[WEB]
[SECURITY]
Web SecurityWeb Security
“Web security is an important issue, and with a slew
of recent hacking attacks, it is that much m...
Section One:Section One:
PersonalPersonal
ProtectionProtection
“This section is all about protecting yourself,
your comput...
Section One: Personal Protection
Password Creation & ManagementPassword Creation & Management
Password creation and manage...
Password Creation & Management
The following steps will ensure you create great passwords:
Avoid The ObviousAvoid The Obvi...
In Fact Don’t Even Use a WordIn Fact Don’t Even Use a Word
No matter how clever you think you are - don’t even choose a wo...
Following are some points you need to consider about HOW
to use these great passwords.
1. Have More Than One1. Have More T...
B Level - These passwords are also important, and while
getting hacked could cause trouble, the hacker won’t be able
to cl...
2. Change Password if Compromised2. Change Password if Compromised
If you ever have your password compromised - then you n...
Free Programs to ProtectFree Programs to Protect
Your Computer fromYour Computer from
VirusesViruses
“Speaking of preventi...
Free Programs to Protect Your Computer from
Viruses
Best Free Anti Virus Programs
1. AVG anti-virus protection1. AVG anti-...
Best Free Anti Virus Programs
3. Avira anti-virus protection
This software is not a resource hog and will perform just as
...
Free Programs to Protect Your Computer from
Viruses
Other Free Web Security Programs
SpyBot Search and DestroySpyBot Searc...
How to Tell When Your
Computer is Infected with a
Virus
“Getting infected with an unknown virus is
the last thing that you...
How to Tell When Your Computer is Infected
with a Virus
Here, are some indications that your computer is
infected:
•If you...
How to Tell When Your Computer is Infected
with a Virus
c. You receive messages informing you that you can’t
access the dr...
Spotting Online Scams
“There are people who can easily identify
online scams, but those who are still
learning have the te...
Spotting Online Scams
If you wish to avoid these traps, here are some simple tips
that can help you:
•Beware of Unknown/We...
Spotting Online Scams
3. Beware Downloads:3. Beware Downloads:
We all love downloading stuff, but you have to be careful.
...
Spotting Online Scams
5. Be Careful With Your Money:5. Be Careful With Your Money:
Don’t toss your money around! Be carefu...
Securing Your Wi-Fi
Connection
“One of the biggest internet developments in
recent years has been the explosive
proliferat...
Securing Your Wi-Fi Connection
If you use a Wi-Fi internet connection, it is recommended to secure
it with a password. It ...
Securing Your Wi-Fi Connection
Don’t forget to change your network’s SSID name:Don’t forget to change your network’s SSID ...
Internet Security Best
Practices
“In a world where everything can happen
on the web, security is always the first
priority...
Internet Security Best Practices
Use Parental ControlsUse Parental Controls
If you have children who use the internet, it ...
Internet Security Best Practices
Avoid Nefarious Areas of the WebAvoid Nefarious Areas of the Web
If you are dealing with ...
Internet Security Best Practices
Practice Safe BrowsingPractice Safe Browsing
Do not browse without protection - this come...
Internet Security Best Practices
Be Careful with Thumb DrivesBe Careful with Thumb Drives
Be careful where you use portabl...
Updates Your Anti-Virus RegularlyUpdates Your Anti-Virus Regularly
Your anti-virus program has a database of known viruses...
Section Two:
Protecting Your
Website(s)
“Another big aspect of web security is securing your
own websites. This is especia...
Section Two: Protecting Your Website(s)
How to Properly Back Up Your WebsiteHow to Properly Back Up Your Website
While thi...
Section Two: Protecting Your Website(s)
Backing Up Your Website
Check With Your Host:Check With Your Host:
The first thing...
Backing Up Your Website
Copy Database:Copy Database:
If you are wondering if you have a database or not, remember
any CMS ...
Section Two: Protecting Your Website(s)
There are many third party programs and applications out there
that can help you w...
Basic Guide to Website
Security Best Practices
“Every online user wants to have a secured
time in online while browsing th...
Basic Guide to Website Security Best Practices
If you want to take the basic steps that every webmaster
should, then follo...
Basic Guide to Website Security Best Practices
3. Choose Good Login Names3. Choose Good Login Names
The login name is anot...
Basic Guide to Website Security Best Practices
6. Turn Off Directory Listings6. Turn Off Directory Listings
By default the...
Basic Guide to Website Security Best Practices
8. Apache: Mod_Security:8. Apache: Mod_Security:
This is a step for the tec...
