SlideShare ist ein Scribd-Unternehmen logo
1 von 9
WordPress Security (Hardening) Tips 2017
The Importance of Website Security
Website Security is a pressing issue today. We have progressed in the virtual world with better, faster and more
reliable technology but so have the hackers. The methods used by hackers have become more sophisticated and more
damaging in many ways. As more and more businesses turn towards the virtual world in order to keep up with the
changing consumer preferences and the competition, it is important that they fully understand the risks involved with
their digital presence and take appropriate measure right from the very start.
Here are some recent Facts about Website Security,
•As of March 2016, Google reported that over 50 million website users were greeted with a security warning when
they visited a website. In March 2015 that number was 17 million. That is almost 3 times increase in a single year.
•Google blacklists close to 20,000 websites a week for malware issues and another 50,000 for phishing scams.
•A study done by Sucuri on 11,000+ infected websites showed that 75% of these websites were running on the
WordPress platform and over 50% of them were out of date. The most basic step towards improving your WordPress
website security is to update the core software and plugins.
•According to a recent study conducted on the 40,000 most visited WordPress websites, 70% were vulnerable to
hacking attacks .
•WordPress Plugins are the biggest threat. In a study conducted, 55.9% hacking attacks happened through plugin
vulnerabilities.
How do you Secure your WordPress Website or Blog?
Here are some security techniques that our team of WordPress developers have put
together. Some of these techniques might require advanced knowledge of WordPress.
Backup WordPress- There are plenty of techniques that you can use to backup your WordPress website or blog. You
can either backup your WordPress Installation through the backup wizard provided by your hosting company or use
a plugin from the WordPress Plugin Directory. Not all hosting companies provide a backup service as a part of your
hosting plan so it is best that you confirm the same. If you want to use a plugin to take backups then here are some
options,
• UpdraftPlus
• Duplicator
• BackWPup
Update Plugins - One of the main reason for WordPress websites getting hacked is plugins being not up to date. We
highly recommend you login to your WordPress dashboard and check for any notifications on the left hand side of
the panel (under updates or plugins).
How do you Secure your WordPress Website or Blog?
Update Core Software- Another simple security measure is to update the WordPress core software on a regular
basis. By default every WordPress website is set to automatically update the core software if there are minor
releases/changes available. However this might not be the case if your website has been highly customised. If you
are not sure please check with your web developers.
Update WordPress Plugins Regularly- According to a study conducted on 117,00 hacked WordPress websites in
2013, 22% were hacked via a vulnerability in the plugin that was being used. If you are using a plugin that has been
downloaded from the WordPress Plugin Directory then you should be able to easily check for any updates through
your WordPress Admin dashboard. However if you have a custom plugin created by a web developer, it is best you
check with them.
Use a Security Question- Using a plugin you can add a security question to Registration, Admin Login and Forgot
password screens.
• WP Security Question
Don’t Use Admin as the Username- A simple fix that is often overlooked by WordPress website owners. We have
seen so many websites using admin as their username and this puts your website security at serious risk! All the
