SlideShare ist ein Scribd-Unternehmen logo
1 von 16
COPYRIGHT 2018 © CYBER GATES
SAMVEL GEVORGYAN
CEO, CYBER GATES
Ph.D. in Information systems and cybersecurity
SECURITY
WEBSITE ATTACK STATISTICS
WWW.CYBERGATES.ORG
Attacks around the Worldwide
 Nearly 2 Billion active websites (NetCraft reports)
 Nearly 1 Million hacked websites / year (Zone-H reports)
Over 4K hacked websites since 2011
Top attacks
 Jan 2011 (379)
 Jul 2012 (364)
 Feb 2013 (275)
 Feb 2014 (359)
 Apr 2015 (129)
 Dec 2016 (188)
Attacks in Armenia
CMS MARKET SHARES
WWW.CYBERGATES.ORG
 WordPress: 60.0%
 Joomla: 5.8%
 Drupal: 3.8%
 Squarespace: 2.5%
 Shopify: 2.4%
 Magento: 2.0%
 Wix: 1.7%
 Blogger: 1.7%
 Other: 20.1%
Source: https://w3techs.com/technologies/overview/content_management/all
 Nearly 30% of all websites run on WordPress (WebsiteSetup reports)
 WordPress controls nearly 60% of the CMS market (w3techs reports)
 Over 40K WordPress websites in Alexa Top 1 Million are vulnerable (WPwhitesecurity reports)
CMS vulnerability statistics
TARGET WEBSITES OF MASS ATTACKS
WWW.CYBERGATES.ORG
Top 5 categories
 Websites that use same CMS (WordPress, Joomla, etc.)
 Websites built by the same developer(s)
 Websites that use same technology, library or certain
component
 Websites served by the same Hosting Provider
 Websites of agencies/companies working in the same
industry
TARGET WEBSITES OF TARGETED
ATTACKS
WWW.CYBERGATES.ORG
Top 5 categories
 Online banks and financial institutions
 Cloud services (dropbox, Gmail, iCloud, etc.)
 Government agencies, hospitals
 Hosting and Internet Service Providers (ISP)
 Popular CMS solutions or small outdated websites
that are easy to hack
TRADITIONAL CMS ARCHITECTURE
WWW.CYBERGATES.ORG
IS MY CMS SECURE?
WWW.CYBERGATES.ORG
Frequently asked questions
 Is your CMS team taking cyber security seriously?
 Avg. time to resolve vulnerabilities?
 Who has developed the CMS component(s) you use?
Why CMS security matters?
 New vulnerabilities and issues emerge all the time
 Popular CMS solutions are an attractive target for hackers
 CMS updates often reveal vulnerabilities in previous
versions in the changelog, exposing websites that are not
automatically updated
 The more you add to your CMS installation, the higher the
risk of your site becoming vulnerable.
UPDATES REVEAL VULNERABILITIES?
WWW.CYBERGATES.ORG
Drupal 7.x changelog
 Drupal 7.59, 2018-04-25
- Fixed security issues (remote code execution). See SA-CORE-2018-
004.
 Drupal 7.58, 2018-03-28
- Fixed security issues (remote code execution). See SA-CORE-2018-
002.
 Drupal 7.57, 2018-02-21
- Fixed security issues (multiple vulnerabilities). See SA-CORE-2018-
001.
 Drupal 7.56, 2017-06-21
- Fixed security issues (access bypass). See SA-CORE-2017-003.
Source: https://api.drupal.org/api/drupal/CHANGELOG.txt/7.x
INCIDENT AND VULNERABILITY FACTS
WWW.CYBERGATES.ORG
The average number of serious
vulnerabilities per website is 56
Serious vulnerabilities are resolved in an
average of 193 days from first notification
43% of cyber attacks target small
businesses
30% of SMEs lack an incident response plan
68% of funds lost as a result of a cyber attack
where declared unrecoverable
60% of small businesses close their doors
within 6 months after a serious cyber attack.
DRUPAL VULNERABILITIES
WWW.CYBERGATES.ORG
“Ukrainian Energy Ministry site downed in
Drupal ransomware attack at the end of April
2018.”
“Drupalgeddon2 is a highly critical remote code
execution bug affecting most Drupal sites
which was disclosed at the end of March 2018.”
“Two months later, over 115,000 Drupal sites
still vulnerable to Drupalgeddon 2.”
JOOMLA! VULNERABILITIES
WWW.CYBERGATES.ORG
“Attackers can leverage the Joomla security hole
to compromise servers and use them for
hosting malware and other malicious activities.
They can also sell access to the targeted
servers on the underground market, allowing
others to abuse them for distributed denial-of-
service (DDoS) attacks.”
“On January, 2016, Symantec has detected up
to 20,000 daily attempts to exploit a recently
patched Joomla vulnerability that can be
leveraged for remote code execution.”
HOW YOUR SOURCE CODE LOOKS LIKE
WWW.CYBERGATES.ORG
HOW YOUR WEBPAGE LOOKS LIKE
WWW.CYBERGATES.ORG
COMMON BUSINESS THREATS
WWW.CYBERGATES.ORG
HOW TO SECURE YOUR CMS?
WWW.CYBERGATES.ORG
Common rules
 Choose your CMS with both functionality and security in mind
 Update with urgency
 Use a strong password (admin dashboard access, database
users, etc.)
 Have a firewall in place (detect or prevent suspicious requests)
 Keep track of the changes to your site and their source code
 Give the user permissions (and their levels of access) a lot of
thought
 Limit the type of files to non-executables and monitor them
closely
 Backup your CMS (daily backups of your files and databases)
 Uninstall plugins you do not use or trust.
IS YOUR BUSINESS IN
COMPLIANCE?
WWW.CYBERGATES.ORG
PROJECT URL
https://websecurity.pro
https://onlineservices.cybergates.org/en/websecurity

