{"id":1514,"date":"2020-09-17T10:05:00","date_gmt":"2020-09-17T10:05:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1514"},"modified":"2020-09-24T16:43:18","modified_gmt":"2020-09-24T16:43:18","slug":"wordpress-security-ultimate-guide","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/","title":{"rendered":"WP Security: The Ultimate Guide to WordPress Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Make yours a s<\/strong><strong>ecure WordPress site with these 10 proven, easy-to-implement tips and keep the hackers a<\/strong><strong>way&nbsp;<\/strong>&nbsp;&nbsp;<\/h2>\n\n\n\n<p>WordPress is a real blessing for bloggers,\u00a0freelancers,\u00a0and startup business owners. You\u00a0don&#8217;t\u00a0need to pay thousands of dollars for software development and maintenance. Anyone can simply learn WordPress with online tutorials and start\u00a0promoting\u00a0their\u00a0business, products, or services\u00a0right away. But what about\u00a0WordPress security?\u00a0<a href=\"https:\/\/blog.sucuri.net\/2019\/03\/hacked-website-trend-report-2018.html\" target=\"_blank\" rel=\"noreferrer noopener\">Sucuri<\/a> reports that 90%\u00a0(i.e., 9 out of 10)\u00a0of their total clean-up requests are\u00a0from\u00a0WordPress\u00a0sites.\u00a0\u00a0<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security-vulnerability-statistics.png\" alt=\"\" class=\"wp-image-1517\" width=\"350\" height=\"202\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security-vulnerability-statistics.png 699w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security-vulnerability-statistics-300x174.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security-vulnerability-statistics-560x324.png 560w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><figcaption>Data source: <a href=\"https:\/\/wpvulndb.com\/statistics\">Wpvulndb.<\/a><a href=\"https:\/\/wpvulndb.com\/statistics\" target=\"_blank\" rel=\"noreferrer noopener\">c<\/a><a href=\"https:\/\/wpvulndb.com\/statistics\">om<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>Because WordPress\u00a0is an\u00a0open-source technology, anyone can make plugin and theme.\u00a0These plugins and themes might have a weak security structure or contain malware.\u00a0<a href=\"https:\/\/wpvulndb.com\/statistics\" target=\"_blank\" rel=\"noreferrer noopener\">Wpvulndb.com reports<\/a>\u00a0that they have a total of 21,785 vulnerabilities in their database\u00a0\u2014\u00a0of these vulnerabilities,\u00a080%\u00a0are\u00a0WordPress, 17.8% are plugins, and 2%\u00a0are theme.\u00a0<\/p>\n\n\n\n<p>The irony is that startups generally choose WordPress because\u00a0they have\u00a0a tight budget, lack programming knowledge, or\u00a0are looking for an easy-to-use platform. If you\u2019re\u00a0one of them, you might be asking, &#8220;<em>So, do I have to hire a techie and spend thousands on securing my website<\/em>?\u201d\u00a0The answer is, &#8220;No.&#8221;\u00a0\u00a0<\/p>\n\n\n\n<p>In this article, we\u2019ll&nbsp;cover&nbsp;10&nbsp;proven and powerful tips to secure WordPress sites. The plugins and products suggested in the article are either free or inexpensive.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>10 Proven Tricks to&nbsp;<\/strong><strong>Make Yours a&nbsp;<\/strong><strong>S<\/strong><strong>ecure WordPress Site<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We have included some of the best freemium or least expensive security plugins and tools that are easy to use and&nbsp;won&#8217;t&nbsp;add burden to your pockets.&nbsp;Even a non-tech savvy person can instantly apply these tips to secure WordPress sites.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security Tip&nbsp;<\/strong><strong>1<\/strong><strong>:<\/strong><strong>&nbsp;Block Malicious and&nbsp;<\/strong><strong>S<\/strong><strong>pam&nbsp;<\/strong><strong>C<\/strong><strong>omments<\/strong>&nbsp;<\/h3>\n\n\n\n<p><strong>How:<\/strong>&nbsp;Install plugins like&nbsp;<a href=\"https:\/\/akismet.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Akismet<\/a>,&nbsp;<a href=\"https:\/\/cleantalk.org\/price-anti-spam\" target=\"_blank\" rel=\"noreferrer noopener\">CleanTalk<\/a>, or&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/antispam-bee\/\" target=\"_blank\" rel=\"noreferrer noopener\">Antispam Bee<\/a>&nbsp;to detect and remove spammy&nbsp;and malicious&nbsp;comments.