SlideShare ist ein Scribd-Unternehmen logo
1 von 55
@ S I T E L O C K@ S I T E L O C K
WordPress Security
for Beginners
Simple Steps to Build Your Master Plan
Wo r d C a m p L o u i s v i l l e 2 0 1 6
@ S I T E L O C K
Did You Know?
• There are 3.26 billion internet users as of December
2015; that’s over 40% of the world population.
• Only 44% of web traffic is from humans; 56% of web
traffic is from bots, impersonators, hacking tools,
scrapers and spammers.
@ S I T E L O C K
What We’ll Cover Today
• Why and How Websites Get Hacked
• What We All Should Be Doing
• Going Above and Beyond
• After the Hack
@ S I T E L O C K
Adam W. Warner
• WordPress Evangelist at SiteLock
• Co-Founder at FooPlugins
• Discovered WordPress in 2005
• WordPress Community Addict
• Fan of Fractals
• Lover of Meatballs
• Proud Dad!
@ S I T E L O C K
Hacking Techniques
• Vulnerability scanning
• Server disruption
• Monetary loss
• Information leaks
• Vandalism (defacement)
@ S I T E L O C K
Why Websites Get Hacked
• Drive-by-downloads
• Redirections
• System resources
• Because they don’t like you
@ S I T E L O C K
Why MY Site!?
@ S I T E L O C K
Opportunity
• It’s not you, it’s them
• Because it’s possible
• Because we give them an opening
@ S I T E L O C K
Automation
• Most hacking attempts are automated
@ S I T E L O C K
How Websites Get Hacked
• 41% get hacked through vulnerabilities in their hosting
platform
• 29% by means of an insecure theme
• 22% via a vulnerable plugin
• 8% because of weak passwords
@ S I T E L O C K
Two Categories of Security
@ S I T E L O C K
Access Controls
@ S I T E L O C K
Software Vulnerabilities
• Anywhere there is a system, there’s a potential
software vulnerability waiting to be exploited
@ S I T E L O C K
What Do Hacks Look Like?
@ S I T E L O C K
Where Do You Start?
• With yourself of course
@ S I T E L O C K
Simple Steps for Everyone
@ S I T E L O C K
Strong Passwords: Everywhere
@ S I T E L O C K
Reusing Passwords
@ S I T E L O C K
Even More About Passwords
@ S I T E L O C K
Password Managers
• LastPass
• Dashlane
• Roboform
• TrueKey
@ S I T E L O C K
Your Computer
@ S I T E L O C K
Public Networks
Use a VPN.
Please!
@ S I T E L O C K
Don’t Change Core
@ S I T E L O C K
Backup. Backup. Backup.
@ S I T E L O C K
Update. Update. Update.
@ S I T E L O C K
Remove Inactive Software
@ S I T E L O C K
Install Software Only from Official
Sources
@ S I T E L O C K
Choose a Secure Host
https://wordpress.org /hosting/
@ S I T E L O C K
Latest Version of PHP
@ S I T E L O C K
Admin Usernames and Nicenames
@ S I T E L O C K
Security Plugins and Services
@ S I T E L O C K
SSL
@ S I T E L O C K
Kick It Up a Notch
@ S I T E L O C K
Limit Login Attempts
• Limit Login Attempts
• Login Lockdown
@ S I T E L O C K
2FA (Two-Factor Authentication)
@ S I T E L O C K
Clef
@ S I T E L O C K
File Permissions
@ S I T E L O C K
Default Table Prefix
@ S I T E L O C K
.htaccess and wp-config.php
@ S I T E L O C K
Authentication Keys and Salts
@ S I T E L O C K
Disable PHP Execution
@ S I T E L O C K
Disable File Editing
@ S I T E L O C K
Secure wp-config.php
@ S I T E L O C K
Disable XML-RPC?
@ S I T E L O C K
Learn More
https://codex.wordpress.org /Hardening_WordPress
@ S I T E L O C K
Install a Firewall
@ S I T E L O C K
(CDN) Content Delivery Network
@ S I T E L O C K
How to Detect a Hacked Site
• Visit your site often
• Search for your site
• Unexplained spikes in traffic
• Investigate customer/visitor reports
• continued…
@ S I T E L O C K
Detect a Hacked Site (con’t…)
• Google Search Console (email alerts)
• Remote scanner
• Malware scanner
• Source code scanner
• Service that detects site changes
@ S I T E L O C K
What To Do If You’re Hacked
@ S I T E L O C K
Clean It Yourself
@ S I T E L O C K
Use a Service
• Security is their core business
• Cleans files, databases, backdoors, etc.
• Remove malware warnings
• Remove from blacklists
• Helps services learn for the benefit of all
@ S I T E L O C K
What To Do After Cleanup
• Change ALL passwords
• Change WP secret keys and salts
• Read this again: h tt p s : / / c o d e x .w o r d p r e s s . o r g / H a r d e n i n g _ Wo r d P r e s s
@ S I T E L O C K
Now What?
@ S I T E L O C K
Thank You – Questions?
• Follow at:
• @SiteLock
• @wpmodder
• SlideShare
• http://www.slideshare.net/wpprobusiness
• My Blog Posts:
• http://wpdistrict.sitelock.com
• http://adamwwarner.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Introduction To WordPress
Introduction To WordPressIntroduction To WordPress
Introduction To WordPress
 
