SlideShare a Scribd company logo
1 of 19
Securing Your Joomla Website Mike Carson http://joomlashowroom.com
Is Joomla Secure? YES! Joomlais 100% Secure. Untilyouinstallit on a server
Short Video
WhyWorry? BecauseJoomladoesn’t come with a TrunkMonkey.
What Can I Do? Understandthatsecurityis a layeredapproach Select a properhostingcompany Follow best practice guidelines Use the toolsthat are available TAKE IT SERIOUSLY!  MAKE IT MANDATORY!!!
Initial Steps Change the jos_databaseprefix RemoveAdmin user Turn OFF the WYSIWYG editor Subscribe to the Joomla Security Updates list
Let’s Talk Tools Security startsat home Use a good anti-virus software likeKaspersky Use a passwordgenerator/managerKeepass.info or keepassx.org Browser Updates Operating System updates Use secure SFTP toolsWinSCP, Filezilla, Dreamweaver, Putty SSH
HostingCompanies Cloudaccess.net Rochenhost.com Plexicloud.com 1and1.com Simplweb.com Stayawayfrom godaddy.com, siteground.com, dreamhost.com, Yahoo Web Hosting General rule of thumb: You getwhatyoupay for!
Permissions Use proper permissions on files and directories.  They should never be 777 What they should be: Files = 644  Directories = 755
Backups Akeeba Backup Akeebabackup.com 2 versions to choosefrom (Core and Pro) Backup your entire site and its database with a single click Automatic Backups (Cron and Cron-less) Offsite Backups to S3, Dropbox, Rackspace, FTP Test your backups once in a while
Admin Tools AkeebaAdmin Tools Pro – Akeebabackup.com IntegratedJoomla Updater Web Application Firewall IP Whitelist/Blacklist, Bad Words Filter, Security Exceptions Log Htaccess File Maker – Experts ONLY! Permissions Fixer
OtherAdmin Tools Jsecure Plugin - joomlaserviceprovider.com JomDefender – corePHP.com JooReCapchta - joomla.stefysoft.com sh404sef – dev.anything-digital.com Secure Live – securelive.net PHP Security Suite - opensource-excellence.com
Additional Suggestions Completelyremoveunused extensions Leave FTP File Layer disabled From the Joomla administrator area make sure the Register Globals is set to off Avoid using PHP4
DisasterRecovery Plan Create a DisasterRecovery Plan A list of the sites you maintain  A list of user names and passwords for your sites  The databases names, server addresses or IP, user names and passwords, that are used for your list of sites  FTP user names and passwords for each of your sites  Your web hosts tech support number  Have a backup web host decided in case for some reason you need to move quickly  Know how to get into your domain registrar so you can change Name Servers if needed  Name, number, email of a web professional that may be able to help restore your systems if needed  Practice a FULL recovery
So noweverything is all good, right? UH OH
I’ve Been Hacked Don’t Panic!  Remember? You have a disasterrecovery plan. Login and change youradminpassword. Browseyour files for anythingobviouslyunusualthatdoesn’tbelong. Grabyourlatest few backups and compare those to make sure they do not alsocontainanypayloads. Downloadyour server log files. Check your logs for IP's calling suspicious files or attempting POST commands to non-form's. Notify your host and work with them to clean up the site, and to make sure there are no back doors to your site or hire a professional to help Restore yourwebsitewith a clean backup copy. EnsureJoomla and your extensions are all using the latest versions.
DatabasePasswords Changingyour super adminpassword in MySQL Go to adamek.biz/md5-generator.php
DatabasePasswords ,[object Object]
Then browse the Super Admin record you want to change

More Related Content

What's hot

Securing WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanSecuring WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanJeff Hoffman
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security PresentationAndrew Paton
 
How to Install WordPress 2014 in cPanel
How to Install WordPress 2014 in cPanelHow to Install WordPress 2014 in cPanel
How to Install WordPress 2014 in cPanelKim Muellner
 
WordPress 101 for high school students
WordPress 101 for high school studentsWordPress 101 for high school students
WordPress 101 for high school studentsPerri Collins
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issuesDeepu Thomas
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)Michael Carnell
 
WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011Dre Armeda
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress SecurityShawn Hooper
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User SecurityDre Armeda
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security pptCheap SSL Coupon Code
 
Owning word press all you need to know as a wordpress developer by lutaaya ...
Owning word press   all you need to know as a wordpress developer by lutaaya ...Owning word press   all you need to know as a wordpress developer by lutaaya ...
Owning word press all you need to know as a wordpress developer by lutaaya ...Lutaaya Shafiq
 