Securing Your WordPress
Site With Plugins
“One of the things about WordPress is that it
is Open Source software, so anyone...
Securing Your WordPress Site With Plugins
WP Security ScanWP Security Scan
This plugin will scan your system and find pote...
Securing Your WordPress Site With Plugins
Login LockdownLogin Lockdown
This plugin will monitor the IP addresses of anyone...
Securing Your WordPress Site With Plugins
BulletProof SecurityBulletProof Security
The BulletProof Security WordPress plug...
Securing Your WordPress Site With Plugins
BackupCreator (PAID)BackupCreator (PAID)
This premium (paid) plugin is the perfe...
Conclusion
“Web and website security has never been more
important. Malicious software, spyware, viruses and
SPAM are prol...
Thank You
Visit my Blog
marcomoeschter.com
(just click on it)
LEARN HOW YOU CAN PROTECT
YOURSELF AGAINST BRUTEFORCE
ATTACK...
Upcoming SlideShare
Loading in …5
×

Protect Your Web Security! Don’t become another online attack statistic!

640 views

Published on

Web security is an important issue, and with a slew of recent hacking attacks, it is that much more essential that you know how to protect yourself.

Protecting your personal information and computer is important for ANY internet user. Everyone is a potential victim, and the less you know about protecting yourself, then the more likely you will be a target.

Don’t wait to address your web security until you are attacked. At that point it might be too late! When it comes to protecting yourself and your websites, prevention of attacks, is much easier than treatment.”

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
640
On SlideShare
0
From Embeds
0
Number of Embeds
27
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Protect Your Web Security! Don’t become another online attack statistic!

  1. 1. [WEB] [SECURITY]
  2. 2. Web SecurityWeb Security “Web security is an important issue, and with a slew of recent hacking attacks, it is that much more essential that you know how to protect yourself. Protecting your personal information and computer is important for ANY internet user. Everyone is a potential victim, and the less you know about protecting yourself, then the more likely you will be a target. Don’t wait to address your web security until you are attacked. At that point it might be too late! When it comes to protecting yourself and your websites, prevention of attacks, is much easier than treatment.”
  3. 3. Section One:Section One: PersonalPersonal ProtectionProtection “This section is all about protecting yourself, your computer and your personal information.”
  4. 4. Section One: Personal Protection Password Creation & ManagementPassword Creation & Management Password creation and management is one of the first things you should consider when thinking about web security. This is the very base of your pyramid of web security. Knowing how to properly create and manage strong passwords is the perfect place to start the security discussion.
  5. 5. Password Creation & Management The following steps will ensure you create great passwords: Avoid The ObviousAvoid The Obvious The first thing you have to do is avoid the obvious. Do not use anything like your name, birthdate or even any of your interests. Don’t choose something that someone could guess! You will also want to avoid the common passwords that every noob uses. The top ten most used passwords list (shown below - courtesy of Huffington Post) then you are a noob! 123456 princess 12345 rockyou 123456789 1234567 Password 12345678 Iloveyou abc123
  6. 6. In Fact Don’t Even Use a WordIn Fact Don’t Even Use a Word No matter how clever you think you are - don’t even choose a word - English or foreign. Any word that can be found in the dictionary can be cracked using a brute force attack. Sorry, Size MattersSorry, Size Matters Know it is easier to remember 5 digits than 9, but guess what? Size counts! If you chose a random string of 6 lowercase letters (or worse a 6 letter word) it would take 10 minutes for a hacker to use a brute force attack to figure that password out. Mix Up CharactersMix Up Characters To maximize your password’s security you need to mix up your characters. This means you need to add symbols (%@#), numbers and mix up the case of your letters (capitals and lower case). Password Creation & Management
  7. 7. Following are some points you need to consider about HOW to use these great passwords. 1. Have More Than One1. Have More Than One Don’t use the same password everywhere on the web. If you do, you highly increase the chance of having it compromised. If someone is able to glean your password on one site they may be able to put 2 and 2 together, and access other accounts you own. You can break down your passwords into 3 categories: A Level - These are passwords that are super important, and direct access to them could directly lead to financial trouble. (i.e. Online Banking or Paypal) Password Creation & Management
  8. 8. B Level - These passwords are also important, and while getting hacked could cause trouble, the hacker won’t be able to clear a bank account, or run up credit. (i.e. eMail, Twitter or Facebook) C Level - These passwords are for random free accounts online. (i.e. Message Board, Blog Comments or Fantasy Sports) “You can also make your own categories if you want. Use your own common sense when deciding which category a password would fit in.” Password Creation & Management
  9. 9. 2. Change Password if Compromised2. Change Password if Compromised If you ever have your password compromised - then you need to change it ASAP. Not only do you have to change the compromised password, you also have to change all of the other accounts tied to that password. 3. Don’t Be Afraid to Use Software3. Don’t Be Afraid to Use Software For people who have a whole bunch of passwords, you can consider using software for password management. There is paid software that can help you out. “If you follow these three tips, your passwords will be managed about as well as they can be. Remember, even if you haven’t been compromised, you should still consider changing your password every 6 months or so. This might seem like a hassle, but it will help ensure your online safety.” Password Creation & Management
  10. 10. Free Programs to ProtectFree Programs to Protect Your Computer fromYour Computer from VirusesViruses “Speaking of prevention, anyone who is planning to surf the web, should make sure they have some security software installed BEFORE they go online. At the very least a good virus protection program should be running. The good news is there are great free programs to do just that!”