WordPress Webinar Training Presentation
WordPress Webinar Training PresentationWordPress Webinar Training Presentation
WordPress Webinar Training Presentation
 
Formation wordpress
Formation wordpressFormation wordpress
Formation wordpress
 
WordPress Course Outline
WordPress Course OutlineWordPress Course Outline
WordPress Course Outline
 
Screaming Frog PPT
Screaming Frog PPTScreaming Frog PPT
Screaming Frog PPT
 
Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPress
 
Web development
Web developmentWeb development
Web development
 
Introduction to Wordpress
Introduction to WordpressIntroduction to Wordpress
Introduction to Wordpress
 
WordPress Complete Tutorial
WordPress Complete TutorialWordPress Complete Tutorial
WordPress Complete Tutorial
 
Inroduction to Google Search Console
Inroduction to Google Search ConsoleInroduction to Google Search Console
Inroduction to Google Search Console
 
WordPress Website Creation Training Course Slides
WordPress Website Creation Training Course SlidesWordPress Website Creation Training Course Slides
WordPress Website Creation Training Course Slides
 
Wordpress ppt
Wordpress pptWordpress ppt
Wordpress ppt
 
WordPress Course Outline
WordPress Course OutlineWordPress Course Outline
WordPress Course Outline
 
Webinar marketplace 9 mars 2022
Webinar marketplace 9 mars 2022Webinar marketplace 9 mars 2022
Webinar marketplace 9 mars 2022
 
On page SEO Optimization & it's Techniques
On page SEO Optimization & it's TechniquesOn page SEO Optimization & it's Techniques
On page SEO Optimization & it's Techniques
 
Technical SEO Audit
Technical SEO AuditTechnical SEO Audit
Technical SEO Audit
 
What is a Robot txt file?
What is a Robot txt file?What is a Robot txt file?
What is a Robot txt file?
 
Web Design (Tools)
Web Design (Tools)Web Design (Tools)
Web Design (Tools)
 
Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPress
 
Website Using WordPress
Website Using WordPressWebsite Using WordPress
Website Using WordPress
 

Andere mochten auch

Scaling WooCommerce
Scaling WooCommerceScaling WooCommerce
Scaling WooCommerceChris Lema
 
Centralizing News through WordPress REST API
Centralizing News through WordPress REST APICentralizing News through WordPress REST API
Centralizing News through WordPress REST APITodd McKee
 
You Created a Plugin. Now What?
You Created a Plugin. Now What?You Created a Plugin. Now What?
You Created a Plugin. Now What?Adam W. Warner
 
Business Models - WCMIA
Business Models - WCMIABusiness Models - WCMIA
Business Models - WCMIAChris Lema
 
Coffee is for closers
Coffee is for closersCoffee is for closers
Coffee is for closersChris Lema
 
Succeeding in the WordPress Ecosystem
Succeeding in the WordPress EcosystemSucceeding in the WordPress Ecosystem
Succeeding in the WordPress EcosystemChris Lema
 
Content Strategy - Be Yoda, Not Luke
Content Strategy - Be Yoda, Not LukeContent Strategy - Be Yoda, Not Luke
Content Strategy - Be Yoda, Not LukeChris Lema
 
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPress
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPressContact Forms are Boring - 5 Creative Ways to Use Forms in WordPress
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPressAdam W. Warner
 
#WCDFW Presentation Choosing Themes &
#WCDFW Presentation Choosing Themes & #WCDFW Presentation Choosing Themes &
#WCDFW Presentation Choosing Themes & Susan Ramsey
 
Build a Content Marketing Machine Workshop | Session 1
Build a Content Marketing Machine Workshop | Session 1Build a Content Marketing Machine Workshop | Session 1
Build a Content Marketing Machine Workshop | Session 1Tom McCracken
 
Becoming a better blogger
Becoming a better bloggerBecoming a better blogger
Becoming a better bloggerChris Lema
 
Product Marketing Mistakes
Product Marketing MistakesProduct Marketing Mistakes
Product Marketing MistakesChris Lema
 
Thirty WordPress Membership Plugins
Thirty WordPress Membership PluginsThirty WordPress Membership Plugins
Thirty WordPress Membership PluginsChris Lema
 
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...Jeff VanDrimmelen
 
You Created a Plugin. Now What? WordCamp Orange County
You Created a Plugin. Now What? WordCamp Orange CountyYou Created a Plugin. Now What? WordCamp Orange County
You Created a Plugin. Now What? WordCamp Orange CountyAdam W. Warner
 
You Created a Plugin. Now What? WordCamp Sacramento
You Created a Plugin. Now What? WordCamp SacramentoYou Created a Plugin. Now What? WordCamp Sacramento
You Created a Plugin. Now What? WordCamp SacramentoAdam W. Warner
 
