<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - GIWS Blog</title>
	<atom:link href="https://blog.giws.us/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.giws.us/category/security/</link>
	<description>Website Speed Optimization Tips, News Info From The Official GIWS Blog. At GIWS It&#039;s Our Speed, Your Success.</description>
	<lastBuildDate>Fri, 29 Dec 2023 19:37:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>

<image>
	<url>https://blog.giws.us/wp-content/uploads/2023/12/favicon.png</url>
	<title>Security Archives - GIWS Blog</title>
	<link>https://blog.giws.us/category/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The 5 Most Common WordPress Attacks (And How to Prevent Them)</title>
		<link>https://blog.giws.us/the-5-most-common-wordpress-attacks-and-how-to-prevent-them/</link>
					<comments>https://blog.giws.us/the-5-most-common-wordpress-attacks-and-how-to-prevent-them/#respond</comments>
		
		<dc:creator><![CDATA[GIWS]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 19:29:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://blog.giws.us/?p=1872</guid>

					<description><![CDATA[<p>Cybersecurity is a perennial hot topic, more so today than ever before. As a WordPress site owner, it is highly important to&#160;go big on security&#160;and do your best to protect your site against any form of attack now or in the future. WordPress&#160;is inherently a&#160;highly-secure platform. The security team is made up of a number...</p>
<p>The post <a href="https://blog.giws.us/the-5-most-common-wordpress-attacks-and-how-to-prevent-them/">The 5 Most Common WordPress Attacks (And How to Prevent Them)</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity is a perennial hot topic, more so today than ever before. As a WordPress site owner, it is highly important to&nbsp;go big on security&nbsp;and do your best to protect your site against any form of attack now or in the future.</p>



<p>WordPress&nbsp;is inherently a&nbsp;highly-secure platform. The security team is made up of a number of experts who work hard to deal with security concerns at every new update. However, no site is totally safe, which means there are still vulnerabilities you’re liable to experience.</p>



<p>In this article, we’ll consider five of the most common WordPress security threats and how to prevent them using the best practices. Let’s go!</p>



<h2 class="wp-block-heading" id="h-how-we-ve-chosen-the-most-common-wordpress-attacks">How We’ve Chosen the Most Common WordPress Attacks</h2>



<p>For the purpose of this article, we’ll be basing our advice on the&nbsp;Open Web Application Security Project (OWASP)&nbsp;ranking. Since 2001, OWASP has been an integral part of the promotion of security and trustworthiness online. They are a nonprofit foundation that works hard to improve software integrity on the internet.</p>



<p>The project sets a clear goal of comprehensive data collection and achieves it by leveraging the OWASP Azure&nbsp;Cloud Infrastructure&nbsp;to collect, analyze, and store data contributed. In essence, volunteers can simply contribute data by sending a CSV/Excel file by email or uploading it to a contribution folder.</p>



<p>OWASP uses this data collection and analysis system to compile a list of the&nbsp;<a href="https://owasp.org/www-project-top-ten/" target="_blank" rel="noreferrer noopener">Top Ten</a>&nbsp;security risks sites encounter regularly. With about 275 local chapters worldwide, the project has grown a reputation for helping organizations to develop and&nbsp;maintain trustworthy software applications.</p>



<h2 class="wp-block-heading" id="h-the-5-most-common-wordpress-attacks-and-how-to-prevent-them">The 5 Most Common WordPress Attacks (And How to Prevent Them)</h2>



<p>If your WordPress site’s security is a priority, this list will help you to know the attacks to look out for and how to prevent them. Let’s begin!</p>



<h3 class="wp-block-heading" id="h-1-injection-flaws">1. Injection Flaws</h3>



<p>The most prominent vulnerability you’re likely to encounter on your WordPress site is a code injection flaw. You mostly&nbsp;experience an injection&nbsp;when your site lets users enter data through a vulnerable entry point, such as a contact or login form.</p>



<p>When the data entered is not ‘validated’, you can be susceptible to this attack.&nbsp;<a href="https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection" target="_blank" rel="noreferrer noopener">SQL injections</a>&nbsp;are the most common but other types such as NoSQL, OS, and LDAP injections may also be an issue.</p>



<p>Injection flaws often lead to access denial, data loss and corruption, disclosure to unauthorized parties, and even total host takeover.</p>



<p>The best&nbsp;<a href="https://www.malcare.com/blog/how-sql-injection-attack-works-on-wordpress-sites/" target="_blank" rel="noreferrer noopener">approach to prevent injection</a>&nbsp;involves separating commands from queries on your site. WordPress developers can use certain SQL controls&nbsp;<a href="https://www.w3schools.com/sql/sql_top.asp" target="_blank" rel="noreferrer noopener">such as&nbsp;<em>LIMIT</em></a>&nbsp;to prevent this. Site owners can also take advantage of&nbsp;security plugins&nbsp;(such as&nbsp;<a href="https://www.malcare.com/" target="_blank" rel="noreferrer noopener">Malcare</a>) to keep their websites protected.</p>



<h3 class="wp-block-heading" id="h-2-broken-authentication">2. Broken Authentication</h3>



<p>Broken authentication occurs when there’s a vulnerability in the implementation of identity and session controls. The strength of a site’s&nbsp;authentication control&nbsp;is highly dependent on session management.</p>



<p>If this is not implemented properly, hackers can compromise your keys, passwords, and session tokens. In most cases, you may end up suffering identity theft, social security fraud, and disclosure of highly sensitive information.</p>



<p>If you want to minimize the risk of broken authentication, you should implement&nbsp;multi-factor authentication&nbsp;on your site. What’s more, look to replace the&nbsp;default credentials&nbsp;you’re given when creating a new WordPress site. Weak password checks should also not be an option, especially for admin users.</p>



<h3 class="wp-block-heading" id="h-3-cross-site-scripting-xss-attacks">3. Cross-Site Scripting (XSS) Attacks</h3>



<p>Very similar to injection attacks,&nbsp;<a href="https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A7-Cross-Site_Scripting_(XSS)" target="_blank" rel="noreferrer noopener">XSS attacks</a>&nbsp;occur at entry points into site – such as user input fields. These attacks happen when automated applications detect any form of XSS on your site. It can be exploited to sneak untrusted data into a new page that lacks proper validation or an existing one through user-inputted data.</p>



<p>Cross-site scripting lets the attacker execute code remotely within the victim’s browser. This way, they can either steal their credentials or deliver malware. You can prevent an XSS attack by making use of two strategies.</p>



