CAll Us: +1 888-999-8231 Submit Ticket

Four Ways to Win at PCI Compliance

Four Ways to Win at PCI Compliance If you’re an online merchant, and your store accepts credit cards as payment, then you’ve probably already heard the term PCI compliance. If you haven’t, then start here, and then come back to this post.

The Payment Card Industry Data Security Standard (PCI DSS) was created by banks and credit card companies to protect their cardholders. Failing compliance can result in fines ranging between $5,000 to $500,000. Add to that the probable loss of consumer confidence, civil litigation, and suspension of credit services, and the inconvenience of maintaining PCI compliance far outweighs the cost of ignoring it.

Here’s four ways to become and stay compliant. We can’t promise they’re easy, but we can promise they’re essential.

1. Read and understand the PCI DSS, or find someone that can

This is no easy task. The PCI DSS requirements document weighs in at a staggering 139 pages. The PCI Quick Reference Guide knocks it down to 40 pages, which is hardly convenient, but does suggest the PCI might have something close to a sense of humor (spoiler alert: they don’t).

So while we urge you to read it and try to understand all of it, many smart and successful people aren’t particularly qualified to do so. As your hosting company, we can provide some assistance, but only you or a third party hired by you can assess your systems. Find a Qualified Security Assessor (QSA), a security firm trained and certified by the PCI, to guide you through the labyrinth.

2. Use a PCI-compliant hosting provider

If you’re already a Hostdedi client, then you’re all set. While using us or another PCI-compliant host can’t alone make you PCI-compliant, we take great care to cover things on our end so you can focus on yours.

3. Make sure your developer is PCI-savvy

A knowledgeable developer can help bake compliance into your site. In addition, any third party with access to your systems should be following established best practices for security.

4. Do a self-assessment every year

Compliance is not a one-time requirement, and the PCI changes them every so often to address emerging threats. Take the time to complete the self-assessment questionnaire (SAQ) every year will help keep you current and committed. You can download a SAQ from the PCI DSS website.

Upon request, we also provide a PCI Responsibility Matrix that outlines exactly which standards are yours, which are ours, and which are shared. The document is available to Hostdedi clients through our Support Team, and makes it easy to answer questions about your web host.

It’s rigorous, but worthwhile – think of it as exercise for your PCI-compliance muscles. Put it on your calendar during your slowest month so you can face your busiest ones with confidence.

Earned, not given

PCI compliance is required by the industries holding the keys to the eCommerce kingdom. Moreover, the holidays are a stressful time for consumers, and their trust in your brand is your greatest asset. Defend it with vigor and vigilance, and you’ll likely never have to learn the cost of regaining that trust.

Posted in:
eCommerce, Security

Source link

Chrome 62 Will Extend “Not Secure” Warnings To All User Input

Chrome 62 Will Extend 'Not Secure' Warnings To All User Input

Photo by MichaelGaida on Pixabay

From October, Google’s Chrome browser will warn users that all non-HTTPS pages that ask for user input are insecure. If your site has forms that accept user input and doesn’t have an SSL certificate, you may see a reduction in conversions as Chrome users are discouraged from submitting information. Google Chrome has a market share of 64%, according to W3Counter.

HTTP is the protocol used by web browsers to communicate with websites. HTTPS — note the additional “S” at the end — is a secure version of HTTP. HTTPS uses SSL certificates validated by a Certificate Authority to encrypt data as it moves between the browser and the server on which a site is hosted. Data sent over an HTTPS connection cannot be intercepted by third-parties or modified as it traverses the network. HTTPS makes sure that no-one on the network — either the local network or the Internet — can intercept or interfere with data as it travels between the browser and the server.

Until recently, browsers displayed a warning for sites that had obvious security problems. Sites that allowed users to connect with HTTPS were considered secure. Sites without HTTPS were considered neutral — no warnings were displayed. Last year, Google announced a change in the way it viewed the security of web pages: all sites without HTTPS are now considered insecure. The only secure sites are those that have a valid SSL certificate.

Google and other browser developers didn’t immediately begin to flag all non-HTTPS sites as insecure, but they have gradually increased the scope of “Not secure” warnings. Since January, Chrome has displayed “Not secure” warnings for all non-HTTPS pages with credit card or password fields. With the expected release of Google Chrome 62 in October, the range of sites Chrome considers insecure will be extended to unprotected pages that take user input.