SandCamp 2017 Keynote - Website Trends
SandCamp 2017 Keynote - Website TrendsSandCamp 2017 Keynote - Website Trends
SandCamp 2017 Keynote - Website TrendsTom McCracken
 
Our Client's Clients
Our Client's ClientsOur Client's Clients
Our Client's ClientsChris Lema
 
What got you here won't get you there
What got you here won't get you thereWhat got you here won't get you there
What got you here won't get you thereChris Lema
 
Marketing your website the right way
Marketing your website the right wayMarketing your website the right way
Marketing your website the right wayTom McCracken
 

Andere mochten auch (20)

Scaling WooCommerce
Scaling WooCommerceScaling WooCommerce
Scaling WooCommerce
 
Centralizing News through WordPress REST API
Centralizing News through WordPress REST APICentralizing News through WordPress REST API
Centralizing News through WordPress REST API
 
You Created a Plugin. Now What?
You Created a Plugin. Now What?You Created a Plugin. Now What?
You Created a Plugin. Now What?
 
Business Models - WCMIA
Business Models - WCMIABusiness Models - WCMIA
Business Models - WCMIA
 
Coffee is for closers
Coffee is for closersCoffee is for closers
Coffee is for closers
 
Succeeding in the WordPress Ecosystem
Succeeding in the WordPress EcosystemSucceeding in the WordPress Ecosystem
Succeeding in the WordPress Ecosystem
 
Content Strategy - Be Yoda, Not Luke
Content Strategy - Be Yoda, Not LukeContent Strategy - Be Yoda, Not Luke
Content Strategy - Be Yoda, Not Luke
 
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPress
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPressContact Forms are Boring - 5 Creative Ways to Use Forms in WordPress
Contact Forms are Boring - 5 Creative Ways to Use Forms in WordPress
 
#WCDFW Presentation Choosing Themes &
#WCDFW Presentation Choosing Themes & #WCDFW Presentation Choosing Themes &
#WCDFW Presentation Choosing Themes &
 
Build a Content Marketing Machine Workshop | Session 1
Build a Content Marketing Machine Workshop | Session 1Build a Content Marketing Machine Workshop | Session 1
Build a Content Marketing Machine Workshop | Session 1
 
Becoming a better blogger
Becoming a better bloggerBecoming a better blogger
Becoming a better blogger
 
Product Marketing Mistakes
Product Marketing MistakesProduct Marketing Mistakes
Product Marketing Mistakes
 
Thirty WordPress Membership Plugins
Thirty WordPress Membership PluginsThirty WordPress Membership Plugins
Thirty WordPress Membership Plugins
 
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...
The Power of Facebook Ads - Target Specific Demographics | Facebook Marketing...
 
You Created a Plugin. Now What? WordCamp Orange County
You Created a Plugin. Now What? WordCamp Orange CountyYou Created a Plugin. Now What? WordCamp Orange County
You Created a Plugin. Now What? WordCamp Orange County
 
You Created a Plugin. Now What? WordCamp Sacramento
You Created a Plugin. Now What? WordCamp SacramentoYou Created a Plugin. Now What? WordCamp Sacramento
You Created a Plugin. Now What? WordCamp Sacramento
 
SandCamp 2017 Keynote - Website Trends
SandCamp 2017 Keynote - Website TrendsSandCamp 2017 Keynote - Website Trends
SandCamp 2017 Keynote - Website Trends
 
Our Client's Clients
Our Client's ClientsOur Client's Clients
Our Client's Clients
 
What got you here won't get you there
What got you here won't get you thereWhat got you here won't get you there
What got you here won't get you there
 
Marketing your website the right way
Marketing your website the right wayMarketing your website the right way
Marketing your website the right way
 

Ähnlich wie WordPress Security for Beginners

The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security MindsetAdam W. Warner
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOsama Mustafa
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to BlackBeau Bullock
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Michael Pirnat
 
How a Hacker Sees Your Site
How a Hacker Sees Your SiteHow a Hacker Sees Your Site
How a Hacker Sees Your SitePatrick Laverty
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 
Wrangle Your Defense Using Offensive Tactics BSides CT 2019
Wrangle Your Defense Using Offensive Tactics BSides CT 2019Wrangle Your Defense Using Offensive Tactics BSides CT 2019
Wrangle Your Defense Using Offensive Tactics BSides CT 2019Matt Dunn
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profitDavid Stockton
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSideOWASP EEE
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOUMichael Gough
 
Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Steve Poole
 

Ähnlich wie WordPress Security for Beginners (20)

The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
 
Oracle database threats - LAOUC Webinar
Oracle database threats - LAOUC WebinarOracle database threats - LAOUC Webinar
Oracle database threats - LAOUC Webinar
 
Fade from Whitehat... to Black
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to Black
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Web defacement
Web defacementWeb defacement
Web defacement
 
NPTs
NPTsNPTs
NPTs
 
black hat deephish
black hat deephishblack hat deephish
black hat deephish
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
 