<p>The first strategy is to ensure that network requests generated from one page doesn’t gain access to data on another. Likewise, your website must be able to differentiate between regular input and malicious code. Frameworks such as React JS escape this attack by design.</p>



<p>Generally, preventing XSS attacks starts with&nbsp;<a href="https://www.wordfence.com/learn/how-to-prevent-cross-site-scripting-attacks/" target="_blank" rel="noreferrer noopener">good development practices</a>. For a site owner, choosing a&nbsp;strong, secure theme&nbsp;is vital.</p>



<h3 class="wp-block-heading" id="h-4-sensitive-data-exposure">4. Sensitive Data Exposure</h3>



<p>Sensitive data exposure can be considered a data breach. When&nbsp;<a href="https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A3-Sensitive_Data_Exposure" target="_blank" rel="noreferrer noopener">sensitive data</a>&nbsp;is being transferred or stored on your site, you must put adequate measures in place to ensure that hackers can’t lay their hands on it. Otherwise, if exposed, attackers can steal passwords, credit card details, session tokens, and much more besides.</p>



<p>Apart from putting your own sensitive data at risk, your&nbsp;site visitors can also be victims. This is why you must do your best to keep data secure on your site.</p>



<p>In a bid to escape this type of attack, it is important that you never store data in plain text or accept data sent over non-HTTPS connections. For site owners, a&nbsp;suitable SSL certificate&nbsp;can help you encrypt the most sensitive data across networks.</p>



<h3 class="wp-block-heading" id="h-5-xml-external-entities-xxe">5. XML External Entities (XXE)</h3>



<p>This type of attack arises due to old or poorly managed&nbsp;<a href="https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A4-XML_External_Entities_(XXE)" target="_blank" rel="noreferrer noopener">eXtensible Markup Language (XML) processors</a>. These evaluate references to external entities within XML documents. In the process, an attacker can exploit an incorrectly configured XML parser that accepts XML directly or through XML upload. In other words, they can now access any XML input that makes references to external entities.</p>



<p>XXE can be used to execute a&nbsp;Denial of Service (DOS) attack, extract your data, or even implement a remote request from your server as well. Developer expertise goes a long way in identifying and dealing with XML external entities.</p>



<p>To prevent this attack as an end user, you’ll want to keep your core WordPress installation up to date. XXE concerns are usually at a fundamental code level, and are patched during version updates of core software.</p>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>While the core WordPress software is continually updated to mitigate major security threats, plugins and themes can be a major source of concern for users – especially if they’re poorly coded. In essence, the more attention you pay to your&nbsp;site’s security, the less the probability of having to deal with these issues.</p>



<p>In this post, we’ve looked at five of the most common WordPress attacks today. Let’s recap them quickly:</p>



<ol>
<li>Injection flaws</li>



<li>Broken authentication</li>



<li>Cross-site scripting (XSS) attacks</li>



<li>Sensitive data exposure (SSL Certificates&nbsp;can help avoid this)</li>



<li>XML external entities (XXE)</li>
</ol>
<p>The post <a href="https://blog.giws.us/the-5-most-common-wordpress-attacks-and-how-to-prevent-them/">The 5 Most Common WordPress Attacks (And How to Prevent Them)</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.giws.us/the-5-most-common-wordpress-attacks-and-how-to-prevent-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Security Checklist for Web Developers (5 Points)</title>
		<link>https://blog.giws.us/a-security-checklist-for-web-developers-5-points/</link>
					<comments>https://blog.giws.us/a-security-checklist-for-web-developers-5-points/#respond</comments>
		
		<dc:creator><![CDATA[GIWS]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 18:41:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips]]></category>
		<guid isPermaLink="false">https://blog.giws.us/?p=1837</guid>

					<description><![CDATA[<p>No matter how strong your development skills are, having a web security checklist is crucial. It’s common for web professionals to pay more attention to design, functionality, and other immediate concerns. However, if your top-tier solutions aren’t secure, you’ll have a hard time keeping clients. With the&#160;increasing menace of hackers&#160;online, web security has become an...</p>
<p>The post <a href="https://blog.giws.us/a-security-checklist-for-web-developers-5-points/">A Security Checklist for Web Developers (5 Points)</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>No matter how strong your development skills are, having a web security checklist is crucial. It’s common for web professionals to pay more attention to design, functionality, and other immediate concerns. However, if your top-tier solutions aren’t secure, you’ll have a hard time keeping clients.</p>



<p>With the&nbsp;<a href="https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50" target="_blank" rel="noreferrer noopener">increasing menace of hackers</a>&nbsp;online, web security has become an even hotter topic than ever before. This is why you’ll want to provide&nbsp;secure authentication&nbsp;and encrypt all connections on your web development projects, along with following other best practices.</p>



<p>In this post, we’ll share a web security checklist for developers to help foolproof your applications. However, we’ll first quickly examine why security should be a top priority. Let’s get started!</p>



<h2 class="wp-block-heading" id="h-why-web-security-is-important-in-development">Why Web Security Is Important in Development</h2>



<p>It’s estimated that a cyberattack occurs somewhere on the internet&nbsp;<a href="https://www.securitymagazine.com/articles/87787-hackers-attack-every-39-seconds" target="_blank" rel="noreferrer noopener">every 39 seconds</a>. What’s more, about&nbsp;<a href="https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#zoom=50" target="_blank" rel="noreferrer noopener">68 percent of business leaders</a>&nbsp;feel their cybersecurity risks are increasing. When malicious software infects a website, it can easily gather data or even hijack all its computer resources.</p>



<p>In other words, attackers can gain access to sensitive data that belong to both existing and new site visitors. Apart from stealing their information, automated hacking tools can also infect computers. Due to the&nbsp;<a href="https://www.av-test.org/en/statistics/malware" target="_blank" rel="noreferrer noopener">thousands of new malware</a>&nbsp;created daily, you’ll need to stay at the top of your game to keep your site – and your clients’ – continuously protected.</p>



<p>The financial impact of web attacks is significant as well. It’s generally way more expensive to carry out a site cleanup that it is to keep online assets protected. Since a lot of user information is at risk during cyberattacks, companies stand to lose huge sums of money in the process.</p>



