SlideShare a Scribd company logo
1 of 24
5 things you can do
in less than 30 minutes
to increase website security
30,000
websites are hacked every day
80%
websites are susceptible to hacking because
they run outdated version of WordPress or Joomla
1.Change Password & Improve
Authentication
List of the most popular passwords in the Internet according to splashdata.com
Secure Password
Example password Easy to remember? Hard to guess?
123456 YES NO
VVW^kv7xEUk5fd&GV1uA#R NO YES
Better to be safe than sorry!!! YES YES
Two Factor Authentication
Two Factor Authentication is an extra layer of security that requires not only a
password and username but also something that only user has on them - such
as a physical token.
WordPress: plugins available such as Rublon or Two-Factor Authentication
Plugin
Joomla: build-in support for Google Authenticator and YubiKey
Other precautions
Introduce basic authentication on HTTP
Limit backend access to certain IP
Require HTTPS/HSTS connection
Manage multiple passwords using a password manager (LastPass,
OnePassword)
2.Install Firewall
& Malware Scanner
Web Application Firewall
Web Application Firewall protects website against the vast majority of common
attacks.
WordPress: Sucuri, CloudFlare
Joomla: Admin Tools, Sucuri, RS Firewall
Malware Scanner
Malware scanner is a tool that check website files against a known list of
malwares and alerts you on any modifications.
WordPress: Sucuri, iThemes Security
Joomla: Admin Tools, Sucuri
Once website security is
compromised every installed
security software can be
compromised as well.
3.Schedule Backups
Backup frequency
Backup is a complete copy of a website including code, images (and other
media files) and database that can be used for restoration at any time.
Every website should be backed up regularly. Recommended backup
frequency depends on frequency of changes on a website. In most cases it’s
something between 1 and 30 days.
Backup storage
Backup stored on the same server is not a backup.
If a website is hacked, backups can be hacked/deleted/encrypted as well.
If a website is lost due to server malfunction, backups are lost as well.
In Perfect Dashboard we recommend to store backups either in our cloud, on
AWS or on any other external disk space.
Backup integrity
You don’t have a backup unless it can be used for restoration.
According to Perfect Dashboard statistics 1 out of 10 backups fails integrity
testing. The most popular reasons are:
error while creating backup archives
error while copying backup archives over the Internet
Here’s how we do integrity testing in Perfect Dashboard.
4.Get Rid Of Dangerous
Extensions & Themes
Every extension or theme
is a potential backdoor
Thousands of security bugs are discovered in extensions & themes every year.
This covers both free & commercial versions (sometimes very popular ones).
That’s why you need to be always ready for updates.
Check if developer use default updater to inform about security releases.
Check if developer require additional payment for accessing updates.
Source matters
Even a trusted extension from untrusted source is a potential security threat.
4 years ago we have discovered that our Perfect Contact Form distributed on
torrents had a malware injected into the code. So even the extension itself
never had any security issues, those users got hacked. Full story:
https://www.perfect-web.co/blog/67-perfect-ajax-popup-contact-form-free-
download-torrent-virus
Replace extensions / themes from untrusted source with secure ones.
Get rid of unused extensions & themes
No matter you use them or not they are still a potential security threat.
That’s why removing such extensions & themes is beneficial. Not to mention it
also may increase performance of a website and decrease a backup size.
WordPress: Remove all unused Themes, Plugins & Widgets
Joomla: Remove all unused Components, Modules (not the instances), Plugins
& Templates
5.Keep software up-to-date
What needs to be updated
Server software (often even on shared hosting)
Apache / NGINX
PHP (5.5 or higher)
MySQL (5.5 or higher)
CMS
Extensions / Themes
Course of conduct
1. Find out that there is an update required
2. Back up
3. Verify backup integrity
4. Download update files (optionally)
5. Update
6. Test website after the update
7. Fix errors after the update (optionally)
1. Use Perfect Dashboard
2. Fix errors after the update (optionally)
Q&A

More Related Content

Viewers also liked

TestMGR-ASTMC2165f0dcd4-88037821642588
TestMGR-ASTMC2165f0dcd4-88037821642588TestMGR-ASTMC2165f0dcd4-88037821642588
TestMGR-ASTMC2165f0dcd4-88037821642588pravashranjan
 
Software administrativo
Software administrativoSoftware administrativo
Software administrativoosmerlyngo
 
Legal translation services
Legal translation servicesLegal translation services
Legal translation serviceslanguagesgateway
 
Презентация ЦУМ-Воронеж
Презентация ЦУМ-ВоронежПрезентация ЦУМ-Воронеж
Презентация ЦУМ-ВоронежИгорь Назаров
 
educational technology 2 Lesson 4 bridging the generation gap
educational technology 2 Lesson 4 bridging the generation gapeducational technology 2 Lesson 4 bridging the generation gap
educational technology 2 Lesson 4 bridging the generation gapray mijares
 

Viewers also liked (8)

