SlideShare ist ein Scribd-Unternehmen logo
1 von 32
WordPress & WooCommerce
Security Best Practices
Moderated by
Nicole Banks
@Incapsula_com
Matty Cohen
@mattyza
© 2016 Imperva, Inc. All rights reserved.
Are you currently a WordPress user?
POLL
2
© 2016 Imperva, Inc. All rights reserved.3
Introduction
• Thanks for joining the webinar
• The webinar will last 30 minutes and will be recorded
• Feel free to submit questions at any time, we will answer as many
as we can at the end
• We will send you a copy of the recording and a PDF copy of the
slides afterwards
• Any questions or concerns, feel free to submit in the chat or email
Nicole@Incapsula.com
© 2016 Imperva, Inc. All rights reserved.4
Agenda
1. Introductions
2. Why Security?
3. Tips for the Best WordPress Experience
4. How WooCommerce Can Help?
5. Wrap-Up
6. External Resources
7. Q&A
© 2016 Imperva, Inc. All rights reserved.5
Imperva Incapsula
Imperva Incapsula is a cloud-based service that makes websites safer, faster
and more reliable. Our mission is to provide every website, regardless of its
size, with enterprise-grade website security and performance features that so
far have only been affordable to the very largest of websites.
Matty Cohen
WOOCOMMERCE PRODUCT TEAM LEAD AT AUTOMATTIC
CHAPTER I
Why Security?
Prevention Is Better Than a Cure
Having no security breaches is better than having to fix even
one security breach.
Peace of Mind
If anything were to go wrong, you know you’re covered.
Security Is a Mindset
Constant vigilance, and a sharp eye for detail.
CHAPTER II
WordPress
What Is WordPress?
An open source website creation platform, powering
~26% of the known websites on the internet.
The operating system of the web.
Tip #1: No “admin” User
Make sure your default username is anything other than “admin”, and is
an uncommon word or phrase.
If you have a username you use regularly online,
you could use that.
Tip #2: Protect wp-admin
With WordPress, it’s possible to have your wp-admin directory
accessible within a certain IP address range, or moved entirely into a
private directory on your server.
Tip #3: Use Unique Table Prefixes
By default, WordPress uses wp_ as the database table
prefix. Adjust this to something unique.
Tip #4: Use Unique Keys and Salts
Within wp-config.php
Adjust the keys and salts in wp-config.php
to be unique and lengthy.
WordPress offers a secret-key service
for generating these strings, here:
https://api.wordpress.org/secret-key/1.1/salt/
Tip #5: Regularly Review the Installed
Plugins List for Inactive Plugins
Go through the list of plugins you have on your WordPress, delete any
which you aren’t using, and examine those you are using, to see if they
are still required and relevant.
If they aren’t required or relevant,
deactivate and remove them.
Tip #6: Enforce Strong Passwords
There is no such thing as a password which is too long.
Enforce the strongest passwords possible, to ensure a more
secure environment.
WordPress has a built-in password strength checker.
Tip #7: Limit Login Attempts
Use the Jetpack plugin, and enable its Security feature, to
prevent brute force login attempts.
https://jetpack.com/
CHAPTER III
WooCommerce
What Is WooCommerce?
The world’s most flexible eCommerce platform.
Powering ~39% of all known online stores.
Powered by WordPress.
Tip #1: Pick a Trusted Web Host
Ensure you choose a trusted and secure web host. Invest in
dedicated web hosting, if possible.
http://pressable.co/
http://bluehost.com/
http://wordpress.com/vip/
Tip #2: Use Trusted Extensions
When selecting your WooCommerce extensions, be sure to use
trusted extensions from WooCommerce.com.
http://woocommerce.com/
Tip #3: Research the Extensions
If you use an extension from another source, such as the official
WordPress plugin directory, be sure to check the number of
installations, the star rating, and when the extension was last
updated.
http://wordpress.org/plugins/
Tip #4: Invest In an SSL certificate
Enforce SSL on all checkout-related screens of your WooCommerce. Enable an
SSL certificate, and then enable the “Force Secure Checkout” option within
WooCommerce.
Your web host should offer SSL. If not, namecheap.com
offers reasonably priced SSL certificates.
Tip #5: Be Mindful of Private Data
There is a high risk in storing a user’s private information.
If you’d prefer not to do this, you could use an off-site payment gateway, instead
of storing a credit card auth token.
Tip #6: Check Permissions When
Connecting to External Services
If you decide to share information with an external service, be sure to check the
permissions this service requires, and reach out to them if you feel the service is
requesting too many permissions.
For example, a read-only service doesn’t need write permissions to your
WooCommerce.
Tip #7: Regularly Test your Checkout
Regular testing of your checkout, with a security mindset, minimises the risk that
your checkout flow could be compromised, as you are regularly reviewing the
checkout.
Be sure to open your web browser’s “Network” tab when doing these tests, to
ensure no information is being leaked.
“
”
DOUG LINDER
A good programmer is someone who always
looks both ways before crossing a one-way
street.
Wrap-up
© 2016 Imperva, Inc. All rights reserved.31
In a fun, quiz-based online format, these free training courses give you the
technical knowledge and skills to identify and block different types of DDoS attacks.
www.DDoSBootcamp.com
DDoS Protection Bootcamp
DDoS Protection Mastery Starts Here
Thanks
Matty Cohen
@mattyza