&nbsp;<\/p>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>If you have a blog or discussion section that allows people to post comments, you must be beware of malicious comments.&nbsp;The hackers write scripts and codes in the comments to hack the website or get inside the WordPress database. They also insert backlinks to their website and unsolicited advertisements about their product\/service.&nbsp;<a href=\"https:\/\/akismet.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Akismet<\/a>, a WP security plugin to remove malicious comments,\u202fhas blocked&nbsp;more than&nbsp;503&nbsp;billion spam comments&nbsp;to date\u202f(as of&nbsp;Sept.&nbsp;24, 2020).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security&nbsp;<\/strong><strong>Tip&nbsp;<\/strong><strong>2<\/strong><strong>: Limit Login Attempts&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p><strong>How<\/strong>: Install plugins like&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/wp-limit-login-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Limit Login Attempts<\/a><strong>,&nbsp;<\/strong><a href=\"https:\/\/wordpress.org\/plugins\/loginizer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Loginizer<\/a>,<strong>&nbsp;<\/strong>or<strong>&nbsp;<\/strong><a href=\"https:\/\/wordpress.org\/plugins\/wps-limit-login\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPS Limit Login<\/a>, to enable login lockdown feature to&nbsp;secure WordPress site.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>All WordPress sites allow unlimited login attempts by default.&nbsp;That means users have unlimited chances to insert&nbsp;their&nbsp;user IDs&nbsp;and passwords&nbsp;in the login field until they figure out the right credentials.&nbsp;This lack of control is very appealing to hackers&nbsp;who can&nbsp;exploit this feature&nbsp;with&nbsp;<a href=\"https:\/\/medium.com\/@Protectimus\/how-does-brute-force-attack-work-38a883c0275f\" target=\"_blank\" rel=\"noreferrer noopener\">brute force attacks<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">type of\u00a0cyber\u00a0attack<\/a>,\u00a0hackers\u00a0use a script or bot to apply a\u00a0database of\u00a0pre-guessed\u00a0user IDs\u00a0and passwords automatically\u00a0to websites\u2019 login fields\u00a0until\u00a0one of the attempts is successful.\u00a0Sometimes a\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/botnet-attacks-what-is-a-botnet-how-does-it-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">botnet<\/a>\u00a0is used, where\u00a0a large number of\u00a0infected devices deploy the brute force attack on a targeted login field.\u00a0<\/p>\n\n\n\n<p>The best way to prevent brute force attacks is by limiting the number of logins attempts a user can make in a specific period. After the\u00a0set\u00a0number of failed login attempts\u00a0(generally 3 to 5), the system temporarily blocks the user\/IP\u00a0address.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security Tip 3: Regularly Scan Your Website<\/strong><\/h3>\n\n\n\n<p><strong>How<\/strong>: Install WordPress security scanners\u00a0and firewalls to detect and remove threats. One such example is\u00a0<a href=\"https:\/\/www.thesslstore.com\/comodo\/cwatch-web.aspx#cwatchlist\" target=\"_blank\" rel=\"noreferrer noopener\">cWatch<\/a>, scans your website and provides detailed reports on a variety of threats and vulnerabilities, including malware, brute force attacks, and DDoS attacks. Sectigo&#8217;s <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-proof-trust-mark-vulnerability-scan\">HackerProof Trust Mark<\/a> provides scans of your website on a daily basis to identify vulnerabilities and offer actionable intelligence on mitigation.<\/p>\n\n\n\n<p><strong>Why<\/strong>: Cybersecurity is an ongoing process that often involves detecting and removing malware. You need a malware scanner and firewall that monitors your website 24\/7 for\u00a0cyber\u00a0attacks\u00a0and malware-related threats. It must\u00a0be efficient\u00a0enough to remove the malware, block suspicious IPs, and prevent the\u00a0cyber\u00a0attack\u00a0in the initial stage only to cease further damage.