How a Hacker Sees Your Site
How a Hacker Sees Your SiteHow a Hacker Sees Your Site
How a Hacker Sees Your Site
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
Wrangle Your Defense Using Offensive Tactics BSides CT 2019
Wrangle Your Defense Using Offensive Tactics BSides CT 2019Wrangle Your Defense Using Offensive Tactics BSides CT 2019
Wrangle Your Defense Using Offensive Tactics BSides CT 2019
 
Hacking sites for fun and profit
Hacking sites for fun and profitHacking sites for fun and profit
Hacking sites for fun and profit
 
[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide[Bucharest] #DontTrustTheDarkSide
[Bucharest] #DontTrustTheDarkSide
 
Commodity malware means YOU
Commodity malware means YOUCommodity malware means YOU
Commodity malware means YOU
 
Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018
 

Mehr von Adam W. Warner

Website Security AMA: Best Practices
Website Security AMA: Best Practices Website Security AMA: Best Practices
Website Security AMA: Best Practices Adam W. Warner
 
The Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemThe Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemAdam W. Warner
 
Using Curated Content in WordPress - Why and How
Using Curated Content in WordPress - Why and HowUsing Curated Content in WordPress - Why and How
Using Curated Content in WordPress - Why and HowAdam W. Warner
 
The Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemThe Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemAdam W. Warner
 
5 Ways to Contribute to WordPress (If You're Not a Developer)
5 Ways to Contribute to WordPress (If You're Not a Developer)5 Ways to Contribute to WordPress (If You're Not a Developer)
5 Ways to Contribute to WordPress (If You're Not a Developer)Adam W. Warner
 
Introduction to WordPress - Adam W. Warner
Introduction to WordPress - Adam W. WarnerIntroduction to WordPress - Adam W. Warner
Introduction to WordPress - Adam W. WarnerAdam W. Warner
 

Mehr von Adam W. Warner (6)

Website Security AMA: Best Practices
Website Security AMA: Best Practices Website Security AMA: Best Practices
Website Security AMA: Best Practices
 
The Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemThe Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid Them
 
Using Curated Content in WordPress - Why and How
Using Curated Content in WordPress - Why and HowUsing Curated Content in WordPress - Why and How
Using Curated Content in WordPress - Why and How
 
The Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid ThemThe Pitfalls of Working from Home and How to Avoid Them
The Pitfalls of Working from Home and How to Avoid Them
 
5 Ways to Contribute to WordPress (If You're Not a Developer)
5 Ways to Contribute to WordPress (If You're Not a Developer)5 Ways to Contribute to WordPress (If You're Not a Developer)
5 Ways to Contribute to WordPress (If You're Not a Developer)
 
Introduction to WordPress - Adam W. Warner
Introduction to WordPress - Adam W. WarnerIntroduction to WordPress - Adam W. Warner
Introduction to WordPress - Adam W. Warner
 

Kürzlich hochgeladen

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Kürzlich hochgeladen (20)