<p>In fact, data breach costs are now said to exceed&nbsp;<a href="https://www.computerweekly.com/news/450412041/Data-breach-costs-exceed-20-of-revenue" target="_blank" rel="noreferrer noopener">20 percent of a business’ revenue</a>&nbsp;on average. It’s also believed that cybercrime will cost the world approximately&nbsp;<a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/" target="_blank" rel="noreferrer noopener">$6 trillion dollars by 2021</a>. Even if you manage to contain the financial and technical damages caused by cyberattacks, your customer base will still be affected negatively.</p>



<p>On average, it takes about&nbsp;<a href="https://www.ibm.com/security/data-breach" target="_blank" rel="noreferrer noopener">314 days</a>&nbsp;to fully contain a data breach. Your site may be down most of this time and your&nbsp;customer loyalty and credibility&nbsp;will take a significant hit. Some organizations lose&nbsp;<a href="http://telecom.economictimes.indiatimes.com/news/organisations-lose-customers-revenue-and-business-over-cybersecurity-breach-cisco-2017-acr/56998824" target="_blank" rel="noreferrer noopener">as much as 20 percent</a>&nbsp;of their customer bases in the process.</p>



<p>With all these important factors at risk, it becomes imperative to pay close attention and protect your projects. Let’s consider the standard web security checklist we recommend you follow in order to maintain a tight ship.</p>



<h2 class="wp-block-heading" id="h-a-security-checklist-for-web-developers-5-points">A Security Checklist for Web Developers (5 Points)</h2>



<p>Building your clients’ websites with security in mind will save you, your clients, and their sites’ end-users a great deal of trouble. Here’s a five-point web security checklist that can help you keep your projects secure.</p>



<h3 class="wp-block-heading" id="h-1-choose-a-secure-web-host">1. Choose a Secure Web Host</h3>



<p>The security of your websites and applications begins with your web host. It’s almost impossible to have a secure project if your provider doesn’t use hardened servers and properly managed services.</p>



<p>When choosing a web host, it’s important to compare your options based on how well they manage their servers and what tools they offer to safeguard your projects. Although it’s almost impossible to offer 100 percent assurance, a secure provider will generally provide the following:</p>



<ul>
<li>Secure Operating System (OS) and software</li>



<li>Reliable backups and restore functionality</li>



<li>Support for Secure Sockets Layer (SSL) protocol</li>



<li>Industry-standard uptime</li>



<li>Malware scanning and protection</li>



<li>Distributed Denial of Service (DDoS) attack mitigation</li>



<li>Firewall implementation</li>
</ul>



<p>Typically, web hosts enlist&nbsp;SSL certificates&nbsp;as one of their main offers. This feature is critical for encrypting the connection between your website’s server and visitors’ browsers. Another feature your web host must include is the ability to scan for malicious software.</p>



<p>For e-commerce site owners, it’s important to consider your web host’s compliance with the Payment Card Industry&nbsp;<a href="https://www.pcisecuritystandards.org/" target="_blank" rel="noreferrer noopener">(PCI) security standard</a>. This protects customers’ information for all types of card payments. If your host does not support it directly, then it must be compatible with other third-party providers of&nbsp;PCI-compliant shopping cart APIs.</p>



<h3 class="wp-block-heading" id="h-2-encrypt-all-connections-and-secure-user-logins">2. Encrypt All Connections and Secure User Logins</h3>



<p>Once you’ve chosen a secure web host, the next point you need to consider is encrypting all your connections. This is especially important for websites that require any form of registration or transaction.</p>



<p>As we already mentioned,&nbsp;using an SSL certificate&nbsp;is a prime place to start. You can further secure your site by implementing&nbsp;Hypertext Transfer Protocol Secure&nbsp;(HTTPS).</p>



<p>Protecting pages requiring authentication should also be a major priority. Incorporate a highly protective password standard that requires users to register with secure credentials.</p>



<p>It is also important to store passwords on your site using strong encryption.&nbsp;<a href="https://auth0.com/blog/hashing-in-action-understanding-bcrypt/" target="_blank" rel="noreferrer noopener">Technologies such as ‘bcrpyt’</a>&nbsp;make it impossible to retrieve passwords in the event of a data breach.</p>



<p>Likewise, if auto-registration is enabled on your site, be sure to provide only unique, unpredictable usernames. Other equally important factors to consider include&nbsp;<a href="https://www.oauth.com/" target="_blank" rel="noreferrer noopener">OAuth implementation</a>&nbsp;and&nbsp;<a href="https://postmarkapp.com/guides/password-reset-email-best-practices" target="_blank" rel="noreferrer noopener">password reset tokens</a>.</p>



<h3 class="wp-block-heading" id="h-3-use-a-web-application-firewall-waf">3. Use a Web Application Firewall (WAF)</h3>



<p>A WAF is an extremely powerful tool that can save you and your business a great deal of hassle. It’s very useful for detecting and preventing attacks, especially from automated bots.</p>



<p>The primary use of a firewall is to monitor Hypertext Transfer Protocol (HTTP) traffic, which is significantly more susceptible to security risks than HTTPS traffic.&nbsp;Our ModSecurity&nbsp;firewall and similar tools efficiently mitigate common attacks such as SQL injections, Cross-Site Scripting (XSS), cross-site forgery, and more.</p>



<p>In essence, when you deploy a WAF, a shield is generated between your web application and the internet. Every web client must pass through it before reaching the server. A set of pre-defined rules filters out malicious traffic and protect sites from vulnerabilities.</p>



<h3 class="wp-block-heading" id="h-4-keep-your-database-secure">4. Keep Your Database Secure</h3>



<p>Another security loophole hackers can easily exploit is the website database. Typically, you’ll have to store a lot of information (about your business and customers) on your web application’s server. However, make sure to store only the data you truly need.</p>



<p>Always treat sensitive data such as credit card details, email addresses, and other identifying information as carefully as possible. It can become costly if mismanaged. As a rule of thumb, endeavor to encrypt all data that identifies users.</p>



<p>Some low-cost options to consider include encryption at rest such as Amazon’s&nbsp;<a href="https://aws.amazon.com/about-aws/whats-new/2015/12/amazon-aurora-now-supports-encryption-at-rest/" target="_blank" rel="noreferrer noopener">AWS Aurora</a>. This will efficiently secure on-disk data. Similarly, you may want to curate a list of all the tools you use for storing client information. This may include databases, document systems, GitHub, Dropbox, and more.</p>