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security&nbsp;<\/strong><strong>Tip 4:&nbsp;<\/strong><strong>Encrypt Website Data Exchanges&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p><strong>How:&nbsp;<\/strong>Install an&nbsp;<a href=\"https:\/\/sectigostore.com\/ssl-certificates\" target=\"_blank\" rel=\"noreferrer noopener\">SSL\/TLS&nbsp;<\/a>certificate&nbsp;on your website.<strong>&nbsp;<\/strong>It&#8217;s&nbsp;always best to choose a commercial TLS certificate because the free ones don&#8217;t come with any sort of support or warranty&nbsp;in the event that&nbsp;something goes wrong. And paid commercial certificates won&#8217;t break the bank, either&nbsp;\u2014&nbsp;in fact, many&nbsp;cost&nbsp;less than $10 per year!&nbsp;Use the&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/really-simple-ssl\/\" target=\"_blank\" rel=\"noreferrer noopener\">Really Simple SSL<\/a><strong>&nbsp;<\/strong>plugin to ease the installation process.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Why<\/strong>: If you&nbsp;don\u2019t&nbsp;install an SSL\/TLS certificate,&nbsp;all the browsers will show a &#8220;<strong>Not secure<\/strong>\u201d&nbsp;warning next to&nbsp;your domain name in the address bar.&nbsp;This message&nbsp;indicates&nbsp;a major security flaw, showing&nbsp;that the data your users&#8217; browsers and your server&nbsp;exchange&nbsp;is unencrypted. Hence, if the hacker breaks the internet network and gets access to&nbsp;the data, they can read, interpret,&nbsp;modify, and steal it.&nbsp;Your website will be vulnerable to&nbsp;<a href=\"https:\/\/www.thesslstore.com\/blog\/protecting-against-man-in-the-middle-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">man-in-the-middle<\/a>&nbsp;(MitM) attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The SSL\/TLS certificate will encrypt the data using&nbsp;public key infrastructure (PKI)&nbsp;processes and technologies. PKI is the framework for public-key encryption (<a href=\"https:\/\/sectigostore.com\/blog\/types-of-encryption-what-to-know-about-symmetric-vs-asymmetric-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">asymmetric encryption),<\/a>&nbsp;which is&nbsp;a strong&nbsp;mathematical algorithm that assures robust data security in transit. It will remove&nbsp;the&nbsp;\u201cnot secure\u201d&nbsp;warning&nbsp;in front of your domain name and&nbsp;will&nbsp;display a green or grey padlock symbol&nbsp;(depending on your browser).&nbsp;&nbsp;<\/p>\n\n\n\n<p><em><strong>Note:<\/strong>\u00a0After\u00a0installing your certificate, you must regularly manage\u00a0it.\u00a0If it gets revoked or expired, all the browsers will show \u201cyour connection is not private\u201d or \u201csecurity risk ahead\u201d error page to your website visitors. You need to renew free SSL certificates every\u00a0<strong>three months<\/strong>\u00a0(90 days)\u00a0and commercial ones\u00a0at\u00a0a maximum of\u00a0<strong>two years\u00a0<\/strong>(more specifically, 398 days). Free certificates have a bad\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/lets-encrypt-to-revoke-3-million-certificates-on-march-4-due-to-bug\/\" target=\"_blank\" rel=\"noreferrer noopener\">history of getting revoked<\/a>, too. So, just choose your SSL\/TLS certificate wisely.\u00a0\u00a0<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security\u00a0Tip 5: Enable 2FA as a Minimum<\/strong><\/h3>\n\n\n\n<p><strong>How:\u00a0<\/strong>There are many\u00a0two-factor authentication (2FA)\u00a0tools\u00a0such as\u00a0Two-Factor, WordPress 2-Step Verification,\u00a0Unloq\u00a0Two Factor Authentication, etc. There&#8217;s also\u00a0<a href=\"https:\/\/wordpress.org\/plugins\/miniorange-2-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Authenticator<\/a>, which is free and simple to implement.\u00a0\u00a0<\/p>\n\n\n\n<p>You need to install the&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/miniorange-2-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Authenticator<\/a>&nbsp;plugin&nbsp;on&nbsp;your WP site and download the Google authenticator app on your cell phone. Every time you log in&nbsp;to your WordPress dashboard, you need to provide a unique code generated on your cell phone on the Google Authenticator app. It also works for multiple site admins,&nbsp;employees,&nbsp;and co-authors.