Any HTTP page on which users submit data will be considered insecure. That includes email submission forms, comments, and any other page with a form element.

The general trend towards increased security on the web makes sense. A few years ago, implementing HTTPS was beyond the technical capability of many; it was complex, expensive, and easy to get wrong. Today, with the wide availability of free SSL certificates from Certificate Authorities like Let’s Encrypt, setting up HTTPS is a breeze and there’s no real reason not to jump in with both feet.

In addition to pages on which users submit data, Google Chrome will display warnings on all HTTP pages visited in Incognito mode. Incognito mode is intended to keep a user’s browsing private. Pages that are served over HTTP can be viewed by users on the same network, defeating the purpose of browsing with Incognito mode turned on.

Google is likely to continue to increase the scope of “Not secure” warnings. They will eventually be displayed for any web page that is not served over an HTTPS connection.

Posted in:
Security, Webmaster

Source link

Why Do Spammers Attack WordPress Sites?

Why Do Spammers Attack WordPress Sites?

Photo by Ricardo Viana on Unsplash

A WordPress site with web-facing forms will be spammed. If there’s a form to be filled in, it will be filled in by spammers, even when there is no clear motivation for doing so. Spammers register for membership of any site they find, they fill in forms for gated content, they submit fake email addresses that clutter mailing lists, they take surveys, and they bombard comment forms with gibberish and SEO spam.

Spam is more than an annoyance: it skews the data web-based businesses have available to them, lands the site’s domain on email blacklists when it sends mail to people who didn’t sign up, presents a security risk, consumes hosting resources, and makes a mess. All of which takes time and money to deal with.

I’ve discussed spam registrations and random form-filling with many WordPress users, and a common question is why do spammers do it? What benefit does the spammer get from signing up to a membership site or submitting fake addresses to a mailing list? It’s hard to work out from the point of view of site owners because often there is no real benefit to the spammers.

WordPress spammers hope to find sites that let them send spam emails, submit spam comments, publish spam posts, or to join the site as a prelude to a deeper attack. All of this web form spamming is automated. Simple bots scour the web for forms to fill in. It’s not difficult to automate the filling in of web forms: the bots are unsophisticated and the spammers aren’t skilled developers. Because bandwidth is cheap, it’s easier to spam every form than it is to be selective. So, if a form has an email field, they’ll put an email in it, a name field gets a name, and so on.

In many cases, WordPress sites are spammed as a side effect. If the site is properly secured, the spammers don’t gain anything, but they don’t lose anything either, and in the morally challenged mind of the spammer, that means building more sophisticated bots isn’t worth the effort.

All of which is interesting, but it doesn’t help WordPress site owners handle spam. The only way to stop spam data reaching databases is to implement systems that can distinguish between authentic submissions and junk — preferably without asking users to jump through hoops to demonstrate their status as a human being.

The best way to filter out spam today is Google’s most recent iteration of reCaptcha: Invisible reCaptcha. Old versions of reCaptcha asked users to carry out vision-based tasks that were easy for humans and difficult for machines. This system annoyed users and is based on an outdated assumption: in 2017, sophisticated machine vision is accessible, accurate, and inexpensive. Invisible reCaptcha uses a mixture of on-page behavior and data analysis to automatically categorize visitors as bots or humans in a way that is largely transparent to users. If you’re having WordPress spam problems, take a look at the Invisible reCaptcha for WordPress plugin.

Posted in:
Security, WordPress

Source link

How Two-Factor Authentication Can Help Keep Your WordPress Site Safe

How Two-Factor Authentication Can Help Keep Your WordPress Site Safe

Image by RLJ Photography NYC

There are lots of hacked WordPress sites on the web. Hacked sites are often the victims of botnets that brute force the login process, trying lots of different combinations of usernames and passwords until they hit one that lets them in. After they have access they can plant malware or other undesirable content on a site.

The success of this sort of attack has almost nothing to do with the security of WordPress itself and everything to do with the behavior of WordPress users. In principle, username and password combinations are a very safe way of securing a site. In practice, people don’t understand how to use passwords properly and value convenience over security. If they can get away with having “pa55word” or an equally guessable combination as their password, many will.

We can rail against this sort of complacency all we like, but as responsible site owners we just have to accept lax password security as a part of the landscape. Education helps, but not much; we need to implement other mechanisms for ensuring that our sites don’t fall when the botnets come knocking.