hacker needs to guess is the password in order to get access to your website. Here is how you can change your
WordPress username,
How do you Secure your WordPress Website or Blog?
• Go to your WordPress dashboard using your existing login credentials and click on Users on the left hand
panel.
• On the following screen click on Add New and a form will appear that will allow you to create a new user.
How do you Secure your WordPress Website or Blog?
• Please complete the form choosing unique login credentials and select the role as an administrator.
• Once the form has been submitted the new user should appear on the User screen.
• Now logout from your current admin account and sign in using the new credentials. Once you enter the
dashboard please remove the old administrator account
NOTE- When you delete the old admin account you will be prompted by WordPress to assign a new user to
the pages and posts. Please assign this content to the new admin user account you have created or else
these might get deleted.
Use 2 Factor Authentication- This adds an extra layer of security to your WordPress admin panel by asking a user for
a unique code each time they want to enter the WordPress admin dashboard. This code is sent using the Google
Authenticator App and can be used on both iOS & Android. Here is a step by step guide for enabling this security
feature on your WordPress website using the following plugin,
• Google Authenticator
Use Strong Passwords- The same study also showed that 8% of security hacks happened because the WordPress
installation was using a weak admin password. Here are some tools you can use to generate strong passwords,
• Strong Password Generator
• Norton Password Generator
How do you Secure your WordPress Website or Blog?
Update your WordPress Theme- In a study of 117,000 hacked WordPress websites, it was found that 29% were
hacked into because of a vulnerability in the WordPress theme being used. Most themes come with an auto update
option or a plugin that would support this feature. It is best you check your theme documentation or contact the
theme publisher. For custom built themes the best option is to check with your WordPress Developer.
Use a SFTP connection to connect to the server- Using a SFTP connection to connect to the server will mean that the
file transfer between the local machine and the server (remote machine) will be private and secure. More on SFTP
connections here.
Disable File Editing from the WordPress Dashboard- WordPress comes with a handy little feature on the admin
dashboard that allows a user to edit files that are a part of the WordPress installation. But this feature can be
misused if a hacker gains access to the dashboard. WordPress itself highly recommends that you turn-off the file
editing feature completely. Add the following line at the end of the wpconfig.php file,
Use Comprehensive Security Plugin for WordPress- There are plenty of plugins available on the WordPress Plugin
Directory providing a range of security features. Here is an article that talks about the most popular security plugins.
We have personally installed the following plugins on WordPress websites,
• Wordfence
• Acunetix
About Us
Websites ‘N’ More is a Sydney based digital agency focusing web development using PHP based open source
platforms including WordPress, Joomla, Magento and Drupal. Our team of web developers are capable of,
• Custom Plugin/Extension Development
• eCommerce Development
• Systems Integration
• API Development &
• Theme Development
References
References-
•https://sucuri.net/website-security/Reports/Sucuri-Website-Hacked-Report-2016Q1.pdf
•https://www.wpwhitesecurity.com/wordpress-security-news-updates/statistics-70-percent-wordpress-installations-vulnerable/
•https://www.wordfence.com/blog/2016/03/attackers-gain-access-wordpress-sites/
•https://www.wpmayor.com/wordpress-security-based-facts-statistics/