&nbsp;&nbsp;<\/p>\n\n\n\n<p>After completing the\u00a0<a href=\"https:\/\/www.wpbeginner.com\/plugins\/improve-wordpress-security-with-google-authenticator\/\" target=\"_blank\" rel=\"noreferrer noopener\">installation process<\/a>, your WP admin login page would look something like this:\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"356\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-1.png\" alt=\"\" class=\"wp-image-1516\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-1.png 350w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-1-295x300.png 295w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><figcaption>Image source:\u00a0<a href=\"https:\/\/www.wpbeginner.com\/plugins\/improve-wordpress-security-with-google-authenticator\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPbeginner<\/a>\u00a0\u00a0<\/figcaption><\/figure>\n\n\n\n<p><em><strong>Note:<\/strong> 2FA is a term that&#8217;s often interchangeably used with\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/what-is-multi-factor-authentication-and-how-does-it-differ-from-2fa-sfa\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a>. Any authentication that has two or more authentication processes fall under the umbrella of MFA. So, all two-factor authentication is a type of multi-factor authentication, but not all MFA is 2FA.\u00a0Got it?<\/em><\/p>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>Two-factor authentication is more secure than passwords&nbsp;alone.&nbsp;After all, passwords can be stolen, leaked, or guessed.&nbsp;According to<strong>&nbsp;<\/strong><a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf?mkt_tok=eyJpIjoiWm1NeE16ZzJaak16T1dWbSIsInQiOiIwVFZjOFFSSG43YVZ5SWZRUlhaMmg0NjVuZjc3NksrbUlOZzBmc2pYR0Z0NDJITGNZZlhxWVVIMWF3QVhYQVhxc0JzcWhvVmoydDczWVwvTTkxVytaNG5TQUVIVlJGYW1DcHpnWjdiQnk1OUV2bytEUFhwSFZNOXRNODRidDVzWUkifQ%3D%3D\" target=\"_blank\" rel=\"noreferrer noopener\">Verizon\u2019s 2020 DBIR<\/a>, 80% of breaches within hacking involve brute force or the use of lost or stolen credentials.\u202f&nbsp;<\/p>\n\n\n\n<p>As we mentioned earlier, hackers even use brute-force attacks to find the right user ID-password combinations. But when you enable two-factor authentication, no one can break into your WordPress admin dashboard&nbsp;because the only person holding the cell phone can access the unique code, one-time password (OTP), or secret&nbsp;PINs.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security\u00a0Tip 6: Scan Your Backups Before Storing Them<\/strong>\u00a0<\/h3>\n\n\n\n<p><strong>How:<\/strong>\u00a0We strongly recommend\u00a0<a href=\"https:\/\/sectigostore.com\/codeguard\/backup\">CodeGuard<\/a>\u00a0because it automatically\u00a0creates a\u00a0backup of your site, scans it for malware, removes\u00a0if it finds anything suspicious, and stores\u00a0only\u00a0the clean copy on a third-party platform.\u00a0<\/p>\n\n\n\n<p><strong>Why<\/strong>: We all know&nbsp;that maintaining&nbsp;a&nbsp;current&nbsp;backup is crucial&nbsp;to the health and security of your online business. If the hacker&nbsp;has locked your website&#8217;s file, folders, and databases for a ransomware attack, you can easily restore it&nbsp;using your secure&nbsp;backups. But if an attacker inserts&nbsp;malicious code into&nbsp;your website, and if you take a backup without&nbsp;first&nbsp;scanning it, that malware will be stored in your backups, too. So, the backup copy will be useless, and&nbsp;you\u2019ll&nbsp;have to build your site from scratch!&nbsp;&nbsp;<\/p>\n\n\n\n<p>In short, all&nbsp;your backups&nbsp;won&#8217;t&nbsp;help you when you&nbsp;actually need&nbsp;them!&nbsp;Hence, the best&nbsp;WordPress&nbsp;security practice is to scan the backups before storing them.&nbsp;CodeGuard&nbsp;is one of the most efficient backup tools that will automatically scan your entire website and databases before taking the backup.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security\u00a0Tip\u00a07: Change\u00a0Default Settings<\/strong>\u00a0<\/h3>\n\n\n\n<p><strong>How<\/strong><strong>&nbsp;and why<\/strong><strong>:<\/strong>&nbsp;Because&nbsp;WordPress&nbsp;has&nbsp;a&nbsp;<a href=\"https:\/\/www.wpbeginner.com\/beginners-guide\/beginners-guide-to-wordpress-file-and-directory-structure\/\" target=\"_blank\" rel=\"noreferrer noopener\">default structure<\/a>&nbsp;for URLs, file names, and storage locations,&nbsp;it\u2019s&nbsp;easy for attackers to find&nbsp;important pages and files to hack them.