SlideShare a Scribd company logo
Building Secure WordPress Sites
Building Secure
WordPress Sites
            By Sakin Shrestha
     Blog: http://sakinshrestha.com
    Email: sakin@catchinternet.com
           Twitter: @sakinshrestha
Sakin Shrestha
•   Founder of Catch Internet and Catch Themes
•   WordPress Theme Developer
•   Business Consultant
•   Member of WordPress Theme Review Team
WordPress

• Most Popular Open Source Web Application
• 17% of the Websites in the World
• 1 in 6 websites
Top 10 Myths That
                    We Live By
Source:
http://www.problogger.net/archives/2012/08/29/top-10-
wordpress-security-myths/
The Myths We Live By

Myth 1:
  WordPress is not Secure
Reality:
• Old versions of WordPress are NOT
  secure
• Current WordPress version is secure
The Myths We Live By

Myth 2:
  Nobody wants to hack my site
Reality:
• Most hacking attempts are automated
• Once your site is on public web
  hosting, you need to protect it.
• When using WordPress you need to keep
  theme and plugins updated
The Myths We Live By

Myth 3:
  My WordPress site is 100% secured
Reality:
• No site that’s accessible on the internet will
  ever be 100% secure.
• You need to have a good backup available
The Myths We Live By

Myth 4:
  Updating my themes and plugins
  whenever I log in is good enough
Reality:
• It’s not. You need to update it ASAP
• Timthumb script exploit was discovered
  and exploited on a mass number of blogs
  within DAYS!
The Myths We Live By

Myth 5:
  I only use themes and plugins from
  wordpress.org, so I’m safe
Reality:
• Plugins and themes are the #1 way
  hackers gain access to your site
• Only WordPress current Core is secure
• WordPress.org is safer but not sure bet
The Myths We Live By

Myth 6:
  If I de-activate a theme or plugin, there is
  no risk
Reality:
• There is risk
• Because even files of de-activated plugins
  and themes can be access via the Internet
The Myths We Live By

Myth 7:
   My site is secured by Security Plugins
Reality:
• It just add layer of protection
• It won’t help much if a hacker gains access
  to your online session & password, or
  sensitive files
• It won’t help if the hosting server is
  compromised
The Myths We Live By

Myth 8:
  If my site is compromised I will quickly find
  out
Reality:
• Many hacks are invisible to visitors and
  only visible to bots
• You may not know until your site has been
  blacklisted by Google
• Use site monitoring service or plugin
The Myths We Live By

Myth 9:
  My password is good enough
Reality:
• A normal 8 characters or less password
  can be decoded easily.
• Try using mix of characters, numbers and
  special characters
• Use password generator tools
The Myths We Live By

Myth 10:
  If my site is hacked, my hosting can
  restore it for me
Reality:
• Yes if you have premium hosting severs
  like WordPress VIP Hosting
• No for normal hosting.
Building Secure
WordPress Sites
      in
Simple 10 Steps
Building Secure WordPress Sites

Step 1:
Secure your own Computer
Recommendation:
Keep it private
Run anti-virus software regularly
  Don’t login via insecure or public WIFI
  network
  Be careful of sites you click on.
Building Secure WordPress Sites

Step 2:
Get reliable Hosting server
Recommended Hosting:
Bluehost
  Media Temple
  Web Synthesis
  WP Engine
  WordPress VIP Hosting
Building Secure WordPress Sites

Step 3:
Add Secret Keys in wp-config.php file
Recommendation:
  A secret key is a hashing salt which makes
  your site harder to hack by adding random
  elements to the password.
  Visit this URL to get your secret keys:
  https://api.wordpress.org/secret-
  key/1.1/salt/
Building Secure WordPress Sites

Step 4:
Proper File and Folder Permission
Recommendation:
  Files should be set to 644
  Folders should be set to 755
Building Secure WordPress Sites

Step 5:
Use strong password and remove admin
  name
Recommendation:
  Use password generator to reset
  passwords for WP, FTP, Hosting and Email
  Create a new admin user, log out, login as
  new user, delete old the “admin” user and
  assign posts/pages to new admin
Building Secure WordPress Sites

Step 6:
Get reliable WordPress theme
Recommendation:
  Use free theme hosted in WordPress.org
  Use premium theme only from reputed
  theme development companies
  ( Catch Themes, Woo Themes, Graph
  Paper Press)
Building Secure WordPress Sites