Weitere ähnliche Inhalte

KĂźrzlich hochgeladen

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

KĂźrzlich hochgeladen (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

WordPress Security (Hardening) Tips 2017

  • 2. The Importance of Website Security Website Security is a pressing issue today. We have progressed in the virtual world with better, faster and more reliable technology but so have the hackers. The methods used by hackers have become more sophisticated and more damaging in many ways. As more and more businesses turn towards the virtual world in order to keep up with the changing consumer preferences and the competition, it is important that they fully understand the risks involved with their digital presence and take appropriate measure right from the very start. Here are some recent Facts about Website Security, •As of March 2016, Google reported that over 50 million website users were greeted with a security warning when they visited a website. In March 2015 that number was 17 million. That is almost 3 times increase in a single year. •Google blacklists close to 20,000 websites a week for malware issues and another 50,000 for phishing scams. •A study done by Sucuri on 11,000+ infected websites showed that 75% of these websites were running on the WordPress platform and over 50% of them were out of date. The most basic step towards improving your WordPress website security is to update the core software and plugins. •According to a recent study conducted on the 40,000 most visited WordPress websites, 70% were vulnerable to hacking attacks . •WordPress Plugins are the biggest threat. In a study conducted, 55.9% hacking attacks happened through plugin vulnerabilities.
  • 3. How do you Secure your WordPress Website or Blog? Here are some security techniques that our team of WordPress developers have put together. Some of these techniques might require advanced knowledge of WordPress. Backup WordPress- There are plenty of techniques that you can use to backup your WordPress website or blog. You can either backup your WordPress Installation through the backup wizard provided by your hosting company or use a plugin from the WordPress Plugin Directory. Not all hosting companies provide a backup service as a part of your hosting plan so it is best that you confirm the same. If you want to use a plugin to take backups then here are some options, • UpdraftPlus • Duplicator • BackWPup Update Plugins - One of the main reason for WordPress websites getting hacked is plugins being not up to date. We highly recommend you login to your WordPress dashboard and check for any notifications on the left hand side of the panel (under updates or plugins).
  • 4. How do you Secure your WordPress Website or Blog? Update Core Software- Another simple security measure is to update the WordPress core software on a regular basis. By default every WordPress website is set to automatically update the core software if there are minor releases/changes available. However this might not be the case if your website has been highly customised. If you are not sure please check with your web developers. Update WordPress Plugins Regularly- According to a study conducted on 117,00 hacked WordPress websites in 2013, 22% were hacked via a vulnerability in the plugin that was being used. If you are using a plugin that has been downloaded from the WordPress Plugin Directory then you should be able to easily check for any updates through your WordPress Admin dashboard. However if you have a custom plugin created by a web developer, it is best you check with them. Use a Security Question- Using a plugin you can add a security question to Registration, Admin Login and Forgot password screens. • WP Security Question Don’t Use Admin as the Username- A simple fix that is often overlooked by WordPress website owners. We have seen so many websites using admin as their username and this puts your website security at serious risk! All the hacker needs to guess is the password in order to get access to your website. Here is how you can change your WordPress username,
  • 5. How do you Secure your WordPress Website or Blog? • Go to your WordPress dashboard using your existing login credentials and click on Users on the left hand panel. • On the following screen click on Add New and a form will appear that will allow you to create a new user.
  • 6. How do you Secure your WordPress Website or Blog? • Please complete the form choosing unique login credentials and select the role as an administrator. • Once the form has been submitted the new user should appear on the User screen. • Now logout from your current admin account and sign in using the new credentials. Once you enter the dashboard please remove the old administrator account NOTE- When you delete the old admin account you will be prompted by WordPress to assign a new user to the pages and posts. Please assign this content to the new admin user account you have created or else these might get deleted. Use 2 Factor Authentication- This adds an extra layer of security to your WordPress admin panel by asking a user for a unique code each time they want to enter the WordPress admin dashboard. This code is sent using the Google Authenticator App and can be used on both iOS & Android. Here is a step by step guide for enabling this security feature on your WordPress website using the following plugin, • Google Authenticator Use Strong Passwords- The same study also showed that 8% of security hacks happened because the WordPress installation was using a weak admin password. Here are some tools you can use to generate strong passwords, • Strong Password Generator • Norton Password Generator
  • 7. How do you Secure your WordPress Website or Blog? Update your WordPress Theme- In a study of 117,000 hacked WordPress websites, it was found that 29% were hacked into because of a vulnerability in the WordPress theme being used. Most themes come with an auto update option or a plugin that would support this feature. It is best you check your theme documentation or contact the theme publisher. For custom built themes the best option is to check with your WordPress Developer. Use a SFTP connection to connect to the server- Using a SFTP connection to connect to the server will mean that the file transfer between the local machine and the server (remote machine) will be private and secure. More on SFTP connections here. Disable File Editing from the WordPress Dashboard- WordPress comes with a handy little feature on the admin dashboard that allows a user to edit files that are a part of the WordPress installation. But this feature can be misused if a hacker gains access to the dashboard. WordPress itself highly recommends that you turn-off the file editing feature completely. Add the following line at the end of the wpconfig.php file, Use Comprehensive Security Plugin for WordPress- There are plenty of plugins available on the WordPress Plugin Directory providing a range of security features. Here is an article that talks about the most popular security plugins. We have personally installed the following plugins on WordPress websites, • Wordfence • Acunetix
  • 8. About Us Websites ‘N’ More is a Sydney based digital agency focusing web development using PHP based open source platforms including WordPress, Joomla, Magento and Drupal. Our team of web developers are capable of, • Custom Plugin/Extension Development • eCommerce Development • Systems Integration • API Development & • Theme Development