Usernames and passwords work because the number of possible combinations is enormous. For a sufficiently long, complex, and random password, it would take even the most powerful computer many years to hit on the right combination. For a sufficiently simple password, it can take fractions of a second. If users aren’t willing to use random and complex passwords, the solution is to implement another verification mechanism — a second factor – that will ensure the chances of guessing a valid combination remain remote.

There are various ways of implementing two-factor authentication — biometrics such as fingerprinting are one, but that’s more complex to implement than the method I’m about to suggest, one-time passcodes.

Unlike a password, a one-time passcode works for a short amount of time, usually about 30 seconds. The TFA service and the user share a secret — frequently a long string of numbers — which is used in combination with the time to create a unique passcode known to the TFA service and the user without it ever having to be communicated between them. It’s much safer than using passwords alone and because the choice of passcode isn’t up to the user, they can’t circumvent security by using an easily guessable combination.

The typical scenario would go as follows: the user wants to log in to your WordPress site. They enter their username and password, after which they are asked for a further passcode. They will have an application from the TFA service provider installed on their smartphone or a dedicated device, which will generate a passcode that can only be used for a short time. When they enter the passcode correctly, they are logged in.

There are a several good TFA services that integrate well with WordPress, but I’m going to suggest you take a look at two: Duo Security and Authy 2FA.

If you run a multi-user WordPress site, particularly if you have several admin users, implementing two-factor authentication will make it almost impossible for casual brute-force attackers to successfully breach your site. It’s well worth the minimal effort to avoid the risk of becoming a vector for malware or a hacker’s playground.

Posted in:
Security, WordPress

Source link

Invisible ReCAPTCHA Identifies Humans Without Annoying Them

Invisible reCAPTCHAGoogle’s new Invisible reCAPTCHA system can reduce the amount of spam submitted to WordPress sites without asking users to decipher obscure images, click a button, or even be aware that their “humanness” has been tested at all.

Spam continues to be a huge problem for WordPress sites with forms, including comment forms. Whenever a site publishes a form on the web, it’s hammered by spambots that submit fake information. Typically, forms collect far more spam than authentic data, and site owners have to use spam filtering tools to sort the wheat from the chaff.

Spambots and automated scrapers attack any login or registration form they can find to harvest email addresses, steal content, and even use stolen credentials to gather information for identity theft.

The original reCAPTCHA system was, for its time, a novel and useful solution to the problem of distinguishing humans from bots and scripts. reCAPTCHA displayed difficult-to-read images of text. Humans didn’t have much trouble reading them and entering what they said into a text box. Bots simply weren’t sophisticated enough to pass the test. But, in the last few years, advances in machine learning and image recognition have made it possible to defeat the original reCAPTCHA without a human.

The main problem with the original reCAPTCHA was that users hated it. I know I was never thrilled to be asked to squint at a barely legible scribble every time I wanted to log into a site. It wasn’t just an annoyance, though. reCAPTCHA discouraged users from completing forms and registering for services, negatively impacting conversion rates.

Although a small number of sites — frustratingly — still use a version of the old reCAPTCHA system, most have moved to the more recent iteration which asks users to click a checkbox to assert that “I’m a human”. The newer reCAPTCHA’s uses sophisticated algorithms to analyze mouse movement and other factors to determine whether the user is human.

The new Invisible reCAPTCHA system goes a step further. Users don’t have to do anything to prove they are human other than behave like a human. Invisible reCAPTCHA has no user-facing interface. The work of identifying humans is done in the background as the user interacts with a web page. Google is being tight-lipped about how the new system works, only saying that it uses “advanced risk analysis technology to separate humans from bots”.

It’s likely Google is using its machine learning and artificial intelligence expertise, huge quantities of data about how humans and bots behave, and threat data about bot networks to develop sophisticated pattern recognition algorithms that can discriminate humans from bots.

At the time of writing, Invisible reCAPTCHA is still in Beta, but it can be used on WordPress sites with the excellent Invisible reCaptcha for WordPress plugin. For developers, Invisible reCAPTCHA is relatively straightforward to implement, as Google details on its help pages.

Posted in:
Security, Webmaster

Source link

What Do WordPress File Permissions Mean?

WordPress SecurityA WordPress site is made of files. Database aside — which is a special set of files — everything else is a chunk of data stored on the server’s file system. That includes content like images and the executable PHP files that comprise WordPress Core, themes, and plugins.

