SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
WordPress Security Understand and prevent security issues on your WP install.
WordPress Security Meetup Topics Why do hackers do what they do? What are the effects of a hack?  How can a hack affect you?  Hacks are confusing events. Securing WordPress: Prevent your install from being hacked.
Why Do Hackers Do What They Do? Money from affiliate links they inject into site Push link juice to their own sites Challenge / conquest Because they can…. To send spam email from server
What Are the Effects of a Hack? Insertion of links into pages and posts.  Links are often hidden so you do not see them or cloaked so that only search engine spiders / googlebots see them. Redirection of posts and pages  Example: Latest Media Temple Update: http://weblog.mediatemple.net/weblog/2010/07/16/1404-wordpress-redirect-exploit-2/
How Can a Hack Affect You?  Loss of rankings, ban by search engines Destruction of your online presence > Loss of credibility Loss of revenue from online sales Financial and time cost of fixing hack
Hacks Are Confusing Events Since there are many factors involved in how a hacker or exploit can gain entry, there is often confusion / misinformation about how hacks occur.  It is not uncommon for hosts to blame WordPress when in fact the host is to blame for a security issue Pharma hack: Only search bots are served hacked pages, so hacked pages are cloaked, so you will not see your pages showing any signs of issues. Only after you notice a loss of rankings will the issue be brought to the surface, weeks or months after the initial hack.
Securing WordPress: Prevention 1) Keep install, plugins, themes and scripts up to date New 3.0 Update Feature makes updating easier than ever 2) Use caution when choosing plugins to use: Mo plugins, mo problems! Poorly written plugins can pose security risks Old Plugins may not be updated regularly, check to make sure that plugin is updated on a regular basis
Securing WordPress: Prevention 3) Maintain regular backups of root folder  Via FTP: Free FTP client http://filezilla-project.org/ Create cron jobs to automate backing up folders:  You can choose backup schedule, what to backup and where to bakcup http://wpmu.org/new-years-resolution-automate-wordpress-wpmu-backups-check/
Securing WordPress: Prevention 4) Maintain regular backups of database WP-DBManager: http://wordpress.org/extend/plugins/wp-dbmanager/ Enables you to automate backups and optimizations and restore directly from dashboard, bypassing PHPMyAdmin 5) Use correct file permissions Use FTP client or cpanel file manager WordPress defaults to 644 for files and 755 permissions for folders
Securing WordPress: Prevention 6) Choose the right host Godaddy and other large hosts are bigger targets for hackers and don’t have the best record of being pro-active when they have been compromised 7) Use strong passwords and change regularly 8) Remove unused plugins and themes 9) Use file monitor to be notified of file changes: http://wordpress.org/extend/plugins/wordpress-file-monitor/
Typical Hack Repair Steps: (PharmaHack example)  Locate and remove hacked 404.php file Locate and remove hacked content from database Replace entire set of salt keys Upload new WordPress files Restore previous versions of other files Restore database to previous version
Source Articles / Add. Resources WordPress Security Resources My site was hacked: WordPress Codex WordPress Security Lockdown Learn about backdoors Monitor files changes  How to Fix Hacked Install / Remove Malware Removing Malware From a WordPress Blog Doncha's guide to dealing with a hacked website How To Clean a Hacked Install

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfROWELL MARQUINA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Kürzlich hochgeladen (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
QMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdfQMMS Lesson 2 - Using MS Excel Formula.pdf
QMMS Lesson 2 - Using MS Excel Formula.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

WordPress Security Presentation

  • 1. WordPress Security Understand and prevent security issues on your WP install.
  • 2. WordPress Security Meetup Topics Why do hackers do what they do? What are the effects of a hack? How can a hack affect you? Hacks are confusing events. Securing WordPress: Prevent your install from being hacked.
  • 3. Why Do Hackers Do What They Do? Money from affiliate links they inject into site Push link juice to their own sites Challenge / conquest Because they can…. To send spam email from server
  • 4. What Are the Effects of a Hack? Insertion of links into pages and posts. Links are often hidden so you do not see them or cloaked so that only search engine spiders / googlebots see them. Redirection of posts and pages Example: Latest Media Temple Update: http://weblog.mediatemple.net/weblog/2010/07/16/1404-wordpress-redirect-exploit-2/
  • 5. How Can a Hack Affect You? Loss of rankings, ban by search engines Destruction of your online presence > Loss of credibility Loss of revenue from online sales Financial and time cost of fixing hack
  • 6. Hacks Are Confusing Events Since there are many factors involved in how a hacker or exploit can gain entry, there is often confusion / misinformation about how hacks occur. It is not uncommon for hosts to blame WordPress when in fact the host is to blame for a security issue Pharma hack: Only search bots are served hacked pages, so hacked pages are cloaked, so you will not see your pages showing any signs of issues. Only after you notice a loss of rankings will the issue be brought to the surface, weeks or months after the initial hack.
  • 7. Securing WordPress: Prevention 1) Keep install, plugins, themes and scripts up to date New 3.0 Update Feature makes updating easier than ever 2) Use caution when choosing plugins to use: Mo plugins, mo problems! Poorly written plugins can pose security risks Old Plugins may not be updated regularly, check to make sure that plugin is updated on a regular basis
  • 8. Securing WordPress: Prevention 3) Maintain regular backups of root folder Via FTP: Free FTP client http://filezilla-project.org/ Create cron jobs to automate backing up folders: You can choose backup schedule, what to backup and where to bakcup http://wpmu.org/new-years-resolution-automate-wordpress-wpmu-backups-check/
  • 9. Securing WordPress: Prevention 4) Maintain regular backups of database WP-DBManager: http://wordpress.org/extend/plugins/wp-dbmanager/ Enables you to automate backups and optimizations and restore directly from dashboard, bypassing PHPMyAdmin 5) Use correct file permissions Use FTP client or cpanel file manager WordPress defaults to 644 for files and 755 permissions for folders
  • 10. Securing WordPress: Prevention 6) Choose the right host Godaddy and other large hosts are bigger targets for hackers and don’t have the best record of being pro-active when they have been compromised 7) Use strong passwords and change regularly 8) Remove unused plugins and themes 9) Use file monitor to be notified of file changes: http://wordpress.org/extend/plugins/wordpress-file-monitor/
  • 11. Typical Hack Repair Steps: (PharmaHack example) Locate and remove hacked 404.php file Locate and remove hacked content from database Replace entire set of salt keys Upload new WordPress files Restore previous versions of other files Restore database to previous version
  • 12. Source Articles / Add. Resources WordPress Security Resources My site was hacked: WordPress Codex WordPress Security Lockdown Learn about backdoors Monitor files changes  How to Fix Hacked Install / Remove Malware Removing Malware From a WordPress Blog Doncha's guide to dealing with a hacked website How To Clean a Hacked Install