&nbsp;You should manually change these paths and file names&nbsp;to something unique so that only you know where to find them.&nbsp;&nbsp;<\/p>\n\n\n\n<p>You can follow the below-mentioned tricks using plugins such as&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/better-wp-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">iThemes&nbsp;Security<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/wordpress.org\/plugins\/wp-dbmanager\/\" target=\"_blank\" rel=\"noreferrer noopener\">WP-DBManager<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>1. Change your file and web page names.&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>WordPress has default admin&nbsp;page&nbsp;URLs,&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>www.yourdomain.com\/<strong>wp-login.php<\/strong>, or&nbsp;&nbsp;<\/li><li>www.yourdomain.com\/<strong>wp-admin<\/strong>&nbsp;<\/li><\/ul>\n\n\n\n<p>Be creative and change&nbsp;your admin page URL&nbsp;to something unique like www.yoursite.com\/greenelephant.php or www.yoursite.com\/alaskacruise,&nbsp;etc.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Why<\/strong>:&nbsp;If you are using the default admin page URL, anybody can easily reach the admin login page&nbsp;and use bots to activate the brute force attack. But if your admin URL is unique, only the person having the exact URL can access your login page.&nbsp;<\/p>\n\n\n\n<p><strong>2. Don\u2019t use the default \u201cadmin\u201d as your admin user ID.&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>Use an email address or any&nbsp;unique word as your admin user ID instead of using &#8220;admin.&#8221;&nbsp;You can do it from your hosting account, too.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Why<\/strong><strong>:&nbsp;<\/strong>When you install the WordPress on your hosting site, it will give the option to set the user ID as &#8220;admin&#8221; by default. Hackers are aware of that fact. In a brute force attack, the user ID and password should match. And when your user ID is&nbsp;<strong>admin<\/strong>, the hacker&#8217;s job becomes 50% easier. Now, they just need to try different passwords for the&nbsp;\u201cadmin\u201d&nbsp;user ID.&nbsp;<\/p>\n\n\n\n<p><strong>3.&nbsp;<\/strong><strong>You should change the table name in your W<\/strong><strong>ordPress database.&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>By default,&nbsp;a table uses&nbsp;a&nbsp;<strong>wp-table<\/strong>&nbsp;prefix.&nbsp;Change it with a unique name like&nbsp;summerwp- or&nbsp;coolwp- or&nbsp;somethingnewwp- etc.&nbsp;Follow this guide to change the prefix with some unique name:&nbsp;<a href=\"https:\/\/help.one.com\/hc\/en-us\/articles\/360002107438-Change-the-table-prefix-for-WordPress-#:~:text=The%20default%20database%20table%20prefix,for%20them%20to%20break%20in.\" target=\"_blank\" rel=\"noreferrer noopener\">Instruction for changing table prefix in WordPress<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>All your login credentials, user info, transaction details, audit logs, etc. are stored in these tables.&nbsp;That\u2019s&nbsp;why it\u2019s quite popular among hackers.&nbsp;They use bots to search and break into this database.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>4. Move your wp-<\/strong><strong>config.php<\/strong><strong>&nbsp;file from the root directory.&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>Your&nbsp;<strong>wp-<\/strong><strong>config.php<\/strong>&nbsp;file is by default in the root directory and can be&nbsp;accessible to a hacker. Move the wp-config.php&nbsp;file from the root directory to any other folder above the root directory.&nbsp;&nbsp;Follow these instructions:&nbsp;<a href=\"https:\/\/www.groovypost.com\/howto\/improve-wordpress-securitty-wp-config-php-location\/\" target=\"_blank\" rel=\"noreferrer noopener\">Change the location of the wp-config file.<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>Why:\u00a0<\/strong>Wp-config.php\u202ffile stores information about your website\u2019s important settings, configurations, WordPress authentication keys, and databases.