  11. 11. Free Programs to Protect Your Computer from Viruses Best Free Anti Virus Programs 1. AVG anti-virus protection1. AVG anti-virus protection This software is simple to use and effective. The installation instructions are so easy that even a “non-techie” can do. It was also rated to be the top program when it comes to detection of threats as determined by independent testing laboratories. 2. Avast anti-virus protection2. Avast anti-virus protection It has the maximum protection for your computer and the technology it uses can be tailored by the user. It also provides a comprehensive filter and reliable website ratings. Its unique features are media player, root kit detection and built-in spyware.
  12. 12. Best Free Anti Virus Programs 3. Avira anti-virus protection This software is not a resource hog and will perform just as well as most paid options. It does not have the capability to scan e-mails. With this, it is advised to run additional software for e-mails to complete your anti-virus protection. NOTE: If you have a legit copy of Windows, then you can use Microsoft Security Essentials. In our opinion it is the best free anti-virus out there right now, and I would consider using it before most paid programs in fact. If you insist on a paid choice - then Kaspersky is the highest rated anti-virus in tech circles.
  13. 13. Free Programs to Protect Your Computer from Viruses Other Free Web Security Programs SpyBot Search and DestroySpyBot Search and Destroy This is a software tool designed to find spyware (and other types of malware) and destroy it. Spyware can do a variety of nasty things, but at the very least it clogs and slows down your computer. This program will find it, and destroy it. A tool like this does require a bit of tech know how. Malware BytesMalware Bytes This is the program you turn to when NOTHING else will work. The free version does a great job of removing spyware and viruses. One of the benefits of this program is it has a much better chance of running properly on an infected computer, than other programs.
  14. 14. How to Tell When Your Computer is Infected with a Virus “Getting infected with an unknown virus is the last thing that you want to happen. When your computer is infected, you want to fix it as soon as possible. Not being able to detect the virus right away can cause a great amount of damage, not just on your computer but also on your important files.”
  15. 15. How to Tell When Your Computer is Infected with a Virus Here, are some indications that your computer is infected: •If you are using anti-virus software, a notification will give an update informing you of the threat. As it scans your computer regularly, it also provides updates like virus detections. 2. If you are not using any anti-virus software, or if the virus got by your antivirus, there are different indications that your computer has a virus. Some of them are the following: •Your computer suddenly becomes unstable. •Your computer runs slower than usual.
  16. 16. How to Tell When Your Computer is Infected with a Virus c. You receive messages informing you that you can’t access the drives on your computer. d. You notice that the sizes of your files change even without modifying or accessing them. e. If you see that your menus look distorted or odd, that definitely is a sign of virus. f. The virus might be bold enough to come right out and tell you that you are infected. g. You might lose control of your computer, the screen will change, mouse will rush around, programs will open etc...
  17. 17. Spotting Online Scams “There are people who can easily identify online scams, but those who are still learning have the tendency to fall for them. In general, people new to the internet are more bound to fall for these, but everyday, even savvy people bite on these scams.”
  18. 18. Spotting Online Scams If you wish to avoid these traps, here are some simple tips that can help you: •Beware of Unknown/Weird Email:Beware of Unknown/Weird Email: Scammers usually send emails to every e-mail address they can scrape from the web. Many times you will see that emails have a random link in them – avoid those. Email scammers these days, hack people’s email accounts and then send emails to their address book. This makes the scam look more believable. 2. Do Not Go to Shady Websites:2. Do Not Go to Shady Websites: If you ever end up on a shady looking website - don’t click any links and download anything. Close your browser window or navigate to another site. If you accidentally opened an unknown site and you notice a pop-up warning, close it or leave the site immediately.