<p>If you or your business is subject to the General Data Protection Regulation (GDPR), you’ll want to dedicate time and resources to fully comprehend and adhere to its requirements. Google&nbsp;<a href="https://www.nytimes.com/2019/01/21/technology/google-europe-gdpr-fine.html" target="_blank" rel="noreferrer noopener">lost a whopping $57 million</a>&nbsp;thanks to this in 2019. These policies&nbsp;<a href="https://www.varonis.com/blog/privacy-design-cheat-sheet/" target="_blank" rel="noreferrer noopener">may apply differently</a>&nbsp;to various web development projects.</p>



<h3 class="wp-block-heading" id="h-5-try-to-hack-yourself">5. Try to Hack Yourself</h3>



<p>The last box you need to tick on this web security checklist is to try to hack your own project. Since this is what attackers and their bots aim to do, the best way to stay ahead of them is to try it first. Hacking yourself is a way of self-auditing your web applications to see how they fare against common cyber attacks.</p>



<p>You can start by performing penetration testing. Also known as a ‘pen test’, this involves attempting to breach your application systems (APIs, servers, etc.)</p>



<p>Even after testing your own app, you may also want to run it by other developers and beta users to explore its functionality beyond normal use. You can consult this detailed Open Web Application Security Project&nbsp;<a href="https://github.com/0xRadi/OWASP-Web-Checklist" target="_blank" rel="noreferrer noopener">(OWASP) checklist</a>&nbsp;to see various ways to test your projects.</p>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>For every business to be truly profitable on all online platforms, top-notch security is an important factor that must be catered to. As a web developer, it’s your duty to deliver this on all your projects.</p>



<p>Let’s take one more look at the important points you’ll want to bear in mind to secure your web development projects:</p>



<ol>
<li>Choose a&nbsp;secure web host.</li>



<li>Encrypt all connections and secure user logins.</li>



<li>Use a Web Application Firewall (WAF).</li>



<li>Keep your database secure.</li>



<li>Try to hack yourself.</li>
</ol>



<p>Are you currently facing any security challenges on your website? Check out our other&nbsp;blog posts&nbsp;and&nbsp;knowledge base&nbsp;for more tips!</p>



<p><em>Featured Image Credit: Unsplash.</em></p>
<p>The post <a href="https://blog.giws.us/a-security-checklist-for-web-developers-5-points/">A Security Checklist for Web Developers (5 Points)</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.giws.us/a-security-checklist-for-web-developers-5-points/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is FTP Secure? The Complete Breakdown of FTP Hosting and If It’s Right for You</title>
		<link>https://blog.giws.us/is-ftp-secure-the-complete-breakdown-of-ftp-hosting-and-if-its-right-for-you/</link>
					<comments>https://blog.giws.us/is-ftp-secure-the-complete-breakdown-of-ftp-hosting-and-if-its-right-for-you/#respond</comments>
		
		<dc:creator><![CDATA[GIWS]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 17:24:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">https://blog.giws.us/?p=1821</guid>

					<description><![CDATA[<p>Globally, around&#160;30,000 hackers break into websites daily, and in 2020,&#160;64% of companies worldwide experienced&#160;at least one form of a cyber attack. It’s no wonder you’re asking if&#160;FTP is secure.&#160;There are various file sharing options to choose from–FTP, SFTP, FTPS, HTTPS, EFSS, Collaborations System, among others, Many companies default to using FTP (file transfer protocol), but...</p>
<p>The post <a href="https://blog.giws.us/is-ftp-secure-the-complete-breakdown-of-ftp-hosting-and-if-its-right-for-you/">Is FTP Secure? The Complete Breakdown of FTP Hosting and If It’s Right for You</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Globally, around&nbsp;<a href="https://techjury.net/blog/how-many-cyber-attacks-per-day/#:~:text=Globally%2C%2030%2C000%20websites%20are%20hacked,form%20of%20a%20cyber%20attack.">30,000 hackers break into websites daily</a>, and in 2020,&nbsp;<a href="https://techjury.net/blog/how-many-cyber-attacks-per-day/#:~:text=Globally%2C%2030%2C000%20websites%20are%20hacked,form%20of%20a%20cyber%20attack.">64% of companies worldwide experienced</a>&nbsp;at least one form of a cyber attack. It’s no wonder you’re asking if&nbsp;<strong>FTP is secure.&nbsp;</strong>There are various file sharing options to choose from–FTP, SFTP, FTPS, HTTPS, EFSS, Collaborations System, among others, Many companies default to using FTP (file transfer protocol), but is this decade’s old file sharing option safe? We’ll review what FTP is, why it’s used if it’s right for your business, and how to protect your business and its data from a breach.</p>



<h2 class="wp-block-heading" id="h-what-is-ftp">What is FTP?</h2>



<p>File Transfer Protocol (FTP)&nbsp;is a network protocol&nbsp;<a href="https://digitalguardian.com/blog/what-ftp-security-securing-ftp-usage">used to transfer files between computers&nbsp;over the web.</a>&nbsp;Users granted access can receive and transfer files in the FTP server known as the FTP host/site.</p>



<p>FTP provides&nbsp;basic, unencrypted file transfer capabilities&nbsp;to connect users over the internet. Developed in 1971 and thoroughly used throughout the 90s, this file-sharing option is now an archetype of the past, replaced by SFTP and SSH.</p>



<p>The thing is, FTP wasn’t designed to be secure and has many security vulnerabilities like:</p>



<ul>
<li><strong>Packet Sniffing.</strong>&nbsp;FTP is plain text which means it’s&nbsp;<em>not&nbsp;</em>encrypted. All transmissions, logins, passwords, and data are readable by anyone on the network.</li>



<li><strong>Brute Force Attacks.</strong>&nbsp;Because FTP isn’t encrypted, it’s highly susceptible to hackers systematically checking frequently used passwords until the correct password matches.</li>



<li><strong>Anonymous FTP Vulnerabilities.</strong>&nbsp;Anyone can access older or anonymous FTP servers without needing a username or password.</li>



<li><strong>Port stealing.</strong>&nbsp;Hackers can guess the next open port or use a PORT command to gain access as a go-between.</li>
</ul>



<p>FTP doesn’t provide any safeguards preventing even the most inexperienced of hackers. Additionally,&nbsp;<a href="https://www.cerberusftp.com/how-to-ensure-hipaa-compliance-on-your-ftp-sftp-ftpes-server/">federally compliant</a>&nbsp;organizations or networks can’t use FTP because of its lack of security. In fact, in 2017, the FBI issued a notice and warning about the&nbsp;<a href="https://info.publicintelligence.net/FBI-PHI-FTP.pdf">potential for data breaches</a>&nbsp;in the healthcare system for organizations using FTP.</p>