\u00a0When you store files in\u00a0well-known places\u00a0(such as\u00a0the\u00a0root directory),\u00a0it becomes easy for\u00a0attackers to exploit\u00a0<a href=\"https:\/\/www.veracode.com\/security\/failure-restrict-url-access\" target=\"_blank\" rel=\"noreferrer noopener\">URL access vulnerabilities<\/a>\u00a0for\u00a0<a href=\"https:\/\/owasp.org\/www-community\/attacks\/Forced_browsing\" target=\"_blank\" rel=\"noreferrer noopener\">forced browsing<\/a>.\u00a0That&#8217;s\u00a0why you must shift the\u00a0wp.config.php\u00a0file to a secure location.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security\u00a0Tip 8: Require Strong Passwords<\/strong>\u00a0<\/h3>\n\n\n\n<p><strong>How:\u00a0<\/strong>Install plugins like\u00a0<a href=\"https:\/\/www.wpwhitesecurity.com\/wordpress-plugins\/password-policy-manager-wordpress\/\" target=\"_blank\" rel=\"noreferrer noopener\">Password Policy Manager<\/a>\u00a0or\u00a0<a href=\"https:\/\/wordpress.org\/plugins\/force-strong-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">Force Strong Passwords<\/a>\u00a0to ensure that all of your users create strong\u00a0passwords.\u00a0\u00a0<\/p>\n\n\n\n<p><strong>Why:\u00a0<\/strong>By default, WordPress\u00a0doesn&#8217;t\u00a0force users to make a strong password (one uppercase, one lowercase, one digit, and one special character).\u00a0Not all your co-authors, employees, and customers are going to be as serious about setting passwords\u00a0as you are.\u00a0\u00a0<\/p>\n\n\n\n<p>According to\u00a0<a href=\"https:\/\/www.newswire.com\/news\/new-research-most-people-have-70-80-passwords-21103705\" target=\"_blank\" rel=\"noreferrer noopener\">NordPass<\/a>, the average user has 70-80 passwords. It&#8217;s really difficult\u00a0to memorize 80 unique passwords, so people often use weak\u00a0passwords or reuse their passwords across multiple accounts.\u00a0<a href=\"https:\/\/press.avast.com\/83-of-americans-are-using-weak-passwords\" target=\"_blank\" rel=\"noreferrer noopener\">Avast<\/a>\u00a0reports that\u00a083% of Americans\u00a0use\u00a0weak\u00a0passwords, and\u00a053% of Americans use the\u00a0same password to protect multiple accounts.\u00a0That&#8217;s\u00a0why you must use the plugins that force the users to create strong passwords\u00a0when they\u00a0register or create\u00a0an account on your website.\u00a0\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security&nbsp;<\/strong><strong>Tip&nbsp;<\/strong><strong>9<\/strong><strong>: Block Image Hotlinks<\/strong>&nbsp;<\/h3>\n\n\n\n<p><strong>How:&nbsp;<\/strong>We recommend&nbsp;three methods&nbsp;to secure the WordPress site from image hotlink.<strong>&nbsp;<\/strong>You can choose one of them.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1.\u00a0Use a Firewall<\/strong><\/h4>\n\n\n\n<p>Some reputed firewall plugins (like\u00a0<a href=\"https:\/\/wordpress.org\/plugins\/all-in-one-wp-security-and-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">All in One WP Security and Firewall<\/a>)\u00a0have<strong>\u00a0<\/strong>a feature to block image hotlinks. You just need to go to your firewall\u2019s\u00a0settings, search for the image hotlinks section,\u00a0and enable it.<strong>\u00a0<\/strong>\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2.\u00a0Enable Hotlink Protection via cPanel\u00a0<\/strong>\u00a0<\/h4>\n\n\n\n<p>In cPanel, go to security section, locate\u00a0<strong>Hotlink\u00a0Protection<\/strong>\u00a0and click on it. On the next page, select <strong>Enable<\/strong>.\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"382\" height=\"198\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image.png\" alt=\"A screenshot of a cell phone\n\nDescription automatically generated\" class=\"wp-image-1515\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image.png 382w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-300x155.png 300w\" sizes=\"auto, (max-width: 382px) 100vw, 382px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3.\u00a0Insert Code\u00a0Into\u00a0Your\u00a0.htaccess\u00a0File:\u00a0<\/strong>\u00a0<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Go to your cPanel&gt; File manage&gt;&nbsp;public_html&gt;.htaccess.&nbsp;&nbsp;&nbsp;<\/li><li>Right-click and select&nbsp;<strong>View\/Edit<\/strong>.