Weitere ähnliche Inhalte

Was ist angesagt?

Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
Emilio Casbas
 

Was ist angesagt? (20)

Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTranaOWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTrana
 
Top 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilitiesTop 10 Web Application vulnerabilities
Top 10 Web Application vulnerabilities
 
Hack miami emiliocasbas
Hack miami emiliocasbasHack miami emiliocasbas
Hack miami emiliocasbas
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
 
OWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risksOWASP Top 10 - 2017 Top 10 web application security risks
OWASP Top 10 - 2017 Top 10 web application security risks
 
OWASP Top 10 - 2017
OWASP Top 10 - 2017OWASP Top 10 - 2017
OWASP Top 10 - 2017
 
Open Source CMS : How secure are they?
Open Source CMS : How secure are they?Open Source CMS : How secure are they?
Open Source CMS : How secure are they?
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Owasp Top 10
Owasp Top 10Owasp Top 10
Owasp Top 10
 
Watering hole attacks detect the undetectable
Watering hole attacks detect the undetectableWatering hole attacks detect the undetectable
Watering hole attacks detect the undetectable
 
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security RisksOWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
OWASP
OWASPOWASP
OWASP
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 

Ähnlich wie Content Management System Security

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 

Ähnlich wie Content Management System Security (20)

The state of CMS in 2019: Headless, JAMstack and ReactJS – or: If your Conten...
The state of CMS in 2019: Headless, JAMstack and ReactJS – or: If your Conten...The state of CMS in 2019: Headless, JAMstack and ReactJS – or: If your Conten...
The state of CMS in 2019: Headless, JAMstack and ReactJS – or: If your Conten...
 
Liferay as solution for legacy applications
Liferay as solution for legacy applicationsLiferay as solution for legacy applications
Liferay as solution for legacy applications
 
Risico's Web 2.0
Risico's Web 2.0Risico's Web 2.0
Risico's Web 2.0
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Top 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptxTop 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptx
 
joomla webhosting op joomladagen 2009
joomla webhosting op joomladagen 2009joomla webhosting op joomladagen 2009
joomla webhosting op joomladagen 2009
 
Joomla Hosting and Hosting Trends - Joomla!Days NL 2009 #jd09nl
Joomla Hosting and Hosting Trends - Joomla!Days NL 2009 #jd09nlJoomla Hosting and Hosting Trends - Joomla!Days NL 2009 #jd09nl
Joomla Hosting and Hosting Trends - Joomla!Days NL 2009 #jd09nl
 
B&W Netsparker overview
B&W Netsparker overviewB&W Netsparker overview
B&W Netsparker overview
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
Case Study:  Q2 2014 Global DDoS Attack Report | Akamai  DocumentCase Study:  Q2 2014 Global DDoS Attack Report | Akamai  Document
Case Study: Q2 2014 Global DDoS Attack Report | Akamai Document
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 

Mehr von Samvel Gevorgyan

Mehr von Samvel Gevorgyan (6)

Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Five Ways to Improve Yandex.Taxi Service
Five Ways to Improve Yandex.Taxi ServiceFive Ways to Improve Yandex.Taxi Service
Five Ways to Improve Yandex.Taxi Service
 
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքումԲախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
 
Nagorno-karabakh clashes - four-day war in cyberspace
Nagorno-karabakh clashes - four-day war in cyberspaceNagorno-karabakh clashes - four-day war in cyberspace
Nagorno-karabakh clashes - four-day war in cyberspace
 
MAPY
MAPYMAPY
MAPY
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Content Management System Security