Country riddles
Country riddlesCountry riddles
Country riddles
 
TestMGR-ASTMC2165f0dcd4-88037821642588
TestMGR-ASTMC2165f0dcd4-88037821642588TestMGR-ASTMC2165f0dcd4-88037821642588
TestMGR-ASTMC2165f0dcd4-88037821642588
 
Software administrativo
Software administrativoSoftware administrativo
Software administrativo
 
Legal translation services
Legal translation servicesLegal translation services
Legal translation services
 
JSztuczki
JSztuczkiJSztuczki
JSztuczki
 
Презентация ЦУМ-Воронеж
Презентация ЦУМ-ВоронежПрезентация ЦУМ-Воронеж
Презентация ЦУМ-Воронеж
 
Максим Кузьминский (WebPromo): Реклама в социальных сетях
Максим Кузьминский (WebPromo): Реклама в социальных сетяхМаксим Кузьминский (WebPromo): Реклама в социальных сетях
Максим Кузьминский (WebPromo): Реклама в социальных сетях
 
educational technology 2 Lesson 4 bridging the generation gap
educational technology 2 Lesson 4 bridging the generation gapeducational technology 2 Lesson 4 bridging the generation gap
educational technology 2 Lesson 4 bridging the generation gap
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

5 things you can do in less then 30 minutes to increase website security

  • 1. 5 things you can do in less than 30 minutes to increase website security
  • 3. 80% websites are susceptible to hacking because they run outdated version of WordPress or Joomla
  • 4. 1.Change Password & Improve Authentication
  • 5. List of the most popular passwords in the Internet according to splashdata.com
  • 6. Secure Password Example password Easy to remember? Hard to guess? 123456 YES NO VVW^kv7xEUk5fd&GV1uA#R NO YES Better to be safe than sorry!!! YES YES
  • 7. Two Factor Authentication Two Factor Authentication is an extra layer of security that requires not only a password and username but also something that only user has on them - such as a physical token. WordPress: plugins available such as Rublon or Two-Factor Authentication Plugin Joomla: build-in support for Google Authenticator and YubiKey
  • 8. Other precautions Introduce basic authentication on HTTP Limit backend access to certain IP Require HTTPS/HSTS connection Manage multiple passwords using a password manager (LastPass, OnePassword)
  • 10. Web Application Firewall Web Application Firewall protects website against the vast majority of common attacks. WordPress: Sucuri, CloudFlare Joomla: Admin Tools, Sucuri, RS Firewall
  • 11. Malware Scanner Malware scanner is a tool that check website files against a known list of malwares and alerts you on any modifications. WordPress: Sucuri, iThemes Security Joomla: Admin Tools, Sucuri
  • 12. Once website security is compromised every installed security software can be compromised as well.
  • 14. Backup frequency Backup is a complete copy of a website including code, images (and other media files) and database that can be used for restoration at any time. Every website should be backed up regularly. Recommended backup frequency depends on frequency of changes on a website. In most cases it’s something between 1 and 30 days.
  • 15. Backup storage Backup stored on the same server is not a backup. If a website is hacked, backups can be hacked/deleted/encrypted as well. If a website is lost due to server malfunction, backups are lost as well. In Perfect Dashboard we recommend to store backups either in our cloud, on AWS or on any other external disk space.
  • 16. Backup integrity You don’t have a backup unless it can be used for restoration. According to Perfect Dashboard statistics 1 out of 10 backups fails integrity testing. The most popular reasons are: error while creating backup archives error while copying backup archives over the Internet Here’s how we do integrity testing in Perfect Dashboard.
  • 17. 4.Get Rid Of Dangerous Extensions & Themes
  • 18. Every extension or theme is a potential backdoor Thousands of security bugs are discovered in extensions & themes every year. This covers both free & commercial versions (sometimes very popular ones). That’s why you need to be always ready for updates. Check if developer use default updater to inform about security releases. Check if developer require additional payment for accessing updates.
  • 19. Source matters Even a trusted extension from untrusted source is a potential security threat. 4 years ago we have discovered that our Perfect Contact Form distributed on torrents had a malware injected into the code. So even the extension itself never had any security issues, those users got hacked. Full story: https://www.perfect-web.co/blog/67-perfect-ajax-popup-contact-form-free- download-torrent-virus Replace extensions / themes from untrusted source with secure ones.
  • 20. Get rid of unused extensions & themes No matter you use them or not they are still a potential security threat. That’s why removing such extensions & themes is beneficial. Not to mention it also may increase performance of a website and decrease a backup size. WordPress: Remove all unused Themes, Plugins & Widgets Joomla: Remove all unused Components, Modules (not the instances), Plugins & Templates
  • 22. What needs to be updated Server software (often even on shared hosting) Apache / NGINX PHP (5.5 or higher) MySQL (5.5 or higher) CMS Extensions / Themes
  • 23. Course of conduct 1. Find out that there is an update required 2. Back up 3. Verify backup integrity 4. Download update files (optionally) 5. Update 6. Test website after the update 7. Fix errors after the update (optionally) 1. Use Perfect Dashboard 2. Fix errors after the update (optionally)
  • 24. Q&A

Editor's Notes

  1. Better Plugin Compatibility Control