<h2 class="wp-block-heading" id="h-how-to-secure-your-data">How to Secure Your Data</h2>



<p>Easy, don’t use FTP. Seriously. There are other protocols like SFTP, FTPS, and HTTP. SFTP (Secure File Transfer Protocol) is the refreshed, secure version of FTP.</p>



<p>Other ways to keep your data secure:</p>



<ul>
<li><strong>Frequently update your protocols.</strong>&nbsp;Attacks over protocols occur when you slack on updating your system.</li>



<li><strong>Install an SSL (secure socket layer) certificate.</strong>&nbsp;SSLs encrypt the data on your website.</li>



<li><strong>Use 2FA (two-factor authentication).</strong>&nbsp;Minimize the chances of hackers breaching your server.</li>
</ul>



<p>There’s definitely a time and a place for using FTP. An FTP server allows you to organize your files, provide access to other users to download these files remotely, and also set permissions for what users can and can’t do to your files. If you choose FTP, we recommend having your own private FTP server&nbsp;with a strong password.&nbsp;This way, you can transfer your files easily, but without security concerns.</p>



<p>Despite its security concerns, FTP remains available for file sharing but isn’t recommended for most uses. When using FTP, ensure you’re following every security protocol possible and consider using other alternatives like HTTPS or SFTP.</p>
<p>The post <a href="https://blog.giws.us/is-ftp-secure-the-complete-breakdown-of-ftp-hosting-and-if-its-right-for-you/">Is FTP Secure? The Complete Breakdown of FTP Hosting and If It’s Right for You</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.giws.us/is-ftp-secure-the-complete-breakdown-of-ftp-hosting-and-if-its-right-for-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>9 Ways to Keep Your WordPress Website Secure</title>
		<link>https://blog.giws.us/9-ways-to-keep-your-wordpress-website-secure/</link>
					<comments>https://blog.giws.us/9-ways-to-keep-your-wordpress-website-secure/#respond</comments>
		
		<dc:creator><![CDATA[GIWS]]></dc:creator>
		<pubDate>Tue, 29 Dec 2020 15:46:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[WordPress]]></category>
		<guid isPermaLink="false">https://blog.giws.us/?p=1790</guid>

					<description><![CDATA[<p>Over&#160;28 million live websites&#160;now use WordPress. While it’s great to be part of such a large and active community, this popularity makes the platform a prime target for malicious hackers. Fortunately, by implementing some simple security tactics and performing regular checks, you can make your site much less vulnerable to attack. This can help you...</p>
<p>The post <a href="https://blog.giws.us/9-ways-to-keep-your-wordpress-website-secure/">9 Ways to Keep Your WordPress Website Secure</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Over&nbsp;<a href="https://trends.builtwith.com/cms/WordPress" target="_blank" rel="noreferrer noopener">28 million live websites</a>&nbsp;now use WordPress. While it’s great to be part of such a large and active community, this popularity makes the platform a prime target for malicious hackers.</p>



<p>Fortunately, by implementing some simple security tactics and performing regular checks, you can make your site much less vulnerable to attack. This can help you avoid losing customers, traffic, revenue, or confidential information due to a preventable security breach.</p>



<p>In this post, we’ll discuss why protecting your WordPress site is more important than ever. We’ll then share nine of our top tips for boosting your site’s security. Let’s get started!</p>



<h2 class="wp-block-heading" id="h-an-introduction-to-wordpress-security">An Introduction to WordPress Security</h2>



<p>WordPress powers&nbsp;<a href="https://w3techs.com/blog/entry/40_percent_of_the_web_uses_wordpress" target="_blank" rel="noreferrer noopener">over 40 percent of the web</a>, which makes it an attractive target for hackers. If a malicious third party manages to identify a vulnerability with one WordPress website, they could potentially use that same security loophole against the millions of other websites that are built on the same platform.</p>



<p>With this mind, it’s unsurprising that attacks against WordPress are on the rise. Wordfence recorded&nbsp;<a href="https://www.wordfence.com/blog/2021/01/the-wordfence-2020-wordpress-threat-report/" target="_blank" rel="noreferrer noopener">4.3 billion attempts to exploit vulnerabilities</a>&nbsp;in 2020. When asked about web security, over 70 percent of developers, freelancers, and agencies confirmed that they are&nbsp;<a href="https://patchstack.com/wordpress-security-2020/" target="_blank" rel="noreferrer noopener">increasingly worried about their websites</a>. In fact, 25 percent of respondents confirmed they’d had to deal with a hacked website in the month prior to participating in the survey.</p>



<p>The WordPress team has a strong track record of identifying and addressing vulnerabilities in the platform. However, no software is perfect. In addition, many website owners choose to extend WordPress core with themes and plugins. These third-party products can add new designs and features to your site – but can also add new security vulnerabilities.</p>



<p>According to Patchstack’s security whitepaper, third-party plugins and themes account for 96.22 percent of detected WordPress security vulnerabilities. The total number of active and vulnerable theme and plugin installations detected throughout 2020 came in at a staggering 70 million.</p>



<p>If a hacker does manage to take control of your site, the consequences could be disastrous. The attacker might deface your site, steal your data, or redirect your loyal customers to a spam website.</p>



<p>The impact of these malicious activities can be far-reaching. They may include a loss of trust amongst your customers and missed sales, right through to potential legal action due to your failure to protect your visitors’ information.</p>



<h2 class="wp-block-heading" id="h-9-ways-to-keep-your-wordpress-website-secure-in-2021">9 Ways to Keep Your WordPress Website Secure in 2021</h2>



<p>WordPress may be a favorite target amongst hackers, but that’s no reason to switch to a different Content Management System (CMS). Let’s take a look at nine tips that you can use to harden and protect your WordPress website against common attacks.</p>



<h3 class="wp-block-heading" id="h-1-choose-a-hosting-provider-that-prioritizes-security">1. Choose a Hosting Provider That Prioritizes Security</h3>



<p>The most important way to&nbsp;keep your WordPress website safe&nbsp;is to choose a hosting provider that prioritizes security. Wherever possible, we recommend opting for a hosting solution that offers built-in security features and tools.</p>



<p>At GIWS, we take security seriously, which is why all of our hosting packages include the Cloudflare Web Application Firewall (WAF). This tool can help protect your site against brute-force attacks in which a hacker tries to submit many different passwords and usernames in the hopes of guessing the combination correctly.</p>



