HomeArticlesIn ActionContact
WordPress Security

Get your FREE ebook on WordPress Security Today!

We will send you a copy of our ebook that you can upload to your iPad, tablet, Kindle, Nook, or iPhone!

We respect your email privacy

Share this!

Who Should Read This Book

This eBook is targeted primarily for the business community as consumers of web design, marketing and development solution providers. It is also of value to those same solution providers such that better understanding of these topics and the issues presented and will help them to better serve their customers.

Table of Contents - 21 pages

Sample excerpt from ebook

Overview of Security Basics

Security is not about having a perfectly secure website. This might be possible in theory, but not practical in practice, unless that is all you want to do with your life. It would also require that you have complete control of every aspect of your hosting hardware, software, as well as your website files, of which most small business owners do not. The security requirements can be different for each website so it is important to understand the basic security concepts so that you can apply these to your individual needs. You aren't the DOD (Depart of Defense) and you also don't have their budget, therefore your needs will be a bit more modest.

Your Hosting Provider

Security begins with your hosting providers hardware and system. A secure server should protect and balance the privacy, integrity and availability of the resources (your website) that it delivers to the users of your website.

Qualities of a trusted hosting provider might include:

Security Strategies

Good security focuses on three very basic concepts. At each level of reviewing your security each of these concepts should be part of that strategy. They are:

  1. Controlling and Limiting access - Making smart choices that reduce possible entry points available to a malicious person.
  2. Containment - Your system should be configured to minimize the amount of damage that can be done in the event that it is compromised.
  3. Preparation and knowledge - Keeping backups and knowing the state of your WordPress installation at regular intervals. Having a plan to backup and recover your installation in the case of catastrophe can help you get back online faster in the case of a problem.

What do you need to secure?

Until you spend some time thinking about security, it is easy to think that all the security efforts only happen AT your website. This is not the case and this attitude would expose your site to a host of vulnerabilities. Let's review all of the components you need to consider.

  1. Your computer and its software – Make sure the computer you use to manage your site is free of spyware, malware, and virus infections. No amount of security on the rest of the components below will make the slightest difference if there is a keylogger on YOUR computer.
  2. Your website software (in this case WordPress) - Like many modern software packages, WordPress is updated regularly to address new security issues that may arise. Improving software security is always an ongoing concern, and to that end you should always keep up to date with the latest version of WordPress. Older versions of WordPress are not maintained with security updates.
  3. Your web server hardware and software. - Review with your hosting provider their security policies. Specifically how they keep their system up to date, their firewalls, and other security strategies.
  4. The Network - The network on both ends -- the WordPress server side and the client network side -- should be trusted. That means updating firewall rules on your home router and being careful about what networks you work from. An Internet cafe where you are sending passwords over an unencrypted connection, wireless or otherwise, is not a trusted network.
  5. Passwords – Understand the concept of a STRONG password. Basically mixing case, numbers, letters and other symbols (-,+,!,#). A strong password is necessary not just to protect your website content. A hacker who gains access to your administrator account is able to install malicious scripts that can potentially compromise your entire server.
  6. File management software (FTP, SFTP, HTTPS). FTP is fundamentally insecure. You should be using SFTP at the least or a HTTPS file manager to access you site files.
  7. Your Site's file permissions – Most webservers will control the file permissions of your site for you. Limiting access to specific system users to limit access to those files in your site folder. This is part of the containment strategy. If you do have the ability to change permissions do that with caution and with an understanding of how that might compromise your system.
  8. You Site's Database – Most hosting services limit access to your database to a specific user id and password. The strength of your password is important. If you do have direct control of your database you should review the literature on securing your database.


Sign up for PayPal and start accepting credit card payments instantly.