&nbsp;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Scroll down and at the bottom of the page and copy-paste the following codes:&nbsp;<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>\/* Prevent image hotlinking in WordPress *\/ \nRewriteCond %{HTTP_REFERER} !^$ \nRewriteCond %{HTTP_REFERER} !^http(s)?:\/\/(www\\.)?yourdomainname.com &#91;NC] RewriteCond %{HTTP_REFERER} !^http(s)?:\/\/(www\\.)?google.com &#91;NC] \nRewriteRule \\.(jpg|jpeg|png|gif)$ \u2013 &#91;F] <\/code><\/pre>\n\n\n\n<p>&nbsp;<br>*Write your website\u2019s URL on the place of&nbsp;<strong><em>yourdomainname.com<\/em><\/strong>&nbsp;<\/p>\n\n\n\n<p>The third line, where we have written &#8220;google.com,&#8221; indicates that Google&nbsp;is allowed to&nbsp;use your images. Add the same code line for all other websites like LinkedIn, Facebook, Twitter, etc. if you want these sites to access your website&#8217;s images.&nbsp;<\/p>\n\n\n\n<p>For example:\u00a0<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>RewriteCond %{HTTP_REFERER} !^http(s)?:\/\/(www\\.)?facebook.com &#91;NC] <\/code><\/pre>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>When&nbsp;third-party websites directly link your images\u2019 URLs to their website, it is known as image hotlinks.&nbsp;People hotlink images because it is quick, easy, and&nbsp;doesn&#8217;t&nbsp;require them to host the images on their server,&nbsp;which&nbsp;otherwise can be highly space consuming.&nbsp;Hotlinks use your website&#8217;s bandwidth and reduce the speed and performance of your webpages. They also&nbsp;create&nbsp;an&nbsp;undue&nbsp;burden&nbsp;for&nbsp;your server&nbsp;with little to no benefit to you.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>WordPress Security\u00a0Tip 10:\u00a0Keep All WP Components Updated\u00a0<\/strong>\u00a0<\/h3>\n\n\n\n<p><strong>How<\/strong>: Install the updates for WordPress software, themes, and plugins as soon as the new versions are available. Never delay or ignore the updates as&nbsp;they are&nbsp;essential for WP security.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Why:&nbsp;<\/strong>Updates are not only for tweaking the appearance and functionality of the software. The old versions generally have security bugs that attackers can exploit to hack your WordPress site or insert the malware in it. The publishers fix the security vulnerabilities in the old versions and publish the patched version. Hence, always install the updated version of all the WordPress components.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Final Thoughts on WordPress Security&nbsp;<\/strong>&nbsp;<\/h2>\n\n\n\n<p>WordPress is indeed a revolution in the world of technology\u00a0due to its ease of use\u00a0and free components. But when a technological platform is so famous among millions of people, it also attracts\u00a0the attention of\u00a0cybercriminals.\u00a0<\/p>\n\n\n\n<p>Needless to say, the need for WordPress security isn&#8217;t going anywhere anytime soon. This is why\u00a0it\u2019s imperative that you ensure you\u2019re running a secure WordPress site (as much as possible, at least).\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/www.wordfence.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wordfence<\/a>,\u00a0a leading WordPress security provider,\u00a0blocked a total of\u202f3,818,725,238\u00a0cyber\u00a0attacks\u202fand blacklisted\u202f202,650 malicious IPs\u202fbetween Aug.\u00a014 and Sept.\u00a014, 2020.\u00a0These numbers\u00a0show that\u00a0it\u2019s\u00a0high time to take WordPress security seriously. By following the above mentioned ten tips, you will be able to strengthen your WP site&#8217;s security posture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Make yours a secure WordPress site with these 10 proven, easy-to-implement tips and keep the hackers away&nbsp;&nbsp;&nbsp; WordPress is a real blessing for bloggers,\u00a0freelancers,\u00a0and startup business owners. You\u00a0don&#8217;t\u00a0need to pay&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1518,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-1514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wordpress-security","tag-wordpress","tag-wordpress-security","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"WordPress security is a major concern for every site owner who uses the platform. Here&#039;s what to know to make yours a secure WordPress site.