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

WordPress Security for Beginners

  • 1. @ S I T E L O C K@ S I T E L O C K WordPress Security for Beginners Simple Steps to Build Your Master Plan Wo r d C a m p L o u i s v i l l e 2 0 1 6
  • 2. @ S I T E L O C K Did You Know? • There are 3.26 billion internet users as of December 2015; that’s over 40% of the world population. • Only 44% of web traffic is from humans; 56% of web traffic is from bots, impersonators, hacking tools, scrapers and spammers.
  • 3. @ S I T E L O C K What We’ll Cover Today • Why and How Websites Get Hacked • What We All Should Be Doing • Going Above and Beyond • After the Hack
  • 4. @ S I T E L O C K Adam W. Warner • WordPress Evangelist at SiteLock • Co-Founder at FooPlugins • Discovered WordPress in 2005 • WordPress Community Addict • Fan of Fractals • Lover of Meatballs • Proud Dad!
  • 5. @ S I T E L O C K Hacking Techniques • Vulnerability scanning • Server disruption • Monetary loss • Information leaks • Vandalism (defacement)
  • 6. @ S I T E L O C K Why Websites Get Hacked • Drive-by-downloads • Redirections • System resources • Because they don’t like you
  • 7. @ S I T E L O C K Why MY Site!?
  • 8. @ S I T E L O C K Opportunity • It’s not you, it’s them • Because it’s possible • Because we give them an opening
  • 9. @ S I T E L O C K Automation • Most hacking attempts are automated
  • 10. @ S I T E L O C K How Websites Get Hacked • 41% get hacked through vulnerabilities in their hosting platform • 29% by means of an insecure theme • 22% via a vulnerable plugin • 8% because of weak passwords
  • 11. @ S I T E L O C K Two Categories of Security
  • 12. @ S I T E L O C K Access Controls
  • 13. @ S I T E L O C K Software Vulnerabilities • Anywhere there is a system, there’s a potential software vulnerability waiting to be exploited
  • 14. @ S I T E L O C K What Do Hacks Look Like?
  • 15. @ S I T E L O C K Where Do You Start? • With yourself of course
  • 16. @ S I T E L O C K Simple Steps for Everyone
  • 17. @ S I T E L O C K Strong Passwords: Everywhere
  • 18. @ S I T E L O C K Reusing Passwords
  • 19. @ S I T E L O C K Even More About Passwords
  • 20. @ S I T E L O C K Password Managers • LastPass • Dashlane • Roboform • TrueKey
  • 21. @ S I T E L O C K Your Computer
  • 22. @ S I T E L O C K Public Networks Use a VPN. Please!
  • 23. @ S I T E L O C K Don’t Change Core
  • 24. @ S I T E L O C K Backup. Backup. Backup.
  • 25. @ S I T E L O C K Update. Update. Update.
  • 26. @ S I T E L O C K Remove Inactive Software
  • 27. @ S I T E L O C K Install Software Only from Official Sources
  • 28. @ S I T E L O C K Choose a Secure Host https://wordpress.org /hosting/
  • 29. @ S I T E L O C K Latest Version of PHP
  • 30. @ S I T E L O C K Admin Usernames and Nicenames
  • 31. @ S I T E L O C K Security Plugins and Services
  • 32. @ S I T E L O C K SSL
  • 33. @ S I T E L O C K Kick It Up a Notch
  • 34. @ S I T E L O C K Limit Login Attempts • Limit Login Attempts • Login Lockdown
  • 35. @ S I T E L O C K 2FA (Two-Factor Authentication)
  • 36. @ S I T E L O C K Clef
  • 37. @ S I T E L O C K File Permissions
  • 38. @ S I T E L O C K Default Table Prefix
  • 39. @ S I T E L O C K .htaccess and wp-config.php
  • 40. @ S I T E L O C K Authentication Keys and Salts
  • 41. @ S I T E L O C K Disable PHP Execution
  • 42. @ S I T E L O C K Disable File Editing
  • 43. @ S I T E L O C K Secure wp-config.php
  • 44. @ S I T E L O C K Disable XML-RPC?
  • 45. @ S I T E L O C K Learn More https://codex.wordpress.org /Hardening_WordPress
  • 46. @ S I T E L O C K Install a Firewall
  • 47. @ S I T E L O C K (CDN) Content Delivery Network
  • 48. @ S I T E L O C K How to Detect a Hacked Site • Visit your site often • Search for your site • Unexplained spikes in traffic • Investigate customer/visitor reports • continued…
  • 49. @ S I T E L O C K Detect a Hacked Site (con’t…) • Google Search Console (email alerts) • Remote scanner • Malware scanner • Source code scanner • Service that detects site changes
  • 50. @ S I T E L O C K What To Do If You’re Hacked
  • 51. @ S I T E L O C K Clean It Yourself
  • 52. @ S I T E L O C K Use a Service • Security is their core business • Cleans files, databases, backdoors, etc. • Remove malware warnings • Remove from blacklists • Helps services learn for the benefit of all
  • 53. @ S I T E L O C K What To Do After Cleanup • Change ALL passwords • Change WP secret keys and salts • Read this again: h tt p s : / / c o d e x .w o r d p r e s s . o r g / H a r d e n i n g _ Wo r d P r e s s
  • 54. @ S I T E L O C K Now What?
  • 55. @ S I T E L O C K Thank You – Questions? • Follow at: • @SiteLock • @wpmodder • SlideShare • http://www.slideshare.net/wpprobusiness • My Blog Posts: • http://wpdistrict.sitelock.com • http://adamwwarner.com