<p>Our hosting plans also come with the&nbsp;cPanel control panel&nbsp;and&nbsp;Softaculous installer. This popular installer provides access to a wide range of add-ons, tools, and software, including many that can help you&nbsp;protect your website.</p>



<p>Running outdated software can make your site more vulnerable to attack. If you do choose to install additional software via Softaculous, then we’ll email you every time an update becomes available. This ensures you won’t miss any critical security updates or bug fixes that can help bolster your site’s security.</p>



<p>If you do have a security concern, then it’s important to address it straight away. That’s why we also offer&nbsp;24/7 customer support&nbsp;to all of our hosting customers.</p>



<h3 class="wp-block-heading" id="h-2-install-a-secure-sockets-layer-ssl-certificate">2. Install a Secure Sockets Layer (SSL) Certificate</h3>



<p>Without a&nbsp;Secure Socket Layer (SSL) certificate, malicious third parties may be able to intercept the data your website sends and receives. This includes login credentials and payment details. If a hacker manages to access this information, it could damage your reputation and destroy users’ trust in your website. It may even land you in legal hot water due to data protection laws.</p>



<p>An SSL certificate can help ensure your private data remains private by transferring information via&nbsp;Hypertext Transfer Protocol Secure (HTTPS)&nbsp;instead of Hypertext Transfer Protocol (HTTP). As the name suggests, HTTPS is more secure than HTTP, as it enables you to encrypt any data that flows in and out of your website.</p>



<p>To help you meet this important security requirement, we provide several different types of <a href="https://www.giws.us/billing/store/ssl-certificates" target="_blank" rel="noreferrer noopener">SSL certificates</a>:</p>



<p>After procuring your SSL certificate, we’ll send you an SSL Token via email. You can install your certificate by adding it to your website.</p>



<p>If you’re a cPanel user, then you can log into your account and launch the SSL Status<em>:</em></p>



<p>We’ll then ask some simple questions about your website and your certificate. After providing these details, AutoInstall SSL will upload your certificate and your data will be encrypted.</p>



<h3 class="wp-block-heading" id="h-3-implement-a-content-delivery-network-cdn">3. Implement a Content Delivery Network (CDN)</h3>



<p>If a malicious third party manages to break into your site using a brute-force attack, they could wreak havoc. They might steal your data, deface your site, or even delete your WordPress website entirely.</p>



<p>You can help protect your site against brute-force attacks by using a long,&nbsp;complex password&nbsp;that features a mix of numbers and symbols, plus uppercase and lowercase letters. However, some hackers use automated scripts and bots to bombard your site with thousands of login credentials. Even if you follow password best practices, your site may still fall victim to a brute-force attack.</p>



<p>To protect against these automated scripts and bots, you may want to consider using a&nbsp;Content Delivery Network (CDN). Although this tool is often used to improve website performance, it can also block malicious requests from ever reaching your site.</p>



<p>This may prevent hackers from hammering your site with login credentials. At GIWS, we offer the Cloudflare CDN to all our customers:<img fetchpriority="high" decoding="async" width="800" height="340" class="wp-image-1795" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/cloudflare-cdn-768x326.png-1.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/cloudflare-cdn-768x326.png-1.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/cloudflare-cdn-768x326.png-1-300x127.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/cloudflare-cdn-768x326.png-1-360x153.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/cloudflare-cdn-768x326.png-1-545x231.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>In addition to offering brute-force protection, Cloudflare’s network is designed to monitor and mitigate&nbsp;Distributed Denial-of-Services (DDoS) attacks. In this scenario, a hacker floods your network with so much malicious traffic that it exceeds your website’s capacity to process requests, at which point legitimate requests may be ignored.</p>



<p>You can configure your Cloudflare CDN by logging into cPanel and navigating to&nbsp;<em>Software &gt; Cloudflare</em>. You can then follow the onscreen instructions to ensure Cloudflare is set up correctly for your particular website.</p>



<h3 class="wp-block-heading" id="h-4-use-plugins-and-themes-safely">4. Use Plugins and Themes Safely</h3>



<p>WordPress has huge directories of themes and plugins that can help you create beautiful, feature-rich websites. However, these third-party extensions can also make your site vulnerable to attack. In 2019,&nbsp;<a href="https://www.imperva.com/blog/the-state-of-vulnerabilities-in-2019/" target="_blank" rel="noreferrer noopener">97.2 percent of WordPress vulnerabilities</a>&nbsp;were related to plugins.</p>



<p>To help protect your website, you should only install plugins from reputable sources. Wherever possible, we recommend using the official WordPress Plugin Repository, as it has <a href="https://developer.wordpress.org/plugins/wordpress-org/plugin-security/" target="_blank" rel="noreferrer noopener">strict security guidelines</a>:<img decoding="async" width="800" height="333" class="wp-image-1797" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-official-repository-768x320.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-official-repository-768x320.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-official-repository-768x320.png-300x125.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-official-repository-768x320.png-360x150.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-official-repository-768x320.png-545x227.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>Alternatively, you can purchase themes and plugins from reputable third-party marketplaces such as <a href="https://codecanyon.net/" target="_blank" rel="noreferrer noopener">CodeCanyon</a>. Even if you’re using a quality source, it’s still smart to evaluate the theme or plugin, including examining when it was last updated:<img decoding="async" width="800" height="475" class="wp-image-1798" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-plugin-updates-768x456.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-plugin-updates-768x456.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-plugin-updates-768x456.png-300x178.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-plugin-updates-768x456.png-360x214.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-plugin-updates-768x456.png-545x324.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>We also recommend checking the software’s reviews, particularly the most recent ones. A spate of negative comments may indicate a security issue with the latest release.</p>



<p>Themes and plugins also add code to your site, which may contain vulnerabilities. A responsible developer will work hard to close any security loopholes discovered in their theme or plugin, and will often release an update that contains a solution for any recently-discovered vulnerabilities. For this reason, it’s important to keep your themes and plugins up-to-date.</p>



<p>According to WPBeginner, <a href="https://www.wpbeginner.com/beginners-guide/ultimate-guide-to-upgrade-wordpress-for-beginners-infograph/?display=wide" target="_blank" rel="noreferrer noopener">86 percent of sites are hacked</a> due to outdated software. To minimize your risk, it’s important to install updates as soon as they become available:<img loading="lazy" decoding="async" width="800" height="298" class="wp-image-1799" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-dashboard-updates-768x286.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-dashboard-updates-768x286.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-dashboard-updates-768x286.png-300x112.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-dashboard-updates-768x286.png-360x134.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-dashboard-updates-768x286.png-545x203.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>At some point, you may no longer require a particular theme or plugin. If you simply deactivate the software in question, then hackers may still be able to exploit its code. For example, hackers commonly target individual PHP files within a specific plugin.</p>