  19. 19. Spotting Online Scams 3. Beware Downloads:3. Beware Downloads: We all love downloading stuff, but you have to be careful. Anything like frostwire or limewire is a breeding ground for bad files, viruses and spyware. Torrents aren’t much better these days. Websites like filestube are full of fake downloads waiting to feast on your computer as well. Even “file locker” sites like Zshare have been known to spread serious viruses. 4. Too Good to be True?:4. Too Good to be True?: You know the old adage, if it seems too good to be true, it probably is. Keep that in mind when navigating the web. If you see a pop up saying you won a free ipad for doing nothing, or you are the millionth visitor to a website - click here...avoid the allure. 99.99% of the time these are hoaxes.
  20. 20. Spotting Online Scams 5. Be Careful With Your Money:5. Be Careful With Your Money: Don’t toss your money around! Be careful with it. Never ever send anyone money on the internet who promises to send you more back. That is an old scam. Don’t sign up for any free offers that require a credit card either. Why would they need your credit card if it is a free offer? “Spotting online scams may sometimes be challenging to those who are new to using the internet. However, once you are a little more computer savvy, it will be a piece of cake. When going online, always practice safety and security for you never know when you will become the next target.”
  21. 21. Securing Your Wi-Fi Connection “One of the biggest internet developments in recent years has been the explosive proliferation of Wi-Fi. This explosion of Wi-Fi makes sense when you see how much more mobile computing has become. If you have this wireless internet technology in your home - you need to keep it secure. An unsecured Wi-Fi connection is another way that hackers can attack you.”
  22. 22. Securing Your Wi-Fi Connection If you use a Wi-Fi internet connection, it is recommended to secure it with a password. It is strongly suggested, you create a password so that unauthorized users can’t access it. If you don’t protect your Wi-Fi connection, you are open to hackers using your connection for illegal activity. The first line of defense is a password:The first line of defense is a password: You will want to log into your router and set up a password. Most routers have a default password, but it is likely something really bad like “password”. Next line of defense; encryption:Next line of defense; encryption: Unfortunately, most wireless routers don’t have encryption on as a default. You should enable encryption right away. Use the strongest version of encryption that your network allows.
  23. 23. Securing Your Wi-Fi Connection Don’t forget to change your network’s SSID name:Don’t forget to change your network’s SSID name: Each router will have a name but most of them are something generic like “default”. Take the time to rename yours to whatever you want. Filter MAC Addresses:Filter MAC Addresses: If you are an advanced user you can even set up your Wi-Fi to filter by MAC addresses. Every laptop or Wi-Fi enabled mobile phone has a unique MAC address. You can set up your router so only certain devices can ever access it.
  24. 24. Internet Security Best Practices “In a world where everything can happen on the web, security is always the first priority. Everything happens so fast, and in just one click, you can get what you want. In spite of this convenience in just a click, you can get exactly what you don’t want.”
  25. 25. Internet Security Best Practices Use Parental ControlsUse Parental Controls If you have children who use the internet, it is important to set your parental controls, so they won’t be allowed to access unauthorized sites. Secure Your BrowserSecure Your Browser Your browser is the tool you use to get on the internet. It can also be your first line of defense. My two favorite are AdBlockPlus and NoScript. AdBlockPlus will block many annoying and potentially dangerous ads. NoScript will block any type of scripts from loading in the background of a website. Use Good PasswordsUse Good Passwords You control your passwords, control them properly.
  26. 26. Internet Security Best Practices Avoid Nefarious Areas of the WebAvoid Nefarious Areas of the Web If you are dealing with pornography, or illegal downloads, serial cracks etc... you better be careful. These areas are bad news and breeding grounds for viruses and spyware. Consider Apple ProductsConsider Apple Products I am not a company shill, and I am not saying the premium price is worth it, but if you are really word about viruses – get a Mac. Be Careful With Your Personal InformationBe Careful With Your Personal Information Unless you want Viagra ads emailed to you 7000 times a day, you better be careful where you give out your email. Some online businesses will require this for purchase, and that is OK, however make sure it is a reputable site.
