SlideShare a Scribd company logo
1 of 15
Security in Joomla! Ruth Cheesley Suffolk Computer Services [email_address]
Security in Joomla ,[object Object],[object Object],[object Object]
 
A balancing act?
What is Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Bother?
Legal issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Professionalism ,[object Object],[object Object]
Why target Joomla? ,[object Object],[object Object],[object Object]
How to keep my sites secure? ,[object Object],[object Object],[object Object],[object Object]
Finding a reliable host ,[object Object],[object Object],[object Object],[object Object],[object Object]
THOU SHALT BACK UP! ,[object Object],[object Object],[object Object]
What to do now? ,[object Object],[object Object],[object Object],[object Object]
Must Read ,[object Object],[object Object]
Tools to help ,[object Object],[object Object],[object Object]

More Related Content

What's hot

RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
7 tips to make word press website secure in 2021
7 tips to make word press website secure in 20217 tips to make word press website secure in 2021
7 tips to make word press website secure in 2021WebConnect Pvt Ltd
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDStuartJDavidson.com
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfArthur Kasirye
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security Zack Fabro
 
Fun With Http Handlers - Miguel A. Castro
Fun With Http Handlers - Miguel A. CastroFun With Http Handlers - Miguel A. Castro
Fun With Http Handlers - Miguel A. CastroMohammad Tayseer
 
Wordpress security
Wordpress securityWordpress security
Wordpress securityjhon wilson
 
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp CincyEd Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp CincyIntel Corporation
 
OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationNikola Milosevic
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application securityJames Crowley
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla websiteMike Carson
 
Securing WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanSecuring WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanJeff Hoffman
 

What's hot (20)

RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
7 tips to make word press website secure in 2021
7 tips to make word press website secure in 20217 tips to make word press website secure in 2021
7 tips to make word press website secure in 2021
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdf
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Top Keys to create a secure website
Top Keys to create a secure websiteTop Keys to create a secure website
Top Keys to create a secure website
 
Endpoint Security
Endpoint Security Endpoint Security
Endpoint Security
 
Stronghold to Strengthen: Advanced Windows Server Hardening
Stronghold to Strengthen: Advanced Windows Server HardeningStronghold to Strengthen: Advanced Windows Server Hardening
Stronghold to Strengthen: Advanced Windows Server Hardening
 
Fun With Http Handlers - Miguel A. Castro
Fun With Http Handlers - Miguel A. CastroFun With Http Handlers - Miguel A. Castro
Fun With Http Handlers - Miguel A. Castro
 
Wordpress security
Wordpress securityWordpress security
Wordpress security
 
4liftchairs.
4liftchairs.4liftchairs.
4liftchairs.
 
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp CincyEd Saipetch EMC VMware Lightning Talk CloudCamp Cincy
Ed Saipetch EMC VMware Lightning Talk CloudCamp Cincy
 
OWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfigurationOWASP Serbia - A6 security misconfiguration
OWASP Serbia - A6 security misconfiguration
 
Why WordPress?
Why WordPress?Why WordPress?
Why WordPress?
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application security
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
 
Securing WordPress by Jeff Hoffman
Securing WordPress by Jeff HoffmanSecuring WordPress by Jeff Hoffman
Securing WordPress by Jeff Hoffman
 

Viewers also liked

Viewers also liked (18)

Wishes
WishesWishes
Wishes
 
Um basic config_l2p_rel71_en
Um basic config_l2p_rel71_enUm basic config_l2p_rel71_en
Um basic config_l2p_rel71_en
 
Template Overrides
Template  OverridesTemplate  Overrides
Template Overrides
 
Aisha was 19
Aisha was 19Aisha was 19
Aisha was 19
 
Abu lahab
Abu lahabAbu lahab
Abu lahab
 
Aisha was 19
Aisha was 19Aisha was 19
Aisha was 19
 
Hilalbinumayyah
HilalbinumayyahHilalbinumayyah
Hilalbinumayyah
 
Mediterranean trade
Mediterranean tradeMediterranean trade
Mediterranean trade
 
Aliimran
AliimranAliimran
Aliimran
 
Unit second 7 lesson d
Unit second 7  lesson dUnit second 7  lesson d
Unit second 7 lesson d
 
Guidelines for Reasonable Irrigation Water Requirements in the Waikato Region...
Guidelines for Reasonable Irrigation Water Requirements in the Waikato Region...Guidelines for Reasonable Irrigation Water Requirements in the Waikato Region...
Guidelines for Reasonable Irrigation Water Requirements in the Waikato Region...
 
Wishes
WishesWishes
Wishes
 
Wishes
WishesWishes
Wishes
 
Aisha was 19
Aisha was 19Aisha was 19
Aisha was 19
 
Cross culture commnications_argentina
Cross culture commnications_argentinaCross culture commnications_argentina
Cross culture commnications_argentina
 
Adalah sahabat
Adalah sahabatAdalah sahabat
Adalah sahabat
 
Adab
AdabAdab
Adab
 
Search Engine Friendly URL\'s in Joomla!
Search  Engine  Friendly  URL\'s in Joomla!Search  Engine  Friendly  URL\'s in Joomla!
Search Engine Friendly URL\'s in Joomla!
 

Similar to Joomla Security

OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security Akarawuth Tamrareang
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - SecurityWilco Jansen
 
Joomla Security v3.0
Joomla Security v3.0Joomla Security v3.0
Joomla Security v3.0Ajay Lulia
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better securityMichael Pignataro
 
Joomladay Switzerland - security
Joomladay Switzerland - securityJoomladay Switzerland - security
Joomladay Switzerland - securityWilco Jansen
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security HardeningTimothy Wood
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User SecurityDre Armeda
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015kriptonium
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Laskywordcampgc
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itTim Plummer
 
Php My Sql Security 2007
Php My Sql Security 2007Php My Sql Security 2007
Php My Sql Security 2007Aung Khant
 

Similar to Joomla Security (20)

OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security OWASP Thailand 2016 - Joomla Security
OWASP Thailand 2016 - Joomla Security
 
Brendon Hatcher Joomla Security
Brendon Hatcher Joomla SecurityBrendon Hatcher Joomla Security
Brendon Hatcher Joomla Security
 
Joomladay Netherlands - Security
Joomladay Netherlands - SecurityJoomladay Netherlands - Security
Joomladay Netherlands - Security
 
Joomla Security v3.0
Joomla Security v3.0Joomla Security v3.0
Joomla Security v3.0
 
Seven steps to better security
Seven steps to better securitySeven steps to better security
Seven steps to better security
 
Joomladay Switzerland - security
Joomladay Switzerland - securityJoomladay Switzerland - security
Joomladay Switzerland - security
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
WordPress Security Hardening
WordPress Security HardeningWordPress Security Hardening
WordPress Security Hardening
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
WordPress security
WordPress securityWordPress security
WordPress security
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Making Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking itMaking Joomla Insecure - Explaining security by breaking it
Making Joomla Insecure - Explaining security by breaking it
 
Php My Sql Security 2007
Php My Sql Security 2007Php My Sql Security 2007
Php My Sql Security 2007
 
Avoid Getting Hacked! Presentation on Joomla! Web Security
Avoid Getting Hacked! Presentation on Joomla! Web Security Avoid Getting Hacked! Presentation on Joomla! Web Security
Avoid Getting Hacked! Presentation on Joomla! Web Security
 

Joomla Security