Hinweis der Redaktion

  1. Security can seem intimidating and complex for many of us, but we shouldn’t (can’t) let that stop us from making sure we’re doing everything we can to secure our WordPress sites. After all, our websites are often part of our livelihood. In this session Adam will discuss the “big picture” of website security and break down the fundamental tasks needed for a strong security plan, in order of importance. Adam will provide an actionable checklist on what you can start doing today to better secure your WordPress websites. After attending this session, audience members will have a better understanding of website security as a whole and what steps they can take to mitigate risk. Attendees will be able to start building their WordPress security master plan immediately.
  2. WP Evangelist means that I attend WordCamps and other events and listen to the community.
  3. Vulnerability Scanning – a technique used to identify security weaknesses in a computer system and code. Used by network administrators for obvious security purposes. However, hackers can also infiltrate this security tactic to gain unauthorized access, which can open the door to other infiltration tactics and motivations. Vulnerability Scanning is essentially the gateway to additional attacks. Server Disruption – Usually one goal: shut down or render a particular website useless. Known as Distributed Denial of Service or DDoS. In layman’s terms, DDoS attacks are when a hacker seizes control over a network of zombie computers called a botnet. The botnet is then deployed to ping a certain web server to overload a website and ultimately, shut it down. Monetary Loss - This type of motivation for hackers is what everyone is most fearful about. Credit card data, etc. Not just websites: ATM Skimmer story. Information Leakage - Hackers accessing your personal and private information for various reasons. Identify theft, Social Security Numbers, usernames/passwords. Ashley Madison hack that occurred in the summer of 2015. Once hackers were able to infiltrate its customer database, they essentially had the entire company (and its fearful users) at its mercy. When hackers finally posted the Ashley Madison data, it sent the Earth rattling shock waves throughout the internet and society. Website Vandalism - Website Vandalism inspired attacks are often done more for a shock factor and to grab people’s attention. Politically driven, such as to deface a certain candidate’s website, or could simply be used just as a source of fun. Unauthorized Code Execution - typically want to infect a user with malware in order to ultimately take control of said user’s computer through the execution of commands or code. This is a powerful form of hacking that allows hackers to take complete control of the victim’s computer. When hackers run unauthorized code, this can be one of the first steps of turning a user’s computer into a zombie or bot as we mentioned in Motivation Number two. Having this kind of unprecedented access can lead to a limitless number of suspicious activities than a hacker can perform without even a trace of being caught.
  4. What’s In It for Them? Still, the question remains: Why would anyone put in that effort? What do they get out of it? If your site does not contain any government secrets or other people’s banking info, why would they be interested in your site? Well, even in those cases, hacking your site could benefit individuals with bad intentions in different ways: Drive-by-downloads — Hackers can use your site to infect your visitors’ computers with malware like back doors, key trackers, ransomware, viruses, or other malicious software in order to capture information they can use for their own gain. Redirections — Sometimes hackers will redirect visitors from your site to other websites that generate affiliate income for them. System resources — Another possibility is that they take over your server and use the hardware for sending out spam emails, performing denial of service or brute force attacks and more. Of course, this will easily get your server — and your site — put on a blacklist or jack up your hosting cost if it is based on usage. Don’t Like You – Most Uncommon
  5. Don’t accept credit cards? Sensitive data? Website traffic is low? Avoided controversial topics? Only serve a local customer base? Especially owners of smaller websites often think themselves an unlikely target for hackers. After all, why would anyone care about your tiny blog? What could hackers possibly have to gain from compromising it? Traffic size, or popularity are not the deciding factors.
  6. Hacking Attempts Are A Matter Of Opportunity The first thing you need to understand is that it’s not about your site in particular or you personally. Most sites get hacked merely because it’s possible. It’s rare that hackers have a specific reason to go for a particular site. Most of the time hackers go for our sites because we give them an opening, unknowingly. Therefore, it’s not about logic or whether it makes sense to hack your site. No matter how small or insignificant your traffic, you are always a viable target.
  7. Most Hacking Attacks Are Automated One of the main reasons hackers don’t differentiate between the sites of different sizes is that attacks are almost always done automatically. If you think someone typed your site address into a browser bar and had a good snoop around til they found something, you’d be dead wrong. Hackers use bots to crawl the net. Bots sniff out known vulnerabilities. Automating the process allows hackers to attack many sites at once and thus increase their odds of success dramatically. If your site gets hacked, it’s probably because it popped up on the radar of an automated script, not because someone consciously decided to target you.
  8. As you can see, the first point of entry is most often the hosting provider. Doesn’t mean your site has been targeted directly. Likely that another site in a shared hosting environment got hacked and took the others down in the process. More than half of all successful hacks come through WordPress themes and plugins. The rest of the sites suffer from insufficient password protection, making them vulnerable to brute force attacks. 8 percent doesn’t seem like a lot, be aware that we are talking about hundreds of thousands of websites here.
  9. Really comes down to two categories of security.
  10. Access control speaks specifically to the process of authentication and authorization; simply put, how you log in. When I say log in, I mean more than just your website. Here are a few areas to think about when assessing access control: How do you log into your hosting panel? How do you log into your server? (i.e., FTP, SFTP, SSH) How do you log into your website? (i.e., WordPress, Dreamweaver, Joomla!) How do you log into your computer? How do you log into your social media forums?
  11. Not just applications like WordPress, plugins, themes or other software you might be running on your server. But also your local computer, browsers, etc. Even the most experienced developers can’t always account for the threats their own code might introduce. The problem is the way we think about security from beginning to end. Most of us use things as they are designed.