  • 1. COPYRIGHT 2018 © CYBER GATES SAMVEL GEVORGYAN CEO, CYBER GATES Ph.D. in Information systems and cybersecurity SECURITY
  • 2. WEBSITE ATTACK STATISTICS WWW.CYBERGATES.ORG Attacks around the Worldwide  Nearly 2 Billion active websites (NetCraft reports)  Nearly 1 Million hacked websites / year (Zone-H reports) Over 4K hacked websites since 2011 Top attacks  Jan 2011 (379)  Jul 2012 (364)  Feb 2013 (275)  Feb 2014 (359)  Apr 2015 (129)  Dec 2016 (188) Attacks in Armenia
  • 3. CMS MARKET SHARES WWW.CYBERGATES.ORG  WordPress: 60.0%  Joomla: 5.8%  Drupal: 3.8%  Squarespace: 2.5%  Shopify: 2.4%  Magento: 2.0%  Wix: 1.7%  Blogger: 1.7%  Other: 20.1% Source: https://w3techs.com/technologies/overview/content_management/all  Nearly 30% of all websites run on WordPress (WebsiteSetup reports)  WordPress controls nearly 60% of the CMS market (w3techs reports)  Over 40K WordPress websites in Alexa Top 1 Million are vulnerable (WPwhitesecurity reports) CMS vulnerability statistics
  • 4. TARGET WEBSITES OF MASS ATTACKS WWW.CYBERGATES.ORG Top 5 categories  Websites that use same CMS (WordPress, Joomla, etc.)  Websites built by the same developer(s)  Websites that use same technology, library or certain component  Websites served by the same Hosting Provider  Websites of agencies/companies working in the same industry
  • 5. TARGET WEBSITES OF TARGETED ATTACKS WWW.CYBERGATES.ORG Top 5 categories  Online banks and financial institutions  Cloud services (dropbox, Gmail, iCloud, etc.)  Government agencies, hospitals  Hosting and Internet Service Providers (ISP)  Popular CMS solutions or small outdated websites that are easy to hack
  • 7. IS MY CMS SECURE? WWW.CYBERGATES.ORG Frequently asked questions  Is your CMS team taking cyber security seriously?  Avg. time to resolve vulnerabilities?  Who has developed the CMS component(s) you use? Why CMS security matters?  New vulnerabilities and issues emerge all the time  Popular CMS solutions are an attractive target for hackers  CMS updates often reveal vulnerabilities in previous versions in the changelog, exposing websites that are not automatically updated  The more you add to your CMS installation, the higher the risk of your site becoming vulnerable.
  • 8. UPDATES REVEAL VULNERABILITIES? WWW.CYBERGATES.ORG Drupal 7.x changelog  Drupal 7.59, 2018-04-25 - Fixed security issues (remote code execution). See SA-CORE-2018- 004.  Drupal 7.58, 2018-03-28 - Fixed security issues (remote code execution). See SA-CORE-2018- 002.  Drupal 7.57, 2018-02-21 - Fixed security issues (multiple vulnerabilities). See SA-CORE-2018- 001.  Drupal 7.56, 2017-06-21 - Fixed security issues (access bypass). See SA-CORE-2017-003. Source: https://api.drupal.org/api/drupal/CHANGELOG.txt/7.x
  • 9. INCIDENT AND VULNERABILITY FACTS WWW.CYBERGATES.ORG The average number of serious vulnerabilities per website is 56 Serious vulnerabilities are resolved in an average of 193 days from first notification 43% of cyber attacks target small businesses 30% of SMEs lack an incident response plan 68% of funds lost as a result of a cyber attack where declared unrecoverable 60% of small businesses close their doors within 6 months after a serious cyber attack.
  • 10. DRUPAL VULNERABILITIES WWW.CYBERGATES.ORG “Ukrainian Energy Ministry site downed in Drupal ransomware attack at the end of April 2018.” “Drupalgeddon2 is a highly critical remote code execution bug affecting most Drupal sites which was disclosed at the end of March 2018.” “Two months later, over 115,000 Drupal sites still vulnerable to Drupalgeddon 2.”
  • 11. JOOMLA! VULNERABILITIES WWW.CYBERGATES.ORG “Attackers can leverage the Joomla security hole to compromise servers and use them for hosting malware and other malicious activities. They can also sell access to the targeted servers on the underground market, allowing others to abuse them for distributed denial-of- service (DDoS) attacks.” “On January, 2016, Symantec has detected up to 20,000 daily attempts to exploit a recently patched Joomla vulnerability that can be leveraged for remote code execution.”
  • 12. HOW YOUR SOURCE CODE LOOKS LIKE WWW.CYBERGATES.ORG
  • 13. HOW YOUR WEBPAGE LOOKS LIKE WWW.CYBERGATES.ORG
  • 15. HOW TO SECURE YOUR CMS? WWW.CYBERGATES.ORG Common rules  Choose your CMS with both functionality and security in mind  Update with urgency  Use a strong password (admin dashboard access, database users, etc.)  Have a firewall in place (detect or prevent suspicious requests)  Keep track of the changes to your site and their source code  Give the user permissions (and their levels of access) a lot of thought  Limit the type of files to non-executables and monitor them closely  Backup your CMS (daily backups of your files and databases)  Uninstall plugins you do not use or trust.
  • 16. IS YOUR BUSINESS IN COMPLIANCE? WWW.CYBERGATES.ORG PROJECT URL https://websecurity.pro https://onlineservices.cybergates.org/en/websecurity