It’s vitally important that only the right people and programs — represented by user accounts on the server — have access to those files. If every user on a server has access to all the files, there’s no end to the mischief they could make, and that’s before considering unauthorized users like hackers.

If you just want to know about sensible permissions for your WordPress site’s files, skip to the last paragraph. If you want to understand how permissions work, read on.
Most WordPress sites run on Linux servers, and the Linux operating system has a permission mechanism that controls who can read from, write to, and execute files. It’s useful for WordPress users to understand how these permissions work, because assigning the wrong permissions can leave a site open to security problems or stop it working altogether.

The permissions are stored as attributes. Each file has attributes for its owner, group, and everyone else.

Owner, Group, The World

The owner is a single user account on the server. The user account doesn’t have to be associated with a particular person: user accounts are often created for programs (the web server owns some files, for example) and the root user automatically has permission to do anything with any file.

In addition to belonging to a user, a file also belongs to a group. A group is a set of user accounts that can be given permission to interact with a file. For example, you might have a group of user accounts who can write to a file, but only allow the owner to execute it.

Finally, there’s the “world” or everyone else on the server, which allows for the setting of permissions that cover all user accounts.

Each of these types of user — the owner, group members, and the world, can have three levels of access: read, write, and execute. So, a file might have permissions that allow the world and the file’s group to read and write to it, but only allow the owner to execute it.

There are two ways file permissions are displayed. You’ve probably come across notations that look like 744 or drwxrw-rw-. Let’s look at the last of these first. It’s easy enough to understand if you’ve followed what we’ve talked about so far. The first letter (“d” in this case) represents access modes for the file, which we’re not going to get into here.

The rest of the string — rwxrw-rw- — is split into groups of three, with each triplet referring to the permissions of the owner, the group, and the world respectively. In our example, the owner has read(r), write(w), and execute(x) permissions. The group has read and write permissions, and so does the world.

Now to the other notation, which is the one you’re most likely to see in articles discussing WordPress. If we take 744 as an example: the numbers refer to the owner, group, and world permissions. The 7 is for the owner, the first 4 for the group, the second for everyone else.

Each of those numbers represents read, write, and execute permissions. No permission is worth 0, execute permission is worth 1, write permission is worth 2, and read permission is worth 4. Adding those numbers together gives you the permission for each of the sets of users.

This can be hard to get your head around, but it makes sense after seeing a few examples. Consider 744. The 7 is for the owner, and the only way to get a 7 given what we’ve seen is to add execute(1), write(2), and read(4) together. The second number — the group permission — is 4. That has to be a read-only permission. If, for example, it was a 6, it would indicate read(4) and write(2) permissions.

The permissions on files can be changed from the command line using the chmod utility. You can look at chmod’s manual page for full details, but to set a file’s permissions to 766 you’d run this command:

chmod 766 file.php

Finally, which permissions should your WordPress files have? The best defaults are 775 for directories and 644 for files. I haven’t really discussed directory permissions here, but the the basics principles are the same. These are are relatively safe defaults, providing file ownership permissions are properly set, as is discussed in the WordPress Codex.

Posted in:
Security, WordPress

Source link

Three WordPress Theme Red Flags You Should Know About

Red FlagsOne of the WordPress ecosystem’s most attractive features is its endless variety of themes. Thousands of developers have created tens of thousands of themes, many of them free. There’s almost certainly a theme in the official repository or premium marketplaces to suit any style or functional requirement.

For the most part, that’s a good thing, but finding and choosing the right theme from the thousands available is no easy task. Developers and designers range from the slipshod to the expert, and themes vary in quality accordingly. In addition to which, developers are incentivized to create themes and demo pages that look incredible, but that can prove disappointing in real-world use.

It’s useful for WordPress users to have a simple set of questions they can ask themselves before choosing a theme. At the risk of being negative, I want to focus on reasons a user shouldn’t choose a theme. Rejecting themes is an essential part of the process of selecting the right theme, so let’s take a look at three red flags that cause me to walk away.

It’s Slow

A fast website depends on two fundamental components: performance-optimized hosting and a speedy front-end. There’s a lot a theme can do to make a site slow even if it’s hosted on the fastest server. In fact, some of the most feature-rich and impressive themes are guilty of this: the demos look awesome, but that’s because they’re packed with so much poorly optimized JavaScript that site visitors are left twiddling their thumbs.

