket science but at the same time it
should not be overlooked. Next 10 slides
shows some of the common yet least
understood reasons to why hackers
sometimes become successful to hack
Joomla websites.
1. Change the default database
prefix (jos_)
Hackers are different breed they do all
they can to hack websites and one of the
most common way is to write code that
will try to retrieve data from the
jos_users table. This helps them to
retrieve all the username and password
from the super administrator of the
website. To safeguard your website from
such attack it is highly recommended to
change the default prefix to random
prefix.
2. Keep your Joomla version
updated
Joomla CMS regularly releases its updated
version by removing the existing bugs, and
adding enhanced security features. Keeping your
website up-to-date with the latest version can
fix many of the vulnerability and keep your
website safe. Though it is quite a task to keep
on updating to the latest version when you have
plenty of extensions like components, plugins,
templates, modules and languages to upload but
all the effort is worth to ensure the security of
your website.
3. Change your .htaccess file
Joomla CMS by default has write
permissions to .htaccess file since joomla
has to constantly update it when you are
using SEF or Search Engine Friendly url.
Due to this your website becomes
vulnerable for attacks so it is advisable
for you to set your .htaccess permission
to somewhat 444(r-r-r-) or maybe
440(r-r--) or something similar.
4. Get away with old extensions
and Remove leftover files

Keep your extensions up-to-date, remove the
old and unsupported extensions and find a
suitable alternative to it. Many times it
happens that you have installed an extension
but due to some reason you don’t like it or it
does not serve your purpose, what you do?
Keep it unpublished, or let it be there
forever? This is very close you can come in
compromising your website. All you need to
do is use a simple and harmless uninstall
feature, get rid of those unwanted
extensions and heave a sigh of relief.
5. Remove version number and
name of extensions
You are a developer and you must know
the ABC of Joomla security yet how many
times you have slapped your hand to your
head in dismay to know that you forgot to
remove the version number and name of
extension giving easy entry to hackers.
It’s better late than never. If you have
not done this do it right away.
6. Do not give write permission
on your *.php files
This is another reason why hackers
exploit your website. Giving write
permission on your Joomla *.php files
can be a very reason why Mr.Hacker visit
your website and hack it effortlessly.
You should always take an effort to set
the permission of all you *.php to 444.
7. Do not give execute
permission on public directories
We become so much engrossed with our creation
that we forget something very basic and
important to keep hackers at bay. One of these
is giving execute permission on Public
directories. These directories let users to
upload their files and if the directories allow
scripts to run and if that script turns out to a
malicious then it becomes easier for hacker to
get the website infected. Just give a permission
of 766 on all public directories and reduce the
chances of hacking your website.
8. Do not give all possible
permission to the database users
After setting up the Joomla website it is
important that a database user should
not be given all the possible permissions
like
INSERT
rows,
UPDATE
rows, DELETE rows, CREATE tables etc.
Joomla database user should be given
only necessary permission to keep the
risk of hacking through vulnerable exploit
to minimum.
9. Hacking through your
vulnerable web-server
Most of the time developers go by rule book of
Joomla website hacking, which does not mention
that sometime going for cheap and unreliable
web-hosting can be the reason. Just to save few
dollars users sometimes opt for cheap webhosting service provider and compromise on
their website security. When all is said and
done, this is very easy to solve all you need to do
is change your web-hosting services provider
and cheer up.
10. Thinking you are
invincible

Whether you are a small business or a
large multi-billion dollar conglomerate you
are never safe unless and until you make
these measures as your routine exercise.
Hackers are lurking everywhere finding
vulnerability to the websites to hack it.
Your crucial data, financial details and
private information will be in peril if we
don’t give heed to the wisdom of Joomla
website security. As the age old proverb
goes, “Prevention is always better than
cure” still hold true today.
Who are we?
We are Convergence IT Services, software and
web development company our exclusive website
maintenance services Convergence support
Desk offers you various Joomla and other
website maintenance service plans. Loaded with
tons of features and backed with expert team
members this service allows your business to
scale and flourish.
Contact us
Call: 022-2513 6632
Mail: contact@convergenceservices.in
website: support.convergenceservices.in

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (10)

June 2015 costco coupon book
June 2015 costco coupon bookJune 2015 costco coupon book
June 2015 costco coupon book
 
PresentacióN1
PresentacióN1PresentacióN1
PresentacióN1
 
Arba Minim Buying Guide
Arba Minim Buying GuideArba Minim Buying Guide
Arba Minim Buying Guide
 
Sample Cover Letter
Sample Cover LetterSample Cover Letter
Sample Cover Letter
 
Cilj Igre
Cilj IgreCilj Igre
Cilj Igre
 
OR
OROR
OR
 
A Guide To Professional Typography
A Guide To Professional TypographyA Guide To Professional Typography
A Guide To Professional Typography
 