Weitere ähnliche Inhalte

Mehr von Imperva Incapsula

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?Imperva Incapsula
 
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...Imperva Incapsula
 
D3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesD3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesImperva Incapsula
 
D3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserD3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserImperva Incapsula
 
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationImperva Incapsula
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnImperva Incapsula
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudImperva Incapsula
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityImperva Incapsula
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlImperva Incapsula
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesImperva Incapsula
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...Imperva Incapsula
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceImperva Incapsula
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedImperva Incapsula
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveImperva Incapsula
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...Imperva Incapsula
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackImperva Incapsula
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowImperva Incapsula
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceImperva Incapsula
 

Mehr von Imperva Incapsula (20)

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
 
D3TLV17- Keeping it Safe
D3TLV17-  Keeping it SafeD3TLV17-  Keeping it Safe
D3TLV17- Keeping it Safe
 
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
D3TLV17- The Incapsula WAF: Your Best Line of Denfense Against Application La...
 
D3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation TechniquesD3TLV17- Advanced DDoS Mitigation Techniques
D3TLV17- Advanced DDoS Mitigation Techniques
 
D3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the BrowserD3LDN17 - Recruiting the Browser
D3LDN17 - Recruiting the Browser
 
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS MitigationD3LDN17 - A Pragmatists Guide to DDoS Mitigation
D3LDN17 - A Pragmatists Guide to DDoS Mitigation
 
D3LDN17 - Keynote
D3LDN17 - KeynoteD3LDN17 - Keynote
D3LDN17 - Keynote
 
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-OnD3NY17- Customizing Incapsula to Accommodate Single Sign-On
D3NY17- Customizing Incapsula to Accommodate Single Sign-On
 
D3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the CloudD3NY17 - Migrating to the Cloud
D3NY17 - Migrating to the Cloud
 
D3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize SecurityD3NY17- Using IncapRules to Customize Security
D3NY17- Using IncapRules to Customize Security
 
D3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access ControlD3SF17- Using Incap Rules to Customize Your Security and Access Control
D3SF17- Using Incap Rules to Customize Your Security and Access Control
 
D3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery RulesD3SF17- Boost Your Website Performance with Application Delivery Rules
D3SF17- Boost Your Website Performance with Application Delivery Rules
 
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
D3SF17- A Single Source of Truth for Security Issues- Pushing Siem Logs to Cl...
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons LearnedD3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
D3SF17- Migrating to the Cloud 5- Years' Worth of Lessons Learned
 
D3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the CurveD3SF17 -Keynote - Staying Ahead of the Curve
D3SF17 -Keynote - Staying Ahead of the Curve
 
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Migrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to KnowMigrating from Akamai to Incapsula: What You Need to Know
Migrating from Akamai to Incapsula: What You Need to Know
 
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate PerformanceIncapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
 

Kürzlich hochgeladen

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Kürzlich hochgeladen (20)