Step 7:
Get reliable WordPress plugins
Recommendation:
  Try to minimize the use of plugins
  For free plugins only use Top Rated and
  Popular plugins in WordPress.org
  For premium plugins check the
  code, change logs and feedbacks
Building Secure WordPress Sites

Step 8:
Setup backup schedule
Recommendation:
  Use backup plugin such as
  VaultPress, Backup Buddy, WP DB
  Backup, WP Online backup and so on
  Backup as often as you don’t want to loose
  data
Building Secure WordPress Sites

Step 9:
Update Update and Update
Recommendation:
  No Excuse
  Update your WordPress, Themes and
  Plugins
Building Secure WordPress Sites

Step 10:
Install Security Plugins
Recommendation:
   Better WP Security
SucuriSitecheck Malware Scanner
   Secure WordPress
BulletProof Security
   WP Security Scan
Better WP Security: Hides
•   Remove the meta "Generator” tag
•   Change the urls for WordPress dashboard including
    login, admin, and more
•   Completely turn off the ability to login for a given time period
    (away mode)
•   Remove theme, plugin, and core update notifications
    from users who do not have permission to update them
•   rename "admin" account and Change the ID on the user with
    ID 1
•   Change the WordPress database table prefix
•   Removes login error messages
Better WP Security: Protects
•   Scan your site to instantly tell where vulnerabilities are
    and fix them in seconds
•   Ban troublesome bots and other hosts
•   Ban troublesome user agents
•   Prevent brute force attacks by banning hosts and users
    with too many invalid login attempts
•   Enforce strong passwords for all accounts of a
    configurable minimum role
•   Force SSL for admin page (on supporting servers)
•   Turn off file editing from within WordPress admin area
•   Detect and block numerous attacks to your filesystem
    and database
Better WP Security: Detect
•       Monitor filesystem for unauthorized changes
•       Detect bots and other attempts to search for vulnerabilities




        Better WP Security: Recovery
    •    Create and email database backups on a customizable
         schedule
Resources for WordPress Security
Security Related Articles
• http://codex.wordpress.org/Hardening_WordPress
• http://blog.sucuri.net/2012/04/lockdown-wordpress-a-
   security-webinar-with-dre-armeda.html
• http://blog.sucuri.net/2012/04/ask-sucuri-how-to-stop-the-
   hacker-and-ensure-your-site-is-locked.html
• http://catchinternet.com/blog/wordpress-security-tips/

Clean a Hacked Site
• http://codex.wordpress.org/FAQ_My_site_was_hacked
• http://www.marketingtechblog.com/wordpress-hacked/
• http://sakinshrestha.com/wordpress/fix-if-your-wordpress-
   site-is-hacked/
Resources for WordPress Security
Support Forums
• Hacked: http://wordpress.org/tags/hacked
• Malware: http://wordpress.org/tags/malware
Building Secure
WordPress Sites
      Sakin Shrestha
Blog: http://sakinshrestha.com
Email: sakin@catchinternet.com
   Twitter: @sakinshrestha
Ad

More Related Content

What's hot (20)

WordCamp Philippines 2009: WordPress In The Wild
WordCamp Philippines 2009: WordPress In The WildWordCamp Philippines 2009: WordPress In The Wild
WordCamp Philippines 2009: WordPress In The Wild
rebelpixel
 
WordPress Security Basics - Melbourne WordPress User Meetup
WordPress Security Basics - Melbourne WordPress User MeetupWordPress Security Basics - Melbourne WordPress User Meetup
WordPress Security Basics - Melbourne WordPress User Meetup
Chris Burgess
 
The Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress SecurityThe Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress Security
AidanChard
 
8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla
SiteGround.com
 
WordPress security & performance a beginners guide
WordPress security & performance a beginners guideWordPress security & performance a beginners guide
WordPress security & performance a beginners guide
Mickey Mellen
 
WordPress Security Basics
WordPress Security BasicsWordPress Security Basics
WordPress Security Basics
Ryan Plas
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
Brad Williams
 
An example of cms - wordpress
An example of cms - wordpressAn example of cms - wordpress
An example of cms - wordpress
Eunus Hosen
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
Thor Kristiansen
 
Secrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla RevealedSecrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla Revealed
SiteGround.com
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them
SiteGround.com
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
Brad Williams
 
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaWordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Dre Armeda
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
Cheap SSL Coupon Code
 