<p>If you simply deactivate the theme or plugin, then those PHP files will remain accessible and will therefore still be exploitable. This means that it’s crucial to delete extensions that you no longer require.</p>



<h3 class="wp-block-heading" id="h-5-install-a-web-application-firewall-waf">5. Install a Web Application Firewall (WAF)</h3>



<p>Themes and plugins can potentially introduce vulnerabilities to your website. Ideally, when such a problem is discovered, the theme or plugin developer will rush to patch the issue and release an update.</p>



<p>However, this isn’t always the case, as some complex vulnerabilities may take time to fix. While we’d always recommend removing insecure software, this isn’t always feasible. For example, perhaps the plugin in question delivers your website’s core functionality.</p>



<p>If you do need to continue using a vulnerable plugin, then you can make it more difficult for hackers to abuse these known security loopholes. One method is to use a Web Application Firewall (WAF) to filter out malicious requests before they reach your WordPress website. This can also protect your site against&nbsp;Cross-Site Scripting (XSS) attacks.</p>



<p>There are several WAF plugins available for WordPress. However, the <a href="https://www.wordfence.com/" target="_blank" rel="noreferrer noopener">Wordfence endpoint firewall</a> is a popular option:<img loading="lazy" decoding="async" width="800" height="360" class="wp-image-1800" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/wordfence-waf-firewall-768x346.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/wordfence-waf-firewall-768x346.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/wordfence-waf-firewall-768x346.png-300x135.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/wordfence-waf-firewall-768x346.png-360x162.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/wordfence-waf-firewall-768x346.png-545x246.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>After installing and activating Wordfence, it’s a good idea to leave this plugin in Learning More for at least a week before enabling its firewall. This can help you avoid false positives, where Wordfence blocks legitimate activities.</p>



<p>While the plugin is in Learning Mode, you should perform as many different actions as possible on your WordPress website. This gives Wordfence the best possible chance of learning how to protect your site while also permitting normal activity and visitors through its firewall.</p>



<p>You can put Wordfence into Learning Mode by navigating to <em>Wordfence > Firewall</em>. Then open the <em>Web Application Firewall Status</em> dropdown and select <em>Learning Mode:</em><img loading="lazy" decoding="async" width="800" height="375" class="wp-image-1801" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/web-application-firewall-768x360.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/web-application-firewall-768x360.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/web-application-firewall-768x360.png-300x141.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/web-application-firewall-768x360.png-360x169.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/web-application-firewall-768x360.png-545x255.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>Save your changes, and Wordfence will start monitoring your site. When you’re ready to take Wordfence out of Learning Mode, you can enable the firewall by navigating to&nbsp;<em>Wordfence &gt; Firewall.</em>&nbsp;Then open the dropdown and select&nbsp;<em>Enabled and Protecting.</em></p>



<h3 class="wp-block-heading" id="h-6-activate-two-factor-authentication-2fa">6. Activate Two-Factor Authentication (2FA)</h3>



<p>It’s important to protect your website with a strong password. However, there are some password-based attacks where the strength of your login credentials has no impact on whether that attack succeeds or fails.</p>



<p>This includes credential stuffing attacks, where a hacker attempts to break into your dashboard using thousands, or even millions of username and password combinations. There are even keystroke logging programs that can monitor your keyboard and record every single thing you type, including your password.</p>



<p>One way to protect against these attacks is to&nbsp;enable Two-Factor Authentication (2FA). After activating this feature, anyone trying to access your WordPress website will need to enter the correct login details and then pass an additional security check – such as responding to a push notification on their phone or entering a code sent to their email address – to access your site.</p>



<p>By activating 2FA, you can make it significantly more difficult for a third party to gain access to your website. You can set up 2FA using a mobile application such as <a href="https://support.google.com/accounts/answer/1066447" target="_blank" rel="noreferrer noopener">Google Authenticator</a> or <a href="https://www.microsoft.com/en-us/p/microsoft-authenticator/9nblgggzmcj6?activetab=pivot:overviewtab" target="_blank" rel="noreferrer noopener">Microsoft Authenticator</a>:<img loading="lazy" decoding="async" width="800" height="196" class="wp-image-1802" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/microsoft-authenticator-768x188.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/microsoft-authenticator-768x188.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/microsoft-authenticator-768x188.png-300x73.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/microsoft-authenticator-768x188.png-360x88.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/microsoft-authenticator-768x188.png-545x133.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>After installing your chosen mobile app, GIWS customers can enable 2FA by logging into their accounts and navigating to <em>Account > Edit Account Details</em>. You can then select <em>Security Settings</em> in the left-hand menu:</p>



<p>On the subsequent page, select&nbsp;<em>Click here to enable.</em>&nbsp;You’ll then be guided through the process of linking your WordPress site to your authenticator mobile app:</p>



<p>As part of this process, we’ll provide you with a backup code. If you ever lose access to your authenticator app, then you can use this code to recover your WordPress website. To avoid getting locked out of your site, it’s vital that you make a note of this code and keep it somewhere safe.</p>



<h3 class="wp-block-heading" id="h-7-consider-disabling-xml-rpc">7. Consider Disabling XML-RPC</h3>



<p>Pingbacks are a way to notify other websites that you’ve linked to their content, and vice versa. By default, they’re enabled in WordPress. While this feature can make it easier to respond to comments that mention your site, it can also make your website more vulnerable to DDoS attacks.</p>



<p>WordPress pingbacks are made possible by the&nbsp;<a href="https://codex.wordpress.org/XML-RPC_Support" target="_blank" rel="noreferrer noopener">XML-RPC interface</a>. However, an attacker might use this feature to bombard your site with pingbacks. This can overload your server and might even take your site offline. For this reason, you may want to consider disabling the XML-RPC interface using the&nbsp;<a href="https://wordpress.org/plugins/rest-xmlrpc-data-checker/" target="_blank" rel="noreferrer noopener">REST XML-RPC Data Checker</a>.</p>