  27. 27. Internet Security Best Practices Practice Safe BrowsingPractice Safe Browsing Do not browse without protection - this comes in the form of an anti-virus program. Be Careful With “Toolbars”Be Careful With “Toolbars” A lot of programs you download will offer you the option of also installing a toolbar. Avoid these. Even if they don’t include spyware (and many do) they bog down your browser. If it is Too Good to be True it Probably isIf it is Too Good to be True it Probably is The classic adage, it is self explanatory.
  28. 28. Internet Security Best Practices Be Careful with Thumb DrivesBe Careful with Thumb Drives Be careful where you use portable thumb drives. If you use them on an unprotected computer, a virus can copy itself there and then infect your computer next time you plug it in. Don’t Open Unsolicited Email AttachmentsDon’t Open Unsolicited Email Attachments Don’t open any email attachments you didn’t expect coming. This is a classic way to send viruses. Run Your Anti-Virus RegularlyRun Your Anti-Virus Regularly It is important to make sure you find any viruses as soon as possible. You can usually set it to auto run at times when you don’t need the computer.
  29. 29. Updates Your Anti-Virus RegularlyUpdates Your Anti-Virus Regularly Your anti-virus program has a database of known viruses, and how to fix them. Since new viruses are coming out daily, this database needs to be updated regularly. Make Sure Site is Secure Before Giving SensitiveMake Sure Site is Secure Before Giving Sensitive InformationInformation Check out the address bar of your web browser, if the site really is secure there should be an s after the http (https://). There should also be a lock icon somewhere in the address bar; this will tell you what level of encryption the site uses. Internet Security Best Practices
  30. 30. Section Two: Protecting Your Website(s) “Another big aspect of web security is securing your own websites. This is especially important to people who work online (like online marketers), but it is also important for the hobbyist. Basically, anyone who has a website should take some basic precautions to ensure security.”
  31. 31. Section Two: Protecting Your Website(s) How to Properly Back Up Your WebsiteHow to Properly Back Up Your Website While this may not seem like a “security” step, it is probably the single most important step you can take to ensure your website is safe. Your website will always be somewhat susceptible to a “worst case scenario”. Having a recent backup is the only way to 100% ensure you can restore your website.
  32. 32. Section Two: Protecting Your Website(s) Backing Up Your Website Check With Your Host:Check With Your Host: The first thing you should do is figure out how your host handles website backups. Check and find out how often they do automatic backups. Some premium hosting packages may handle backups for you. You can still backup yourself to be doubly sure though. Copy Your Files:Copy Your Files: A simple step you can take is to back up all of your website files. The easiest way to do this is to access your site via FTP and then download the entire public_html folder of your website.
  33. 33. Backing Up Your Website Copy Database:Copy Database: If you are wondering if you have a database or not, remember any CMS type of web platform (like WordPress) will use a database. With most hosting packages (not all) you will have some kind of control panel to manage your sites. The most commonly used is cPanel. If you don’t have a control panel, contact your web host and ask them about backing up MySQL databases. Export:Export: This step is for people who use CMS/Blogging platforms for their websites. Since WordPress (and similar) programs are so popular, it is worth a mention. This exporting step is also helpful for those people who host their site on a free host like WordPress.com or Blogger.
  34. 34. Section Two: Protecting Your Website(s) There are many third party programs and applications out there that can help you with backups. There is a world of choices out there but here are just a few: WP -> Dropbox Plugin:WP -> Dropbox Plugin: This simple WordPress plugin will backup your WordPress installation to DropBox at a specified frequency. BackupMachine:BackupMachine: Backup machine offers free backups, as well as a premium service that will back up your website and database daily. DropMySite:DropMySite: This is a very simple, bare bones program that will automatically backup your site, email and databases into cloud storage.
  35. 35. Basic Guide to Website Security Best Practices “Every online user wants to have a secured time in online while browsing the web. Whether you own a website or you are just a visitor, you should definitely demand safety. As a business owner, you want to make your customers feel safe when visiting your site.”
  36. 36. Basic Guide to Website Security Best Practices If you want to take the basic steps that every webmaster should, then follow the steps below: 1.1.BackupBackup See previous section. 2. Assess Third Party Vulnerabilities2. Assess Third Party Vulnerabilities If you are using any third party website platforms (WordPress, Joomla, etc...), plugins, themes or other software, then make sure you assess their vulnerabilities. To limit your vulnerabilities make sure you have the latest stable version of any software or scripts you use on your website.