The Perfect Man
The Perfect ManThe Perfect Man
The Perfect Man
 
Gunz211 Tq
Gunz211 TqGunz211 Tq
Gunz211 Tq
 
8 Amazing Diamond Heists
8 Amazing Diamond Heists8 Amazing Diamond Heists
8 Amazing Diamond Heists
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

10 Tips to secure your Joomla website from hackers

  • 1. 10 Tips to secure your Joomla website By convergence IT Services https://support.convergenceservices.in/
  • 2. What are we going to see here? Why your Joomla website got hacked?  10 ways to prevent Joomla website hacking  Who are we?  Contact us 
  • 3. Why your Joomla website got Hacked?  Joomla is an open-source CMS, it is supported and maintained by millions of Joomla users around the world.  Though it is not easy to hack a Joomla website, because of its robust security features, but at times due to the negligence on part of developers the website becomes vulnerable to hacking.
  • 4. 10 ways to prevent Joomla website hacking Keeping hackers at a distance is not a rocket science but at the same time it should not be overlooked. Next 10 slides shows some of the common yet least understood reasons to why hackers sometimes become successful to hack Joomla websites.
  • 5. 1. Change the default database prefix (jos_) Hackers are different breed they do all they can to hack websites and one of the most common way is to write code that will try to retrieve data from the jos_users table. This helps them to retrieve all the username and password from the super administrator of the website. To safeguard your website from such attack it is highly recommended to change the default prefix to random prefix.
  • 6. 2. Keep your Joomla version updated Joomla CMS regularly releases its updated version by removing the existing bugs, and adding enhanced security features. Keeping your website up-to-date with the latest version can fix many of the vulnerability and keep your website safe. Though it is quite a task to keep on updating to the latest version when you have plenty of extensions like components, plugins, templates, modules and languages to upload but all the effort is worth to ensure the security of your website.
  • 7. 3. Change your .htaccess file Joomla CMS by default has write permissions to .htaccess file since joomla has to constantly update it when you are using SEF or Search Engine Friendly url. Due to this your website becomes vulnerable for attacks so it is advisable for you to set your .htaccess permission to somewhat 444(r-r-r-) or maybe 440(r-r--) or something similar.
  • 8. 4. Get away with old extensions and Remove leftover files Keep your extensions up-to-date, remove the old and unsupported extensions and find a suitable alternative to it. Many times it happens that you have installed an extension but due to some reason you don’t like it or it does not serve your purpose, what you do? Keep it unpublished, or let it be there forever? This is very close you can come in compromising your website. All you need to do is use a simple and harmless uninstall feature, get rid of those unwanted extensions and heave a sigh of relief.
  • 9. 5. Remove version number and name of extensions You are a developer and you must know the ABC of Joomla security yet how many times you have slapped your hand to your head in dismay to know that you forgot to remove the version number and name of extension giving easy entry to hackers. It’s better late than never. If you have not done this do it right away.
  • 10. 6. Do not give write permission on your *.php files This is another reason why hackers exploit your website. Giving write permission on your Joomla *.php files can be a very reason why Mr.Hacker visit your website and hack it effortlessly. You should always take an effort to set the permission of all you *.php to 444.
  • 11. 7. Do not give execute permission on public directories We become so much engrossed with our creation that we forget something very basic and important to keep hackers at bay. One of these is giving execute permission on Public directories. These directories let users to upload their files and if the directories allow scripts to run and if that script turns out to a malicious then it becomes easier for hacker to get the website infected. Just give a permission of 766 on all public directories and reduce the chances of hacking your website.
  • 12. 8. Do not give all possible permission to the database users After setting up the Joomla website it is important that a database user should not be given all the possible permissions like INSERT rows, UPDATE rows, DELETE rows, CREATE tables etc. Joomla database user should be given only necessary permission to keep the risk of hacking through vulnerable exploit to minimum.
  • 13. 9. Hacking through your vulnerable web-server Most of the time developers go by rule book of Joomla website hacking, which does not mention that sometime going for cheap and unreliable web-hosting can be the reason. Just to save few dollars users sometimes opt for cheap webhosting service provider and compromise on their website security. When all is said and done, this is very easy to solve all you need to do is change your web-hosting services provider and cheer up.
  • 14. 10. Thinking you are invincible Whether you are a small business or a large multi-billion dollar conglomerate you are never safe unless and until you make these measures as your routine exercise. Hackers are lurking everywhere finding vulnerability to the websites to hack it. Your crucial data, financial details and private information will be in peril if we don’t give heed to the wisdom of Joomla website security. As the age old proverb goes, “Prevention is always better than cure” still hold true today.
  • 15. Who are we? We are Convergence IT Services, software and web development company our exclusive website maintenance services Convergence support Desk offers you various Joomla and other website maintenance service plans. Loaded with tons of features and backed with expert team members this service allows your business to scale and flourish.
  • 16. Contact us Call: 022-2513 6632 Mail: contact@convergenceservices.in website: support.convergenceservices.in