  12. Trump - Defacement Real Estate to Adult Site - Redirection Google does a good job of letting people know. You don’t want your potential visitors/customers to see this.
  13. Be security-minded daily. Be vigilant. It’s not paranoia, it’s best practice for life. Talk about Vienna ATM skimmer. https://www.youtube.com/watch?v=ll4f0Wim4pM Gas station readers, etc. IoT hack that took down East Coast https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/
  14. Fortunately, we can all do a lot to mitigate our chances of being hacked. It’s starts with closing those openings we’ve been leaving.
  15. Home WIFI Computer login At every step of the website creation process! Remember the Access Control I talked about? Hosting account FTP, SFTP, SSH Website login Social Media Accounts 3rd Party services you might use: Dropbox, Amazon, Instagram, Google, and others. Even IoT devices (refrigerators, tvs, etc.)
  16. Don’t!
  17. Plain-text transmission Has anyone sent a username/password combo in an email? Don’t send passwords over email, chat, social networks or other unencrypted forms of transmission Of course, passwords should not be shared between users or stored in plain-text anywhere no matter how convenient this may be. The practice of sharing logins and passwords flies in the face of security and accountability.
  18. Local Anti-virus
  19. How many of you are on the open network right now? Airports, coffee shops, even your neighbors (just noticed wife was on nieghbor open network yesterday!) True story: Betsy Davis. 7 years old. watched YouTube video on how to set up a fake Wifi access point. Only took her 11 minutes to set it up and start getting access to computers. Virtual private network (VPN): A VPN is a way of using the public internet like a secure private network. It encrypts data and routes it through remote servers, keeping the activity and location private and secure.
  20. There was a time when plugins didn't exist. If you wanted to change something, you edited core files. Joe talked about Hooks and Filters. This is what those are for and why plugins exist for changing functionality. Can get the desired functionality you need without actually changing the core. If any developer you work with suggests making any such changes, run a mile.
  21. Explain what a backup is. Search the plugin repo for “backup”
  22. Core, plugins, themes you hear of people who disable WordPress core updates because “an update might break one of my plugins.” If you had to choose between a hacked site and a temporarily broken plugin, which would you choose? Plugins that are incompatible with the latest versions of WordPress are only going to stay that way for a very short time. A hacked site, on the other hand, is a far bigger problem.
  23. Plugins and themes and anything else Sometimes we install plugins to test their functionality and then forget to remove them from our site. If a vulnerability is discovered in these plugins, your site becomes a sitting duck (especially if you don’t follow the advice above and always update the plugins). Your website is still vulnerable even if that plugin is installed on your website and not being used. The safest way to minimize the risks is to completely uninstall any plugins you are not using. There is a very easy way to know which plugins are not being used. They are marked as Inactive in the Plugin section of the WordPress admin. Delete them.
  24. Some people might get tempted to “bypass” the payment of a good theme or plugin, by getting it from *cough* less than reputable sites. Or maybe they don’t know that it’s not the official site. The pirated themes and plugins you download for free have been maliciously tweaked. Most times a back door has been installed in the script. This allows the site where the theme or plugin is used to be remotely controlled by hackers for nefarious reasons. Would you trust your money to a known scam artist? I wouldn’t think so. Same thing for your website. Don’t trust “free” WordPress scripts coming from people whose business is stealing other people’s work.
  25. Security conscious hosting services will have a dedicated security team who monitor the latest vulnerabilities (even 0-day hacks, i.e. those for which there is no remedy yet) and preemptively apply rules on their network firewalls to mitigate any hack attacks on your site. WordPress hosting is a bit of a hot topic, so I won’t be making recommendations here, but the WordPress hosting page does make a few suggestions. These are by no means the only security conscious hosting companies out there. 
  26. What is PHP? PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. Code is executed on the server, generating HTML which is then sent to the client (the browser). Pie Chart: Only 3.5% of WordPress installations run on the latest version of PHP (7.0), whilst about 26.9% run version 5.6, which is still supported. The rest of the WordPress installations (close to 80%) run on versions that are no longer supported or updated for security patches.
  27. Up until WordPress 3.0, the default user name of the administrator login was “admin.” This created a bit of a bonanza for hackers as there was no need for them to guess the administrator username. This “sort of” still matters. Older installs or people who specifically use admin as username. If your username is currently admin, you should create a new administrator user with a username that is less obvious to guess and delete the old admin user. You can also rename the user using phpMyAdmin, or choose to run a SQL script on your database to rename the admin user:
  28. I recommended using mix of security plugins AND cloud-based security and malware scanner options. Many decent solutions found by searching Security tag on repo
  29. SSL (Secure Sockets Layer Encrypted links between a web server and a browser. This link ensures that all data passed between the web server and browsers remains encrypted. Many are free with Let’s Encrypt and many hosts are including this option. Google is (or will be) using this as a ranking factor
  30. By default, WordPress allows users to enter passwords as many times as they want. Helps prevent brute force attacks on your login page To prevent this, you can limit the number of failed login attempts per user. For example, you can say after 5 failed attempts, lock the user out temporarily. If someone has more than 5 failed attempts, then your site block their IP for a temporary period of time based on your settings. You can make it 5 minutes, 15 minutes, 24 hours, and even longer.
  31. One way of quickly and very easily securing your WordPress logins is by enabling Two Factor Authentication, also known as 2FA. 2FA creates a system to log in to your WordPress backend, besides your regular password, you will also need a time-based security token that is unique to each user. This token also expires after a period of time usually 60 seconds. The security token is typically generated by an app such as the Google Authenticator. Because there is a security token unique to each single user that expires, even if somebody knows your login credentials, they will still not be able to log in. This is because they will not have the current security token. This drastically increases the strength of your login and also helps mitigate brute force attacks on your login details. There are a number of plugins that can help you setup WordPress Two Factor Authentication. Check out 6 Best WordPress Security Authentication Plugins for some of our favorites.