WordPress Security is like a HHAM Sandwich
WordPress Security is like a HHAM SandwichWordPress Security is like a HHAM Sandwich
WordPress Security is like a HHAM SandwichRed8 Interactive
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress SecurityDougal Campbell
 
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaWordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaDre Armeda
 

What's hot (19)

Securing WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanSecuring WordPress by Jeff Hoffman
Securing WordPress by Jeff Hoffman
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Security Presentation
WordPress Security PresentationWordPress Security Presentation
WordPress Security Presentation
 
How to Install WordPress 2014 in cPanel
How to Install WordPress 2014 in cPanelHow to Install WordPress 2014 in cPanel
How to Install WordPress 2014 in cPanel
 
WordPress 101 for high school students
WordPress 101 for high school studentsWordPress 101 for high school students
WordPress 101 for high school students
 
Wordpress security issues
Wordpress security issuesWordpress security issues
Wordpress security issues
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)
 
WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011WordPress End-User Security - WordCamp Las Vegas 2011
WordPress End-User Security - WordCamp Las Vegas 2011
 
Introduction to WordPress Security
Introduction to WordPress SecurityIntroduction to WordPress Security
Introduction to WordPress Security
 
Setup and run wordpress: 201
Setup and run wordpress: 201Setup and run wordpress: 201
Setup and run wordpress: 201
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
 
Owning word press all you need to know as a wordpress developer by lutaaya ...
Owning word press   all you need to know as a wordpress developer by lutaaya ...Owning word press   all you need to know as a wordpress developer by lutaaya ...
Owning word press all you need to know as a wordpress developer by lutaaya ...
 
WordPress Security is like a HHAM Sandwich
WordPress Security is like a HHAM SandwichWordPress Security is like a HHAM Sandwich
WordPress Security is like a HHAM Sandwich
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Higher Order WordPress Security
Higher Order WordPress SecurityHigher Order WordPress Security
Higher Order WordPress Security
 
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaWordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
 
How to begin with Amazon EC2?
How to begin with Amazon EC2?How to begin with Amazon EC2?
How to begin with Amazon EC2?
 
Launch list
Launch listLaunch list
Launch list
 

Viewers also liked

Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...
Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...
Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...MOC2010
 
Continuous Delivery with JavaScript
Continuous Delivery with JavaScriptContinuous Delivery with JavaScript
Continuous Delivery with JavaScriptRogerio Chaves
 
Bilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialBilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialMihaela Bondoc
 
Science analysis
Science analysisScience analysis
Science analysis14771
 
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA..."BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...Doç. Dr.Levent Atalı
 
Kauno miesto problema
Kauno miesto problemaKauno miesto problema
Kauno miesto problemadijanniux
 
งานไฟฟ้า
งานไฟฟ้างานไฟฟ้า
งานไฟฟ้าNatdanai Kumpao
 
วิทย์งานแรก
วิทย์งานแรกวิทย์งานแรก
วิทย์งานแรกNatdanai Kumpao
 
Why is the sky blue
Why is the sky blueWhy is the sky blue
Why is the sky blueLuis Torre
 
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...Doç. Dr.Levent Atalı
 
Single State Atom apps
Single State Atom appsSingle State Atom apps
Single State Atom appsRogerio Chaves
 
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda parte
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda partePresentación Encuesta Permanente de hogares 2011 Rafaela, segunda parte
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda parteConectaDEL
 

Viewers also liked (15)

Adventas
AdventasAdventas
Adventas
 
Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...
Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...
Alcacer & zhao 2009: Local R&D Strategies and Multi-location Firms: The Role ...
 
Continuous Delivery with JavaScript
Continuous Delivery with JavaScriptContinuous Delivery with JavaScript
Continuous Delivery with JavaScript
 
Bilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorialBilute de baie efervescente- tutorial
Bilute de baie efervescente- tutorial
 
Science analysis
Science analysisScience analysis
Science analysis
 
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA..."BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...
"BELEDİYE" İBARESİNİN SPOR KULÜPLERİ TARAFINDAN TÜZEL KİŞİLİK ADLARINDA KULLA...
 