Respected designer Ethan Marcotte tested a number of prominent theme demo pages, and found them to be unacceptably slow, particularly on mobile devices. Some of the themes he tested took 90 seconds to load. If you want a front-end that doesn’t embarrass your back-end, run demo pages through a performance-testing service like WebPageTest or Pingdom tools before you install the theme on your site.

It’s Old

When I choose a WordPress theme, I expect to be able to use it for a couple of years at least. I want to be confident that a theme will be maintained and updated while I’m using it. I don’t want to be stuck with a theme that is incompatible with the most recent versions of WordPress.

Of course, there’s no guarantee that a developer won’t abandon a theme a month after I start using it, but I automatically reject any theme that doesn’t have a pattern of regular updates. If it’s a new theme without much of a history, I take a look at the developer’s other themes to see how often they are updated.

Poor Customer Support

Finally, I take a look at the developer’s support channels to see how responsive they are to support requests. This is especially important for premium themes — if I intend to use a free theme then I’m willing to accept that the developer doesn’t owe me anything, including their time. But if I pay for a theme, I want to see evidence that the developer quickly and politely responds to support requests. If I visit their support forums and the only thing moving is a tumbleweed, I’m likely to look elsewhere.

There are thousands are elegant, feature-rich themes available for WordPress, created by talented developers and designers who care about giving their customers the best possible experience. If you know what you’re looking for (and what to avoid) you’ll have no trouble finding a great-looking theme that you can rely on for years to come.

Posted in:
Security, WordPress

Source link

Keyy Is A Clef Replacement For Intuitive WordPress Two-Factor Authentication

KeyyMany WordPress users were disappointed to hear that two-factor authentication provider Clef is shutting down. Clef was popular with WordPress site owners because it let them add an extra layer of security to their site without the complexity associated with other two-factor authentication systems. With over a million installations, the loss of Clef was a serious blow to WordPress site owners.

In March, the team behind the UpdraftPlus backup service announced that they planned to step into the space vacated by Clef. Their brand new two-factor authentication service, Keyy, is now live, and it has many of the same features as Clef.

For those who are unfamiliar with two-factor authentication, it allows site owners to demand an identifying credential in addition to the usual username / password combination. Username and password combinations can be very secure, but in the real world they tend to be a liability. Users often fail to choose a secure password, they may use the same password on more than one site, or otherwise make the life of criminals easier than it should be.

To take a common example, simple passwords can often be quickly cracked by brute-force bots. Many WordPress sites are compromised because an admin user picked “pa55word” as their password, or an equally guessable combination.

The second factor of authentication is typically associated with an item in the possession of a user: a smartphone or dedicated device that displays a one-time code. In addition to their username and password, the user has to enter the code presented to them by the authenticated object in their possession.

It’s much harder for attackers to compromise a site using two-factor authentication, but many users find the process of logging in with two-factor authentication overly burdensome. Clef, on the other hand, was supremely easy to use, as is Keyy.

With Keyy, users don’t have to enter usernames, passwords, or one-time codes. Instead, when they are ready to log in, users are shown a graphic which they scan with the Keyy app on their phone. Keyy works in essentially the same way Clef did. The app on the user’s smartphone creates a public key pair, the private part of which remains on the device, while the public key is shared with Keyy’s server. When the user wants to log in, the Keyy service generates an image tied to the session. The app scans that image and signs it with the private key before sending it to the Keyy servers, which verify the user has possession of the private key and logs them in using OAuth.

Clef provided other services like single-sign on, which aren’t available yet with Keyy, but the company plans to launch an SSO service in the coming months.

It’s worth mentioning that Keyy is a very new service, and it may be subject to the occasional glitch as the team works out the kinks. But it’s great to see an established and sustainable WordPress company with a track record of successful WordPress services step up to provide such an important security service.

Posted in:
Security, WordPress

Source link

XSS Vulnerabilities Have Been Found In The Avada WordPress Theme

AvadaIt has recently come to light that several critical vulnerabilities were fixed in the Avada theme in April, although ThemeFusion, the developers of the theme didn’t widely announce the patched release until several weeks later. If you use the Avada WordPress theme on your site, you should upgrade to Avada 5.1.5 as soon as possible.

The Avada theme is among the most popular themes on ThemeForest, and its developers boast that it’s been the single most popular paid WordPress theme for four years in a row. That means tens of thousands of sites could be vulnerable until they update to the most recent version.