Keep Your SIte Secure
Keep Your SIte SecureKeep Your SIte Secure
Keep Your SIte Secure
Michele Butcher-Jones
 
Why wordpress is not completely safe
Why wordpress is not completely safeWhy wordpress is not completely safe
Why wordpress is not completely safe
Brainwork Technologies
 
WordPress Security 101: Practical Techniques & Best Practices
WordPress Security 101: Practical Techniques & Best PracticesWordPress Security 101: Practical Techniques & Best Practices
WordPress Security 101: Practical Techniques & Best Practices
Jonathan Hall
 
WordPress Security Tips
WordPress Security TipsWordPress Security Tips
WordPress Security Tips
Catch Themes
 
WordPress Security
WordPress Security WordPress Security
WordPress Security
Christina Hawkins
 
WordCamp Philippines 2009: WordPress In The Wild
WordCamp Philippines 2009: WordPress In The WildWordCamp Philippines 2009: WordPress In The Wild
WordCamp Philippines 2009: WordPress In The Wild
rebelpixel
 
WordPress Security Basics - Melbourne WordPress User Meetup
WordPress Security Basics - Melbourne WordPress User MeetupWordPress Security Basics - Melbourne WordPress User Meetup
WordPress Security Basics - Melbourne WordPress User Meetup
Chris Burgess
 
The Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress SecurityThe Ultimate Guide to Wordpress Security
The Ultimate Guide to Wordpress Security
AidanChard
 
8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla8 Simple Ways to Hack Your Joomla
8 Simple Ways to Hack Your Joomla
SiteGround.com
 
WordPress security & performance a beginners guide
WordPress security & performance a beginners guideWordPress security & performance a beginners guide
WordPress security & performance a beginners guide
Mickey Mellen
 
WordPress Security Basics
WordPress Security BasicsWordPress Security Basics
WordPress Security Basics
Ryan Plas
 
WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013WordPress Security WordCamp OC 2013
WordPress Security WordCamp OC 2013
Brad Williams
 
An example of cms - wordpress
An example of cms - wordpressAn example of cms - wordpress
An example of cms - wordpress
Eunus Hosen
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNsSucuri Webinar: Beginner's Guide to CDNs
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
Thor Kristiansen
 
Secrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla RevealedSecrets to a Hack-Proof Joomla Revealed
Secrets to a Hack-Proof Joomla Revealed
SiteGround.com
 
8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them8 Most Popular Joomla Hacks & How To Avoid Them
8 Most Popular Joomla Hacks & How To Avoid Them
SiteGround.com
 
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre ArmedaWordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
WordCamp Chicago 2011 - WordPress End User Security - Dre Armeda
Dre Armeda
 
Tips to improve word press security ppt
Tips to improve word press security pptTips to improve word press security ppt
Tips to improve word press security ppt
Cheap SSL Coupon Code
 
WordPress Security 101: Practical Techniques & Best Practices
WordPress Security 101: Practical Techniques & Best PracticesWordPress Security 101: Practical Techniques & Best Practices
WordPress Security 101: Practical Techniques & Best Practices
Jonathan Hall
 
WordPress Security Tips
WordPress Security TipsWordPress Security Tips
WordPress Security Tips
Catch Themes
 

Similar to Building Secure WordPress Sites (20)

Your Site Has Been Hacked, Now What?
Your Site Has Been Hacked, Now What?Your Site Has Been Hacked, Now What?
Your Site Has Been Hacked, Now What?
Michele Butcher-Jones
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
Robert Vidal
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
Zero Point Development
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP Meetup
Oyster Bay Marauders LLC
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
SiteGround.com
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
Brian Layman
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
Ivan Storck
 
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
jaunelia596
 
Essential WordPress Security Tips to Protect Your Website in 2024.pdf
Essential WordPress Security Tips to Protect Your Website in 2024.pdfEssential WordPress Security Tips to Protect Your Website in 2024.pdf
Essential WordPress Security Tips to Protect Your Website in 2024.pdf
jaunelia596
 
WordPress Plugins and Security
WordPress Plugins and SecurityWordPress Plugins and Security
WordPress Plugins and Security
Think Media Inc.
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
Dre Armeda
 
Everything WordPress
Everything WordPressEverything WordPress
Everything WordPress
Eric Myers
 
How WordPress Sites Get Hacked
How WordPress Sites Get HackedHow WordPress Sites Get Hacked
How WordPress Sites Get Hacked
Andrew Marks
 