  37. 37. Basic Guide to Website Security Best Practices 3. Choose Good Login Names3. Choose Good Login Names The login name is another area where you can throw in some variety to stifle potential hackers. Whether it is a log in name for your FTP, your database or a WordPress installation make sure you don’t just stick with the default, something like “admin” is a bad choice. 4. Choose Good Passwords4. Choose Good Passwords The same rules for protecting your home computer, apply here. 5. Encrypt Your Database5. Encrypt Your Database Make sure you use some sort of encryption for any passwordsMake sure you use some sort of encryption for any passwords that are in a database.that are in a database. If you use WordPress, it encrypts passwords in your database automatically.
  38. 38. Basic Guide to Website Security Best Practices 6. Turn Off Directory Listings6. Turn Off Directory Listings By default the directories on your site that don’t have an index.htm in them, like say an image directory, will display a list of all files in that folder if someone stumbles across it. To avoid this, simply throw a blank index.htm into the directory. 7. Access Your Site From Secure Computer7. Access Your Site From Secure Computer Make sure you access the backend your website from a computer that is properly secure. Don’t FTP into your website at the local Starbucks.
  39. 39. Basic Guide to Website Security Best Practices 8. Apache: Mod_Security:8. Apache: Mod_Security: This is a step for the tech savvy. First thing to consider is some hosts won’t support this, so check if yours does. If they do - ask them about setting up the Apache mod_security. This will block “bad” requests. “You can never reach 100% security, but this list will help you avoid the most common and simplest of hacks. The most important step of course is – back up your website! If the worst case scenario hits, you will be happy you did!”
  40. 40. Securing Your WordPress Site With Plugins “One of the things about WordPress is that it is Open Source software, so anyone can get and view all of the code. The bad news - hackers can scour the code for vulnerabilities. The good news - 100s of really smart people are scouring the same code to find and fix those vulnerabilities first. More good news is that people create plugins that help you secure your WordPress website more thoroughly.”
  41. 41. Securing Your WordPress Site With Plugins WP Security ScanWP Security Scan This plugin will scan your system and find potential vulnerabilities. It will then suggest fixes. AdminSSLAdminSSL This plugin will force any of your pages that require an email, to be secure (https://) pages. TAC – Theme Authenticity CheckerTAC – Theme Authenticity Checker This plugin will monitor any installed themes you have for malicious code.
  42. 42. Securing Your WordPress Site With Plugins Login LockdownLogin Lockdown This plugin will monitor the IP addresses of anyone trying to log in to your site. If it records a certain amount of failed attempts in a certain time frame, it will lock that IP address down. This helps avoid automated brute force attacks. Hide LoginHide Login Hide Login will allow you to move your login page to an URL that is easier to remember and/or cryptic enough someone can’t guess it. AntivirusAntivirus This plugin will monitor your WordPress site for malware, exploits and spam injection. Its runs daily.
  43. 43. Securing Your WordPress Site With Plugins BulletProof SecurityBulletProof Security The BulletProof Security WordPress plugin is a one click security solution that creates, copies, renames, moves or writes to the provided BulletProof Security .htaccess master files. BulletProof Security protects both your Root website folder and wp-admin folder with .htaccess website security protection, as well as providing additional website security protection. AkismetAkismet The classic WordPress comment plugin. It comes with WordPress installations for a reason - it works and it is important. Activating this simple plugin will dramatically reduce the crappy SPAM comments you receive.
  44. 44. Securing Your WordPress Site With Plugins BackupCreator (PAID)BackupCreator (PAID) This premium (paid) plugin is the perfect backup solution for your WordPress blog. It will allow you to easily backup and restore your entire WordPress installation. “These plugins won’t make your site impenetrable, but it will make it much harder to successfully attack. WordPress is a powerful website platform, but it can be vulnerable to attack - use these plugins to eliminate those vulnerabilities.”
  45. 45. Conclusion “Web and website security has never been more important. Malicious software, spyware, viruses and SPAM are proliferating at all time highs and more people are getting infected or hacked because of it. In order to be safe, you need to be proactive - not reactive. This guide will help you become proactive. Making sure you address vulnerabilities before they are exploited, installing the proper security measures and creating backups for anything important are all proactive steps. Don’t become another online attack statistic. Read the information, re-read it - and then put the suggestions in place.”
  46. 46. Thank You Visit my Blog marcomoeschter.com (just click on it) LEARN HOW YOU CAN PROTECT YOURSELF AGAINST BRUTEFORCE ATTACKS, HACKERS, MALICIOUS SHENANIGANS, AND MUCH MUCH MORE… CLICK HERE 46

×