• About
  • Advertise
  • Privacy & Policy
  • Contact
KHUYEN.INFO
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
No Result
View All Result
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
No Result
View All Result
KHUYEN.INFO
No Result
View All Result

WordPress Security – How To Protect Your WordPress Installation From Hackers

admin by admin
April 21, 2022
Home Cyber Attacks
Share on FacebookShare on Twitter

There are some simple steps that you can take to protect every WordPress installation you set up. But why worry about security?

This is why:

I have had two WordPress blogs hacked into in the past. That was at a time when I was doing very little internet marketing, and until I found time to address the situation (months later), these sites were penalised in the search engines. They were not removed, but the rankings were reduced.

I fixed it in the end, but I did not deal with it for several months. For a good amount of time, I was unaware even of the problem.

The result? I estimate that I lost out on a couple of hundred pounds of advertising revenue.

Much of WordPress security is simply common sense. Are you using a strong password? Are you using a different password for every website?

For years, I did not do that. I had three or four passwords I commonly used. But there are two ways which you can always generate a good, strong password for every site you register with. (Of course, this includes your WordPress blogs.)

The weaker approach (but still pretty good) is to start with a common password; add some numbers to it that you are likely to remember, such as the house number of your first address; then add the first few, say, five letters of the domain name. For example, if the password you were starting with was reindeer230, if you were using a site called example.com, that would become reindeer230examp. That is a pretty strong password. This technique protects against dictionary attacks where an attacker may repeatedly try to log into your account using English words, words of other languages, names, and so on.

The stronger approach, and the one I personally recommend, is to use one of the password generation and storage plugins available for your browser. Many people like RoboForm, but I think after a free trial period, you have to pay for it. I use the free version of Lastpass, and I recommend it for those of you who use Internet Explorer or Firefox. That will generate secure passwords for you; you then use one master password to log in.

Now we are getting into things specific to WordPress. Whenever you install WordPress, you have to edit the file config-sample.php and rename it to config.php. You need to install the database details there.

There are a few other changes you should do as well.

There is a section of config-sample.php that is headed “Authentication Unique Keys.” There are four definitions that appear within the block. There is a hyperlink within that section of code. You need to enter that link into your browser, copy the contents that you get back, and replace the keys you have with the unique, pseudo-random keys provided by the site. This makes it harder for attackers to automatically generate a “logged-in” cookie for your site.

The next step is to change the table prefix from the default “wp_”. This is in the WordPress Database Table Prefix section. It does not really matter what you change it to; you can use alphanumeric characters, hyphens and underscores. This should thwart so-called SQL injection attacks, where an attempt is made by an attacker to cause WordPress to run some SQL code that has an undesirable effect on your site. That code could add a new user with superuser privileges to your WordPress site.

Note that you should only do this last step for new installations. If you want to do it for existing installations, you will also have to change all the table names in the database.

Finally, installing the WordPress Security Scan plugin will check most of this for you, and alert you to anything that you might have missed. It will also tell you that a user named “admin” exists. Of course, that is your administrative user name. You can follow a link and find instructions for changing that name, if you wish. I personally believe that a strong password is good enough protection, and since I followed these steps, there have been no successful attacks on the numerous blogs that I run.

Finally, WordPress Security will also tell you that there is no htaccess in the wp-admin/ directory. You can put a.htaccess file into this directory if you wish, and you can use it to control access to the wp-admin directory by IP address or address range. Details of how to do that are readily available on the net.

However, I recommend that you install the Login LockDown plugin in place of any.htaccess controls. That will stop login requests from being allowed from a specific IP address for an hour after three failed login attempts. If you do that, you can still access your admin panel while away from your office, and yet you still have good protection against hackers.

Tags: cyber attackscyber attacks 2022cyber attacks examplescyber attacks newscyber attacks today
admin

admin

Next Post
Bitdefender Family Pack Overview – Protect Your Entire Family From All Cyber Threats

Investing In A Developing Economy – A Possible Solution To Global Financial Crisis

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Malware Trends Insurance Agencies Should Watch Out For In 2017

Does Windows 10 Need 3rd Party Antivirus?

April 22, 2022
Event log data piles up and usually remains unused

What Is Process Mining And How Does It Work?

April 24, 2022

Trending.

How PIM and BIS work together

Everything You Need To Know About Product Information Management (PIM)

April 24, 2022
Three Provinces, Three Sets Of Rules

E-Invoicing In Spain – Soon To Be Mandatory For B2B Transactions

April 24, 2022
KHUYEN.INFO

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow Us

Categories

  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed
  • Malware
  • Tech News

Tags

ActBalancing API Benefits Blog CFDIE Changing coobligatory cyber attacks cyber attacks 2022 cyber attacks examples cyber attacks news cyber attacks today Data data breaches 2021 data breaches are always intentional data breachesdata breaches 2020 data breaches in healthcare data breaches in india data breaches list data breaches must be reported to data controller data subject & data protection authority within Day Digital Focus Germanindustry industryspecific Invest malware attack malware includes viruses worms spyware adware and spam malwaremalware analysis malware meaning malware scan Micro Power Racing Reap Return Role Safely scenarios Smart TechNotes Time TransformationA version Video

Recent News

Recapping Run And Transform | Micro Focus Blog : Micro Focus Blog

Recapping Run And Transform | Micro Focus Blog : Micro Focus Blog

April 24, 2022
Three Provinces, Three Sets Of Rules

B2B E-Invoicing Mandate In Poland By 2022 At The Latest

April 24, 2022
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Tech News
  • Malware
  • Cyber Attacks
  • Data Breaches
  • Data Security
  • File Managed

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.