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"WordPress security is a major concern for every site owner who uses the platform. Here&#039;s what to know to make yours a secure WordPress site.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T10:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-24T16:43:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"WP Security: The Ultimate Guide to WordPress Security\",\"datePublished\":\"2020-09-17T10:05:00+00:00\",\"dateModified\":\"2020-09-24T16:43:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/\"},\"wordCount\":2801,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/wordpress-security.jpg\",\"keywords\":[\"wordpress\",\"wordpress security\"],\"articleSection\":[\"WordPress Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/\",\"name\":\"WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/wordpress-security.jpg\",\"datePublished\":\"2020-09-17T10:05:00+00:00\",\"dateModified\":\"2020-09-24T16:43:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"WordPress security is a major concern for every site owner who uses the platform. Here's what to know to make yours a secure WordPress site.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/wordpress-security.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/wordpress-security.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"London, United Kingdom, june 5, 2017: Man holding smartphone with Wordpress LOGO on the screen. Laminate wood background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wordpress-security-ultimate-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WP Security: The Ultimate Guide to WordPress Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights","description":"WordPress security is a major concern for every site owner who uses the platform. Here's what to know to make yours a secure WordPress site.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/","og_locale":"en_US","og_type":"article","og_title":"WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights","og_description":"WordPress security is a major concern for every site owner who uses the platform. Here's what to know to make yours a secure WordPress site.","og_url":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/","og_site_name":"InfoSec Insights","article_published_time":"2020-09-17T10:05:00+00:00","article_modified_time":"2020-09-24T16:43:18+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"WP Security: The Ultimate Guide to WordPress Security","datePublished":"2020-09-17T10:05:00+00:00","dateModified":"2020-09-24T16:43:18+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/"},"wordCount":2801,"image":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg","keywords":["wordpress","wordpress security"],"articleSection":["WordPress Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/","url":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/","name":"WP Security: The Ultimate Guide to WordPress Security - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg","datePublished":"2020-09-17T10:05:00+00:00","dateModified":"2020-09-24T16:43:18+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"WordPress security is a major concern for every site owner who uses the platform. Here's what to know to make yours a secure WordPress site.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/wordpress-security.jpg","width":1600,"height":1000,"caption":"London, United Kingdom, june 5, 2017: Man holding smartphone with Wordpress LOGO on the screen. Laminate wood background."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/wordpress-security-ultimate-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"WP Security: The Ultimate Guide to WordPress Security"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1514"}],"version-history":[{"count":4,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1514\/revisions"}],"predecessor-version":[{"id":1523,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1514\/revisions\/1523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1518"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}