WordPress Complete Tutorial
WordPress Complete TutorialWordPress Complete Tutorial
WordPress Complete Tutorial
OpenSource Technologies Pvt. Ltd.
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
kriptonium
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
The Toolbox, Inc.
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
Shaiffulnizam Mohamad
 
Basics for Securing WordPress
Basics for Securing WordPressBasics for Securing WordPress
Basics for Securing WordPress
miss604
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
Nathan Platt
 
I Have My WordPress Site Now What?
I Have My WordPress Site Now What?I Have My WordPress Site Now What?
I Have My WordPress Site Now What?
Michele Butcher-Jones
 
Your Site Has Been Hacked, Now What?
Your Site Has Been Hacked, Now What?Your Site Has Been Hacked, Now What?
Your Site Has Been Hacked, Now What?
Michele Butcher-Jones
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
Robert Vidal
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
Zero Point Development
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP Meetup
Oyster Bay Marauders LLC
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
SiteGround.com
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
Brian Layman
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
Ivan Storck
 
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
EssentiEssential WordPress Security Tips to Protect Your Website in 2024al Wo...
jaunelia596
 
Essential WordPress Security Tips to Protect Your Website in 2024.pdf
Essential WordPress Security Tips to Protect Your Website in 2024.pdfEssential WordPress Security Tips to Protect Your Website in 2024.pdf
Essential WordPress Security Tips to Protect Your Website in 2024.pdf
jaunelia596
 
WordPress Plugins and Security
WordPress Plugins and SecurityWordPress Plugins and Security
WordPress Plugins and Security
Think Media Inc.
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
Dre Armeda
 
Everything WordPress
Everything WordPressEverything WordPress
Everything WordPress
Eric Myers
 
How WordPress Sites Get Hacked
How WordPress Sites Get HackedHow WordPress Sites Get Hacked
How WordPress Sites Get Hacked
Andrew Marks
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
kriptonium
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
The Toolbox, Inc.
 
Basics for Securing WordPress
Basics for Securing WordPressBasics for Securing WordPress
Basics for Securing WordPress
miss604
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
Nathan Platt
 
Ad

More from Catch Themes (10)

Building WordPress Theme Business: My Story
Building WordPress Theme Business: My StoryBuilding WordPress Theme Business: My Story
Building WordPress Theme Business: My Story
Catch Themes
 
Speaking at WordCamps? What not to do…
Speaking at WordCamps? What not to do…Speaking at WordCamps? What not to do…
Speaking at WordCamps? What not to do…
Catch Themes
 
Opening Remarks - WordCamp Kathmandu, 2016
Opening Remarks - WordCamp Kathmandu, 2016 Opening Remarks - WordCamp Kathmandu, 2016
Opening Remarks - WordCamp Kathmandu, 2016
Catch Themes
 
Breaking social barriers and creating opportunities
Breaking social barriers and creating opportunitiesBreaking social barriers and creating opportunities
Breaking social barriers and creating opportunities
Catch Themes
 
World of Creative Designer & Front-end-Developer
World of Creative Designer & Front-end-DeveloperWorld of Creative Designer & Front-end-Developer
World of Creative Designer & Front-end-Developer
Catch Themes
 
Approaches To WordPress Theme Development
Approaches To WordPress Theme DevelopmentApproaches To WordPress Theme Development
Approaches To WordPress Theme Development
Catch Themes
 
Contributing to WordPress Theme Review at WordPress.org
Contributing to WordPress Theme Review at WordPress.orgContributing to WordPress Theme Review at WordPress.org
Contributing to WordPress Theme Review at WordPress.org
Catch Themes
 
How to get your theme on Top 15 Popular Themes at WordPress.org
How to get your theme on Top 15 Popular Themes at WordPress.orgHow to get your theme on Top 15 Popular Themes at WordPress.org
How to get your theme on Top 15 Popular Themes at WordPress.org
Catch Themes
 
Starting WordPress Theme Review
Starting WordPress Theme ReviewStarting WordPress Theme Review
Starting WordPress Theme Review
Catch Themes
 
WordPress Uses & Scope
WordPress Uses & ScopeWordPress Uses & Scope
WordPress Uses & Scope
Catch Themes
 
Building WordPress Theme Business: My Story
Building WordPress Theme Business: My StoryBuilding WordPress Theme Business: My Story
Building WordPress Theme Business: My Story
Catch Themes
 