  32. No password or codes sent. Pattern matching.
  33. This is a bit of technical thing. PHP and WordPress in general use a set of permissions associated with files and folders. Without going into too much detail, there are different types of permissions 1.Publicly writable files and directories 2. Files writable by the web server only 3. Read-only files In general, your web server typically needs to be able to write files for WordPress to work correctly, whilst the public internet NEVER needs to have write access to your files. As a general rule, folders should have 755 permissions and files should have a 644 permission. The wp-config.php file should have 400 or 440 permission.
  34. This is another remnant of old versions of WordPress. Previously, the name of WordPress tables in the database used to start with the prefix wp_ Although this is no longer default behavior, some people might revert to this (unsafe) practice, whilst older versions of course still have to live with this. WordPress security through obscurity May still block some attempted SQL injection attacks. The procedure to rename existing wp_ tables should be done only by your trusted WordPress developer.
  35. Explain what these are and that I’ll be referencing them. .htaccess is a configuration file for use on web servers running the Apache Web Server software. When a .htaccess file is placed in a directory which is in turn 'loaded via the Apache Web Server', then the .htaccess file is detected and executed by the Apache Web Server software before anything else runs. wp-config.php is one of the core WordPress files. It contains information about the database, including the name, host (typically localhost), username, and password. This information allows WordPress to communicate with the database to store and retrieve data (e.g. Posts, Users, Settings, etc). The file is also used to define advanced options for WordPress.
  36. You might have come across these eight WordPress security and authentication keys in your wp-config.php file and wondered what they are. You may also have never seen or heard about them. They look something like this: These are random variables that are used to make it harder to guess or crack your WordPress passwords. Adds an element of randomness to the way that passwords are stored in your Makes them much harder to crack by brute force. Although most self-hosted sites do not have these in place, you should actually implement them. This is a relatively easy procedure: 1. Generate a set of keys using the WordPress random generator 2. Edit your wp.config file and in the Authentication Unique keys section you should find a place where to add the unique keys generated in step 1 Do not share or make these keys publicly available. It defeats their purpose.
  37. Remember htaccess? One of the first things a hacker would do if they got some kind of access to your site would be to execute PHP from within a directory. This is quite a strong WordPress security step Warning! May break some themes and plugins that might require it, but you should implement this at least in the most vulnerable directories: STAGING SITE /wp-includes/ /uploads/ This protection needs to be implemented via your .htaccess files. Add the below code to the .htaccess file in the root directory of your WordPress installation: <Files *.php>Order Allow, DenyDeny from all</Files>
  38. When you are in the initial phases of creating a website, you’ll probably need to tinker around with themes and plugin files. By default, WordPress administrators have the rights to edit PHP files. Once your website has been developed and is live, you’ll have much less need to edit these files. However, allowing administrators to edit files is a security issue. This is because if a hacker manages to login to your site, they’ll immediately have edit privileges and they’ll be able to change files to suit their malicious needs. You can (and should) disable file editing for WordPress administrators after your website goes live through the following command in the wp-config.php file: define('DISALLOW_FILE_EDIT', true);
  39. If your WordPress files were the human body, the wp-config.php file would be the heart. I won’t go into too much detail about wp-config.php here. But the fact that it stores such important stuff such as the login details for the database used with your WordPress installation, hashing password salts and other important configuration settings, suffice to say this file is very important. Clearly, you don’t want anybody poking around this file. I strongly recommend implementing specific security measures to safeguard this critical WordPress configuration file. You can add the following to your .htaccess files:
  40. XML: EXtensible Markup Language RPC: Remote Procedure Call WordPress provides the ability for an application to access it remotely via what is known as an Application Programming Interface (or API). This means that applications can access your site (for benign reasons). A typical example of usage of the XML-RPC is if you are using a mobile or desktop application to update your site. There are also some plugins, which use XML-RPC. For example, Jetpack uses XML-RPC functionality. However, the XML-RPC can also be used to perform hack attempts on your website. Many believe that XML-RPC is as secure as the rest of the WordPress core, but you can rest assured that XML-RPC is something that hacking scripts are going to be probing. You’ll probably find plenty of hits to XML-RPC if you have enabled logging on your site. If you are sure that you don’t have any third party applications or no WordPress plugins are using your WordPress website via XML-RPC, you can choose to disable it using a WordPress plugin.
  41. There are two main types of firewalls, or uses for firewalls. Network Firewalls: used to segregate different types of networks. Either keeping things from getting in, or things from getting out. Web Application Firewall: (WAF) used to secure the WordPress application itself. Hardware and software that “learns” and accepts rules. Example: Intranet – only allow traffic from certain IP range (only from company network) There are a number of WAF firewalls, some with free plans.
  42. A Content Delivery Network’s primary use is typically to optimize the performance of your site by serving heavy resources fast. CDNs, however, provide another secondary feature: most CDNs are able to protect against a number of WordPress security issues. If you are using a CDN (and you should), make sure you are also enabling the security rules provided to improve the protection of your WordPress website.
  43. Summary of this image https://www.wordfence.com/wp-content/uploads/2015/12/TipsforDetectingHackedWebsiteEarly_1340px.png
  44. Tinkerer Wasted time
  45. In their best interest to keep your safe as safe as possible.
  46. Local machine password, WP users, hosting account, FTP/SFTP. If you categorize all these in LastPass, it will be easy to know what needs to be changed and where.
  47. Just do it Shia Labeuf