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

WordPress WooCommerce

  • 1. WordPress & WooCommerce Security Best Practices Moderated by Nicole Banks @Incapsula_com Matty Cohen @mattyza
  • 2. © 2016 Imperva, Inc. All rights reserved. Are you currently a WordPress user? POLL 2
  • 3. © 2016 Imperva, Inc. All rights reserved.3 Introduction • Thanks for joining the webinar • The webinar will last 30 minutes and will be recorded • Feel free to submit questions at any time, we will answer as many as we can at the end • We will send you a copy of the recording and a PDF copy of the slides afterwards • Any questions or concerns, feel free to submit in the chat or email Nicole@Incapsula.com
  • 4. © 2016 Imperva, Inc. All rights reserved.4 Agenda 1. Introductions 2. Why Security? 3. Tips for the Best WordPress Experience 4. How WooCommerce Can Help? 5. Wrap-Up 6. External Resources 7. Q&A
  • 5. © 2016 Imperva, Inc. All rights reserved.5 Imperva Incapsula Imperva Incapsula is a cloud-based service that makes websites safer, faster and more reliable. Our mission is to provide every website, regardless of its size, with enterprise-grade website security and performance features that so far have only been affordable to the very largest of websites.
  • 6. Matty Cohen WOOCOMMERCE PRODUCT TEAM LEAD AT AUTOMATTIC
  • 8. Prevention Is Better Than a Cure Having no security breaches is better than having to fix even one security breach.
  • 9. Peace of Mind If anything were to go wrong, you know you’re covered.
  • 10. Security Is a Mindset Constant vigilance, and a sharp eye for detail.
  • 12. What Is WordPress? An open source website creation platform, powering ~26% of the known websites on the internet. The operating system of the web.
  • 13. Tip #1: No “admin” User Make sure your default username is anything other than “admin”, and is an uncommon word or phrase. If you have a username you use regularly online, you could use that.
  • 14. Tip #2: Protect wp-admin With WordPress, it’s possible to have your wp-admin directory accessible within a certain IP address range, or moved entirely into a private directory on your server.
  • 15. Tip #3: Use Unique Table Prefixes By default, WordPress uses wp_ as the database table prefix. Adjust this to something unique.
  • 16. Tip #4: Use Unique Keys and Salts Within wp-config.php Adjust the keys and salts in wp-config.php to be unique and lengthy. WordPress offers a secret-key service for generating these strings, here: https://api.wordpress.org/secret-key/1.1/salt/
  • 17. Tip #5: Regularly Review the Installed Plugins List for Inactive Plugins Go through the list of plugins you have on your WordPress, delete any which you aren’t using, and examine those you are using, to see if they are still required and relevant. If they aren’t required or relevant, deactivate and remove them.
  • 18. Tip #6: Enforce Strong Passwords There is no such thing as a password which is too long. Enforce the strongest passwords possible, to ensure a more secure environment. WordPress has a built-in password strength checker.
  • 19. Tip #7: Limit Login Attempts Use the Jetpack plugin, and enable its Security feature, to prevent brute force login attempts. https://jetpack.com/
  • 21. What Is WooCommerce? The world’s most flexible eCommerce platform. Powering ~39% of all known online stores. Powered by WordPress.
  • 22. Tip #1: Pick a Trusted Web Host Ensure you choose a trusted and secure web host. Invest in dedicated web hosting, if possible. http://pressable.co/ http://bluehost.com/ http://wordpress.com/vip/
  • 23. Tip #2: Use Trusted Extensions When selecting your WooCommerce extensions, be sure to use trusted extensions from WooCommerce.com. http://woocommerce.com/
  • 24. Tip #3: Research the Extensions If you use an extension from another source, such as the official WordPress plugin directory, be sure to check the number of installations, the star rating, and when the extension was last updated. http://wordpress.org/plugins/
  • 25. Tip #4: Invest In an SSL certificate Enforce SSL on all checkout-related screens of your WooCommerce. Enable an SSL certificate, and then enable the “Force Secure Checkout” option within WooCommerce. Your web host should offer SSL. If not, namecheap.com offers reasonably priced SSL certificates.
  • 26. Tip #5: Be Mindful of Private Data There is a high risk in storing a user’s private information. If you’d prefer not to do this, you could use an off-site payment gateway, instead of storing a credit card auth token.
  • 27. Tip #6: Check Permissions When Connecting to External Services If you decide to share information with an external service, be sure to check the permissions this service requires, and reach out to them if you feel the service is requesting too many permissions. For example, a read-only service doesn’t need write permissions to your WooCommerce.
  • 28. Tip #7: Regularly Test your Checkout Regular testing of your checkout, with a security mindset, minimises the risk that your checkout flow could be compromised, as you are regularly reviewing the checkout. Be sure to open your web browser’s “Network” tab when doing these tests, to ensure no information is being leaked.
  • 29. “ ” DOUG LINDER A good programmer is someone who always looks both ways before crossing a one-way street.
  • 31. © 2016 Imperva, Inc. All rights reserved.31 In a fun, quiz-based online format, these free training courses give you the technical knowledge and skills to identify and block different types of DDoS attacks. www.DDoSBootcamp.com DDoS Protection Bootcamp DDoS Protection Mastery Starts Here