Carpool
CarpoolCarpool
Carpool
 
Kauno miesto problema
Kauno miesto problemaKauno miesto problema
Kauno miesto problema
 
งานไฟฟ้า
งานไฟฟ้างานไฟฟ้า
งานไฟฟ้า
 
Vitamine social2013
Vitamine social2013Vitamine social2013
Vitamine social2013
 
วิทย์งานแรก
วิทย์งานแรกวิทย์งานแรก
วิทย์งานแรก
 
Why is the sky blue
Why is the sky blueWhy is the sky blue
Why is the sky blue
 
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...
TÜRKİYE FUTBOL FEDERASYONU SPOR TOTO SÜPER LİGİ SPOR KULÜPLERİNİN FACEBOOK KU...
 
Single State Atom apps
Single State Atom appsSingle State Atom apps
Single State Atom apps
 
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda parte
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda partePresentación Encuesta Permanente de hogares 2011 Rafaela, segunda parte
Presentación Encuesta Permanente de hogares 2011 Rafaela, segunda parte
 

Similar to Securing Your Joomla website

Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - SecurityWilco Jansen
 
Joomladay Switzerland - security
Joomladay Switzerland - securityJoomladay Switzerland - security
Joomladay Switzerland - securityWilco Jansen
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Freehuutienmmo
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutSiteGround.com
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014Judy Wilson
 
7. mastering wordpress
7. mastering wordpress7. mastering wordpress
7. mastering wordpressMoreNiche
 
Keeping Your Joomla! Site Secure
Keeping Your Joomla! Site SecureKeeping Your Joomla! Site Secure
Keeping Your Joomla! Site Securejoomladayhouston
 
WordCamp Atlanta- Shared Hosting and WordPress
WordCamp Atlanta- Shared Hosting and WordPressWordCamp Atlanta- Shared Hosting and WordPress
WordCamp Atlanta- Shared Hosting and WordPressAl Davis
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignJudy Wilson
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Brad Williams
 
WordCamp RI 2015 - Beginner WordPress Workshop
WordCamp RI 2015 - Beginner WordPress Workshop   WordCamp RI 2015 - Beginner WordPress Workshop
WordCamp RI 2015 - Beginner WordPress Workshop Ella J Designs
 
The moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaThe moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaMarko Heijnen
 

Similar to Securing Your Joomla website (20)

Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
Joomladay Switzerland - security
Joomladay Switzerland - securityJoomladay Switzerland - security
Joomladay Switzerland - security
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Free
 
Joomlapresent
JoomlapresentJoomlapresent
Joomlapresent
 
Joomlapresent
JoomlapresentJoomlapresent
Joomlapresent
 
Joomlapresent
JoomlapresentJoomlapresent
Joomlapresent
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014
 
7. mastering wordpress
7. mastering wordpress7. mastering wordpress
7. mastering wordpress
 
Keeping Your Joomla! Site Secure
Keeping Your Joomla! Site SecureKeeping Your Joomla! Site Secure
Keeping Your Joomla! Site Secure
 
WordCamp Atlanta- Shared Hosting and WordPress
WordCamp Atlanta- Shared Hosting and WordPressWordCamp Atlanta- Shared Hosting and WordPress
WordCamp Atlanta- Shared Hosting and WordPress
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web Design
 
Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012Top Ten WordPress Security Tips for 2012
Top Ten WordPress Security Tips for 2012
 
Joomla Security
Joomla  SecurityJoomla  Security
Joomla Security
 
Joomla Security
Joomla SecurityJoomla Security
Joomla Security
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
WordCamp RI 2015 - Beginner WordPress Workshop
WordCamp RI 2015 - Beginner WordPress Workshop   WordCamp RI 2015 - Beginner WordPress Workshop
WordCamp RI 2015 - Beginner WordPress Workshop
 
The moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp SofiaThe moment my site got hacked - WordCamp Sofia
The moment my site got hacked - WordCamp Sofia
 
Set up dev environment
Set up dev environmentSet up dev environment
Set up dev environment
 

More from Mike Carson

Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Mike Carson
 
Joomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsJoomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsMike Carson
 
Wireframing and Prototyping Presentation
Wireframing and Prototyping PresentationWireframing and Prototyping Presentation
Wireframing and Prototyping PresentationMike Carson
 
Joomla Content Delivery Networks
Joomla Content Delivery NetworksJoomla Content Delivery Networks
Joomla Content Delivery NetworksMike Carson
 

More from Mike Carson (6)

Ecommerce 101
Ecommerce 101Ecommerce 101
Ecommerce 101
 
Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015Joomla Onsite SEO Guidelines for 2015
Joomla Onsite SEO Guidelines for 2015
 
Joomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden GemsJoomla 2.5 New Features and Hidden Gems
Joomla 2.5 New Features and Hidden Gems
 