It’s unusual for a developer to release a fix for a known vulnerability and then to decline to publicize it. Although information about the patch was available in the release’s changelog, it’s unlikely that many of the theme’s users avidly read changelogs.

Typically, a developer wants as many people as possible to update as soon as possible when a security vulnerability is discovered, although they may choose not to disclose the exact details of the vulnerability. The average user may not scrutinze changelogs, but it’s a fair bet that hackers and criminals do, which means there’s little benefit to keeping quiet about the existence of a security problem.

But regardless of the wisdom of waiting, a full explanation of the vulnerabilities along with code examples is widely available now. The smart choice is to update all sites using the Avada theme before they’re targeted.

The details of the vulnerability can be read about on WordPress Hütte, but the nutshell version is that several cross-site scripting and cross-site request forgery vulnerabilities were discovered by a security researcher. Both are common critical vulnerabilities in web applications that can potentially be used by an attacker to take over a WordPress site or exfiltrate private data.

We’ve discussed cross-site scripting vulnerabilities on this blog before because they’re the number one security problem on the web. Cross-site scripting is caused by a failure to properly sanitize user input. The protoypical cross-site scripting attack occurs when an attacker submits code to a web form and that code is displayed somewhere on a web page without being rendered inert. When a browser loads the page, it executes the code, which is very bad news if the browser belongs to a user with admin privileges.

Cross-site request forgeries are a little more involved, but — as with XSS attacks — they can be used by an attacker to execute arbitrary code in the trusted context of a browser. Attackers often use CSRF vulnerabilities in conjuntion with social engineering attacks or phishing attacks against existing trusted users to make sites perform an action, like create an admin user with a password the attacker knows.

In conclusion, upgrade Avada now, because it won’t be long before hackers start looking for sites they can exploit with these vulnerabilities.

Posted in:
Security, WordPress

Source link

What Is SEO Spam Malware And How Can It Hurt Your WordPress Site?

SEO Spam MalwareBlack Hat SEOs and hackers are keen to find resources to exploit. A badly secured WordPress site makes a juicy target, and criminals use such sites for nefarious activities ranging from botnets to ransomware distribution. Of late, there has been a rise in a different sort of attack: SEO Spam Malware.

What Is SEO Spam?

SEO spam, also known as spamdexing, is the attempt to manipulate search indexes so that they include content they otherwise wouldn’t. Black Hat SEOs want to spam search engine results with content that doesn’t deserve either to be included at all or included in a prominent position.

The familiar and old-fashioned technique of keyword stuffing is a form of SEO spam, as are link spamming comment threads and forums, doorway pages, and every other technique for giving web pages an undue prominence in search results.

The motivations are clear: search is responsible for a substantial proportion of valuable referrals. SEO spammers and their clients want a piece of the pie, but they don’t want to do the work it takes to legitimately secure a place in the SERPs.

SEO Spam And Malware

SEO malware is malicious software that, once in place on a server, modifies or creates web pages that serve the interest of a spammer. An unsophisticated example would be a simple script that adds hidden links to an eCommerce store to the footers of infected sites. More sophisticated examples might add thousands of new pages to a site.

In a recently prominent example, attackers took over WordPress sites and used malware to create brand-new sites in the root directory of the server. Those sites were made available at subdomains of the legitimate site.

Y

ou might think SEO spam would be easy to spot, but that isn’t always the case. Spammers go to great lengths to hide their work, and often the malware is coded so that the spam is only shown to search engine crawlers. Ordinary visitors — including the site’s owners — only see the legitimate content.

Is Your Site Infected With SEO Malware?

There are some obvious clues that a site has been infected with SEO malware. If you check incoming search referrals in Google Analytics and see clearly unrelated search terms, it’s a strong indicator. So, if your site is a blog about woodworking and you suddenly see an influx of traffic with search terms like “cheap gucci shoes”, you’ve got a problem.

It’s entirely possible Google will become aware a site has been compromised before its owners, so you may well find out about it when Google emails you or your users let you know that web browsers are throwing up a security warning.

Of course, if your site has been compromised with SEO spam, you want to know about it as soon as possible. A WordPress security plugin with malware scanning can help. Sucuri and WordFence are prominent examples.

Keep Malware Out

The best way to fight malware is to make sure your site can’t be compromised in the first place. There’s no such thing as a completely secure site, but if a site is kept up-to-date, uses long and random passwords, or, even better, 2-Factor Authentication, the chances of being compromised are substantially reduced.

Posted in:
Security

Source link