<p>If you do decide to disable pingbacks, then install and activate this plugin in your WordPress dashboard. Then navigate to <em>Settings > REST XML-RPC Data Checker</em>. Next, select the <em>XML-RPC</em> tab and choose <em>Disable XML-RPC API interface:</em><img loading="lazy" decoding="async" width="800" height="376" class="wp-image-1803" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/rest-xml-rpc-768x361.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/rest-xml-rpc-768x361.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/rest-xml-rpc-768x361.png-300x141.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/rest-xml-rpc-768x361.png-360x169.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/rest-xml-rpc-768x361.png-545x256.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>Now you just need to save your changes and pingbacks will be disabled for your website. If you don’t want to use a plugin, then you can block all incoming XML-RPC requests before they’re passed to your site.</p>



<p>This technique does require you to edit your site at the code level, so it’s wise to create a full backup before proceeding. If you’re an GIWS customer, we provide two backup tools that you can access via cPanel:</p>



<p>After creating a backup, connect to your server via File Transfer Protocol (FTP) using an FTP client such as&nbsp;<a href="https://filezilla-project.org/" target="_blank" rel="noreferrer noopener">FileZilla</a>. You can then open your&nbsp;<em>.htcaccess</em>&nbsp;file for editing and add the following:</p>



<p><code>&lt;Files xmlrpc.php&gt;<br>order deny,allow<br>deny from all<br>&lt;/Files&gt;</code></p>



<p>Don’t forget to save your changes and re-upload the file to your server. To verify that XML-RPC is now disabled, head over to&nbsp;<a href="https://xmlrpc.eritreo.it/" target="_blank" rel="noreferrer noopener">XML-RPC Validator</a>&nbsp;and enter your website’s URL. If XML-RPC is disabled, then the Validator should display an error message.</p>



<h3 class="wp-block-heading" id="h-8-remove-the-wordpress-theme-editor">8. Remove the WordPress Theme Editor</h3>



<p>By default, you can modify your theme using WordPress’ built-in theme editor. While this is helpful for creating custom themes, it’s also a way for hackers to inject malicious code into your website:<img loading="lazy" decoding="async" width="800" height="381" class="wp-image-1804" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-theme-editor-768x366.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/wordpress-theme-editor-768x366.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-theme-editor-768x366.png-300x143.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-theme-editor-768x366.png-360x172.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/wordpress-theme-editor-768x366.png-545x260.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>If you don’t need the theme editor, then you may want to consider disabling it. This requires you to edit your website’s code, so we recommend creating a backup before proceeding.</p>



<p>To disable the editor, you’ll need to connect to your server using an FTP client. You can then open your&nbsp;<em>wp-config.php</em>&nbsp;file and add the following after the line that reads “That’s all, stop editing! Happy publishing”:</p>



<p><code>define( 'DISALLOW_FILE_EDIT', true );</code></p>



<p>Save your changes and the theme editor will disappear from your WordPress dashboard. If you need to restore the theme editor at any point, then simply connect to your server using FTP and remove the line of&nbsp;<em>DISALLOW_FILE_EDIT</em>&nbsp;code.</p>



<h3 class="wp-block-heading" id="h-9-protect-your-database-against-sql-injection-attacks">9. Protect Your Database Against SQL Injection Attacks</h3>



<p>A hacker may attempt to gain access to your WordPress account by injecting malicious SQL queries into your MySQL database. Hackers can launch these SQL injection attacks via any content that accepts user input. This includes many website staples, such as comment sections and contact forms.</p>



<p>Since MySQL is vulnerable to injection attacks, it’s important to keep your database up-to-date. It’s also important to protect your MySQL database with a strong password that has no connection to your website, company, or you as an individual. Here, it may help to use a password generator such as <a href="https://passwordsgenerator.net/" target="_blank" rel="noreferrer noopener">Strong Random Password Generator</a> or <a href="https://www.lastpass.com/password-generator" target="_blank" rel="noreferrer noopener">LastPass</a>:<img loading="lazy" decoding="async" width="800" height="485" class="wp-image-1805" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/lastpass-password-generator-768x466.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/lastpass-password-generator-768x466.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/lastpass-password-generator-768x466.png-300x182.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/lastpass-password-generator-768x466.png-360x218.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/lastpass-password-generator-768x466.png-545x331.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>You can also make it more difficult for hackers to identify your database by using a unique database name. GIWS customers can change their WordPress database name at any point by logging into cPanel and then accessing the <em>phpMyAdmin</em> tool.</p>



<p>In the left-hand menu, select the database that you want to rename. Then open the <em>Operation</em> tab:<img loading="lazy" decoding="async" width="800" height="461" class="wp-image-1806" style="width: 800px;" src="https://blog.giws.us/wp-content/uploads/2020/12/phpmyadmin-cpanel-dashboard-768x443.png.webp" alt="" srcset="https://blog.giws.us/wp-content/uploads/2020/12/phpmyadmin-cpanel-dashboard-768x443.png.webp 768w, https://blog.giws.us/wp-content/uploads/2020/12/phpmyadmin-cpanel-dashboard-768x443.png-300x173.webp 300w, https://blog.giws.us/wp-content/uploads/2020/12/phpmyadmin-cpanel-dashboard-768x443.png-360x208.webp 360w, https://blog.giws.us/wp-content/uploads/2020/12/phpmyadmin-cpanel-dashboard-768x443.png-545x314.webp 545w" sizes="(max-width: 800px) 100vw, 800px" /></p>



<p>Here, enter the name that you want to use and click on&nbsp;<em>Go</em>. When prompted, opt to reload your database.</p>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>As one of the world’s most popular Content Management Systems, hackers are always eager to uncover vulnerabilities in WordPress themes, plugins, and core. If a malicious third party does manage to identify a security loophole, they could potentially use it to launch attacks against millions of WordPress websites – including yours.</p>



<p>By following some simple security precautions, you can immediately make your site less vulnerable to attack. It’s important to start with the fundamentals by vetting all of your themes and plugins carefully and installing an SSL certificate. Once you have a strong foundation, we recommend exploring more advanced security tactics, such as enabling 2FA and disabling the theme editor and XML-RPC when possible.</p>



<p>Your choice of hosting provider is also crucial for security. All of our GIWS packages include features, tools, and add-ons specifically designed to help keep our customers safe, including HackScan Protection, Cloudflare, and a dual firewall. Check them out today!</p>
<p>The post <a href="https://blog.giws.us/9-ways-to-keep-your-wordpress-website-secure/">9 Ways to Keep Your WordPress Website Secure</a> appeared first on <a href="https://blog.giws.us">GIWS Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blog.giws.us/9-ways-to-keep-your-wordpress-website-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