Wireframing and Prototyping Presentation
Wireframing and Prototyping PresentationWireframing and Prototyping Presentation
Wireframing and Prototyping Presentation
 
Ecommerce 101
Ecommerce 101Ecommerce 101
Ecommerce 101
 
Joomla Content Delivery Networks
Joomla Content Delivery NetworksJoomla Content Delivery Networks
Joomla Content Delivery Networks
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Securing Your Joomla website

  • 1. Securing Your Joomla Website Mike Carson http://joomlashowroom.com
  • 2. Is Joomla Secure? YES! Joomlais 100% Secure. Untilyouinstallit on a server
  • 5. What Can I Do? Understandthatsecurityis a layeredapproach Select a properhostingcompany Follow best practice guidelines Use the toolsthat are available TAKE IT SERIOUSLY! MAKE IT MANDATORY!!!
  • 6. Initial Steps Change the jos_databaseprefix RemoveAdmin user Turn OFF the WYSIWYG editor Subscribe to the Joomla Security Updates list
  • 7. Let’s Talk Tools Security startsat home Use a good anti-virus software likeKaspersky Use a passwordgenerator/managerKeepass.info or keepassx.org Browser Updates Operating System updates Use secure SFTP toolsWinSCP, Filezilla, Dreamweaver, Putty SSH
  • 8. HostingCompanies Cloudaccess.net Rochenhost.com Plexicloud.com 1and1.com Simplweb.com Stayawayfrom godaddy.com, siteground.com, dreamhost.com, Yahoo Web Hosting General rule of thumb: You getwhatyoupay for!
  • 9. Permissions Use proper permissions on files and directories. They should never be 777 What they should be: Files = 644 Directories = 755
  • 10. Backups Akeeba Backup Akeebabackup.com 2 versions to choosefrom (Core and Pro) Backup your entire site and its database with a single click Automatic Backups (Cron and Cron-less) Offsite Backups to S3, Dropbox, Rackspace, FTP Test your backups once in a while
  • 11. Admin Tools AkeebaAdmin Tools Pro – Akeebabackup.com IntegratedJoomla Updater Web Application Firewall IP Whitelist/Blacklist, Bad Words Filter, Security Exceptions Log Htaccess File Maker – Experts ONLY! Permissions Fixer
  • 12. OtherAdmin Tools Jsecure Plugin - joomlaserviceprovider.com JomDefender – corePHP.com JooReCapchta - joomla.stefysoft.com sh404sef – dev.anything-digital.com Secure Live – securelive.net PHP Security Suite - opensource-excellence.com
  • 13. Additional Suggestions Completelyremoveunused extensions Leave FTP File Layer disabled From the Joomla administrator area make sure the Register Globals is set to off Avoid using PHP4
  • 14. DisasterRecovery Plan Create a DisasterRecovery Plan A list of the sites you maintain A list of user names and passwords for your sites The databases names, server addresses or IP, user names and passwords, that are used for your list of sites FTP user names and passwords for each of your sites Your web hosts tech support number Have a backup web host decided in case for some reason you need to move quickly Know how to get into your domain registrar so you can change Name Servers if needed Name, number, email of a web professional that may be able to help restore your systems if needed Practice a FULL recovery
  • 15. So noweverything is all good, right? UH OH
  • 16. I’ve Been Hacked Don’t Panic! Remember? You have a disasterrecovery plan. Login and change youradminpassword. Browseyour files for anythingobviouslyunusualthatdoesn’tbelong. Grabyourlatest few backups and compare those to make sure they do not alsocontainanypayloads. Downloadyour server log files. Check your logs for IP's calling suspicious files or attempting POST commands to non-form's. Notify your host and work with them to clean up the site, and to make sure there are no back doors to your site or hire a professional to help Restore yourwebsitewith a clean backup copy. EnsureJoomla and your extensions are all using the latest versions.
  • 17. DatabasePasswords Changingyour super adminpassword in MySQL Go to adamek.biz/md5-generator.php
  • 18.
  • 19. Then browse the Super Admin record you want to change
  • 20. Then paste your new MD5 encrypted password into the password field.
  • 21.

Editor's Notes

  1. Changing this prefix will prevent most exploits. If your site is already set up you can use a tool called “EasySQL” to change your current database prefix.Creating a new super administrator will also create a new user ID. Hackers already know 2/3rds of your original Super Admin information. They know the Username and User ID. They only need to figure out your Password.Turning off the editor site wide in the global configuration will prevent front end users from uploading and manipulating files from the front end. Just select NO EDITOR from the dropdown list.