Speaking at WordCamps? What not to do…
Speaking at WordCamps? What not to do…Speaking at WordCamps? What not to do…
Speaking at WordCamps? What not to do…
Catch Themes
 
Opening Remarks - WordCamp Kathmandu, 2016
Opening Remarks - WordCamp Kathmandu, 2016 Opening Remarks - WordCamp Kathmandu, 2016
Opening Remarks - WordCamp Kathmandu, 2016
Catch Themes
 
Breaking social barriers and creating opportunities
Breaking social barriers and creating opportunitiesBreaking social barriers and creating opportunities
Breaking social barriers and creating opportunities
Catch Themes
 
World of Creative Designer & Front-end-Developer
World of Creative Designer & Front-end-DeveloperWorld of Creative Designer & Front-end-Developer
World of Creative Designer & Front-end-Developer
Catch Themes
 
Approaches To WordPress Theme Development
Approaches To WordPress Theme DevelopmentApproaches To WordPress Theme Development
Approaches To WordPress Theme Development
Catch Themes
 
Contributing to WordPress Theme Review at WordPress.org
Contributing to WordPress Theme Review at WordPress.orgContributing to WordPress Theme Review at WordPress.org
Contributing to WordPress Theme Review at WordPress.org
Catch Themes
 
How to get your theme on Top 15 Popular Themes at WordPress.org
How to get your theme on Top 15 Popular Themes at WordPress.orgHow to get your theme on Top 15 Popular Themes at WordPress.org
How to get your theme on Top 15 Popular Themes at WordPress.org
Catch Themes
 
Starting WordPress Theme Review
Starting WordPress Theme ReviewStarting WordPress Theme Review
Starting WordPress Theme Review
Catch Themes
 
WordPress Uses & Scope
WordPress Uses & ScopeWordPress Uses & Scope
WordPress Uses & Scope
Catch Themes
 
Ad

Recently uploaded (20)

Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 

Building Secure WordPress Sites

  • 2. Building Secure WordPress Sites By Sakin Shrestha Blog: http://sakinshrestha.com Email: [email protected] Twitter: @sakinshrestha
  • 3. Sakin Shrestha • Founder of Catch Internet and Catch Themes • WordPress Theme Developer • Business Consultant • Member of WordPress Theme Review Team
  • 4. WordPress • Most Popular Open Source Web Application • 17% of the Websites in the World • 1 in 6 websites
  • 5. Top 10 Myths That We Live By Source: http://www.problogger.net/archives/2012/08/29/top-10- wordpress-security-myths/
  • 6. The Myths We Live By Myth 1: WordPress is not Secure Reality: • Old versions of WordPress are NOT secure • Current WordPress version is secure
  • 7. The Myths We Live By Myth 2: Nobody wants to hack my site Reality: • Most hacking attempts are automated • Once your site is on public web hosting, you need to protect it. • When using WordPress you need to keep theme and plugins updated
  • 8. The Myths We Live By Myth 3: My WordPress site is 100% secured Reality: • No site that’s accessible on the internet will ever be 100% secure. • You need to have a good backup available
  • 9. The Myths We Live By Myth 4: Updating my themes and plugins whenever I log in is good enough Reality: • It’s not. You need to update it ASAP • Timthumb script exploit was discovered and exploited on a mass number of blogs within DAYS!
  • 10. The Myths We Live By Myth 5: I only use themes and plugins from wordpress.org, so I’m safe Reality: • Plugins and themes are the #1 way hackers gain access to your site • Only WordPress current Core is secure • WordPress.org is safer but not sure bet
  • 11. The Myths We Live By Myth 6: If I de-activate a theme or plugin, there is no risk Reality: • There is risk • Because even files of de-activated plugins and themes can be access via the Internet
  • 12. The Myths We Live By Myth 7: My site is secured by Security Plugins Reality: • It just add layer of protection • It won’t help much if a hacker gains access to your online session & password, or sensitive files • It won’t help if the hosting server is compromised
  • 13. The Myths We Live By Myth 8: If my site is compromised I will quickly find out Reality: • Many hacks are invisible to visitors and only visible to bots • You may not know until your site has been blacklisted by Google • Use site monitoring service or plugin
  • 14. The Myths We Live By Myth 9: My password is good enough Reality: • A normal 8 characters or less password can be decoded easily. • Try using mix of characters, numbers and special characters • Use password generator tools
  • 15. The Myths We Live By Myth 10: If my site is hacked, my hosting can restore it for me Reality: • Yes if you have premium hosting severs like WordPress VIP Hosting • No for normal hosting.
  • 16. Building Secure WordPress Sites in Simple 10 Steps
  • 17. Building Secure WordPress Sites Step 1: Secure your own Computer Recommendation: Keep it private Run anti-virus software regularly Don’t login via insecure or public WIFI network Be careful of sites you click on.
  • 18. Building Secure WordPress Sites Step 2: Get reliable Hosting server Recommended Hosting: Bluehost Media Temple Web Synthesis WP Engine WordPress VIP Hosting
  • 19. Building Secure WordPress Sites Step 3: Add Secret Keys in wp-config.php file Recommendation: A secret key is a hashing salt which makes your site harder to hack by adding random elements to the password. Visit this URL to get your secret keys: https://api.wordpress.org/secret- key/1.1/salt/
  • 20. Building Secure WordPress Sites Step 4: Proper File and Folder Permission Recommendation: Files should be set to 644 Folders should be set to 755
  • 21. Building Secure WordPress Sites Step 5: Use strong password and remove admin name Recommendation: Use password generator to reset passwords for WP, FTP, Hosting and Email Create a new admin user, log out, login as new user, delete old the “admin” user and assign posts/pages to new admin
  • 22. Building Secure WordPress Sites Step 6: Get reliable WordPress theme Recommendation: Use free theme hosted in WordPress.org Use premium theme only from reputed theme development companies ( Catch Themes, Woo Themes, Graph Paper Press)
  • 23. Building Secure WordPress Sites Step 7: Get reliable WordPress plugins Recommendation: Try to minimize the use of plugins For free plugins only use Top Rated and Popular plugins in WordPress.org For premium plugins check the code, change logs and feedbacks
  • 24. Building Secure WordPress Sites Step 8: Setup backup schedule Recommendation: Use backup plugin such as VaultPress, Backup Buddy, WP DB Backup, WP Online backup and so on Backup as often as you don’t want to loose data
  • 25. Building Secure WordPress Sites Step 9: Update Update and Update Recommendation: No Excuse Update your WordPress, Themes and Plugins
  • 26. Building Secure WordPress Sites Step 10: Install Security Plugins Recommendation: Better WP Security SucuriSitecheck Malware Scanner Secure WordPress BulletProof Security WP Security Scan
  • 27. Better WP Security: Hides • Remove the meta "Generator” tag • Change the urls for WordPress dashboard including login, admin, and more • Completely turn off the ability to login for a given time period (away mode) • Remove theme, plugin, and core update notifications from users who do not have permission to update them • rename "admin" account and Change the ID on the user with ID 1 • Change the WordPress database table prefix • Removes login error messages
  • 28. Better WP Security: Protects • Scan your site to instantly tell where vulnerabilities are and fix them in seconds • Ban troublesome bots and other hosts • Ban troublesome user agents • Prevent brute force attacks by banning hosts and users with too many invalid login attempts • Enforce strong passwords for all accounts of a configurable minimum role • Force SSL for admin page (on supporting servers) • Turn off file editing from within WordPress admin area • Detect and block numerous attacks to your filesystem and database
  • 29. Better WP Security: Detect • Monitor filesystem for unauthorized changes • Detect bots and other attempts to search for vulnerabilities Better WP Security: Recovery • Create and email database backups on a customizable schedule
  • 30. Resources for WordPress Security Security Related Articles • http://codex.wordpress.org/Hardening_WordPress • http://blog.sucuri.net/2012/04/lockdown-wordpress-a- security-webinar-with-dre-armeda.html • http://blog.sucuri.net/2012/04/ask-sucuri-how-to-stop-the- hacker-and-ensure-your-site-is-locked.html • http://catchinternet.com/blog/wordpress-security-tips/ Clean a Hacked Site • http://codex.wordpress.org/FAQ_My_site_was_hacked • http://www.marketingtechblog.com/wordpress-hacked/ • http://sakinshrestha.com/wordpress/fix-if-your-wordpress- site-is-hacked/
  • 31. Resources for WordPress Security Support Forums • Hacked: http://wordpress.org/tags/hacked • Malware: http://wordpress.org/tags/malware
  • 32. Building Secure WordPress Sites Sakin Shrestha Blog: http://sakinshrestha.com Email: [email protected] Twitter: @sakinshrestha