Nothing online or offline is ever 100% secure, but there are many things you can do to help make WordPress more secure. Every day websites across the world are hacked or compromised with malware. Many of these are caused by website owners who don’t take basic precautions.
Follow the steps below, and you’ll have a much better chance of avoiding having your site compromised.
Two of these recommendations, a proper backup and installing a security plugin, are a bit more detailed in their execution. To help, I have provided video instructions.
1. Backup Your Site
The first step in making WordPress more secure, or any other website secure is to have a quality backup. Many times restoring a backup will return your site to a state before it was hacked. This then gives you time to analyze what may have allowed the site to be hacked and stop the vulnerability. For some infections this only requires a database restoration, but if the underlying files were actually compromised, it might require a complete restoration.
Having great site backups is important for reasons other than hacking. If you accidentally delete something, restoring a backup can make the site whole again. And, at times when an upgrade doesn’t work properly the ability to restore a backup allows you to get your working site back up and running while researching the issues caused by the updates.
Introduction and How to Configure the Updraft Plus Backup Plugin
Notes on Installing the Backup Plugin
Install the plugin, Updraft Plus. Select Plugins > Add New. Search for Updraft Plus. Install it and Activate.
From the Updraft Plus Dashboard (you can get here from Plugins > Updraft Plus Settings) or from the WordPress Dashboard > Settings > Updraft Plus.
Select the Settings Tab.
Scroll down and select the dropdown button by Copy to Remote Storage.
Select Dropbox. Follow the instructions to connect Dropbox to Updraft Plus.
Once you return to the Updraft Plus settings screen, scroll down and Save your changes.
Return to the area under Remote Storage and Validate your connection to Dropbox.
Once this is complete, you are ready for your first backup.
Return to the main Updraft Plus Dashboard and click the Backup Now button.
Once the Backup shows completed, return to the Settings tab.
Automate your backups to fit your site update frequency, then scroll down and Save the settings. You should now have automated backups.
In the sidebar, signup for our Health Checklist to help make sure you keep your backups working and your website healthy.
2. Install a Security Plugin
A security plugin can help monitor and stop potential hacks. It can also alert you to hacking attempts on the site which helps you block potential threats. In this post, we’ll configure the basic settings for the iThemes Security plugin to help you get started monitoring and protecting your site.
Install and Configure the Security Plugin
Notes on Installing and Configuring the Security Plugin
Install the plugin, iThemes Security. From the WordPress Dashboard, select Plugins > Add New. Search for iThemes Security. Click on Install and once installed Activate the plugin.
Click on the iThemes settings to launch the Dashboard and complete the First Steps.
Click on the button to Make a Backup. This backs up the Database.
Click on the button to Allow File Updates which allows iThemes security to edit the files wp-config.php and .htaccess.
Click on the One Click Secure button to automatically set the basic security options for your plugin.
Optionally, select the Yes, I’d Like to Help Button. This sends information to the plugin developers on how the plugin is used in order to improve functionality. No personal data of yours is collected.
Basic Settings – these are demonstrated in the video
Once done, go through the Basic Settings from our training. Note that a more in-depth webinar will cover other options. These settings get you the basic coverage needed.
Temporarily Whitelist your IP address by clicking the Temporary Whitelist IP button.
From the Dashboard, click on the Settings tab.
Under Global Settings, select Add my current IP to the whitelist. This will help you keep from locking yourself out of the site.
Under 404 Detection, select Enable 404 Detection. Leave the rest of the default settings. This will lock people out of the site if they are finding too many 404 errors. Hacking software frequently tries multiple possible page names to see if it can find something to access.
Leave Away Mode alone.
Under Banned Users, select Enable Hackrepair.com blacklist and Enable Ban Users. This allows you to ban know hackers as well as those you catch trying to access the site.
Leave the defaults for Brute Force Protection
Under Database, alternately select to have a database backup made. This can be a “backup to your backup” since you’ve already set a database backup in Updraft Plus.
For now, leave File Change Detection
If you can remember the URL change, Enable the Hide Backend feature and set the URL to something other than wplogin. Make sure you remember this, so that you can still access your site. Instead of http://yoursite.com/wp-admin or wplogin, you will now access your login screen at http://yoursite.com/yourdirectory
For now, ignore Malware Scanning and SSL.
Keep Secure Passwords for Administrators
Under System Tweaks, select:
Protect System Files
Disable Directory Browsing
Disable PHP in Uploads
Leave all WordPress Tweaks as the default for now.
Save all of your changes and you are on the way to a more secure site. More details and settings will be covered in a future webinar. To make sure you are on the list for webinar alerts and to receive a Health Checklist, sign up in the sidebar.
3. Keep Your Site Up-to-Date
This actually could be switched with either step 1 or 2, but since you should have a good backup before updating, I decided to leave it here.
WordPress core updates, plugin and theme updates are often created in order to patch security issues. Recently, WordPress 4.2.1 was released specifically as a Security Update. There were also several vulnerabilities found for plugins that required updates, recently. See WordPress SEO Security Alert from March 12, 2015.
Keeping your software updated is one of the best things you can do to keep your site secure and is one of the areas where I see the biggest neglect of sites. People frequently spend money and time to get a site built and then forget about it. It’s sort of like forgetting to put gas in your car. If you don’t maintain and keep your site up to date, you are risking it stopping for a variety of reasons including being compromised by malware or a hacker.
4. Respect Passwords and Login Information
Compromised passwords and login information frequently lead to site hacking. It is important to treat this information as delicate and keep it secure. Also, think beyond just your WordPress login. FTP and control panels can also be compromised. Don’t make all of your passwords the same and consider investing in a password manager like LastPass to help encrypt the information.
Force Strong Passwords
Force the use of strong passwords particularly for Administrators. It isn’t necessarily a single person trying to login time and time again manually. Hackers can run a full dictionary of words across your site in a matter of minutes. Configuring your security plugin as shown in Step 2 can help stop this as can picking passwords that are not likely to be found in hacker dictionaries.
Create Separate Accounts for Users
If you have someone who will be helping you with your website, give them their own username and password. When the work is complete, delete this.
Change Your Passwords Often
Don’t keep the same password for more than three months. Change your hosting control panel and FTP passwords, too. Your WordPress website is not the only part of your website that can be hacked. In fact, unauthorized FTP or cPanel access can have even more disastrous effects that a compromised WordPress site.
5. Delete Unused Plugins and Themes
Plugins and themes are only as secure on the code used to write them. Why worry about possible security vulnerabilities in items you aren’t using. Delete them. Note that if you want to keep one default WordPress theme in case you need to activate it for troubleshooting, keep the latest one and make sure you keep it updated with the rest of your site. Even if you aren’t actively using it, a vulnerability in the code could compromise your site.
6. Delete the Admin User
Fortunately, many of the One Click Installers have removed this issue. The original default administrator user for WordPress was named admin. If left as the default, you just provided a hacker one half of what is needed to login – the username. At one point, almost everyone I saw who used a One Click Install had this user as an administrator and many were actually using that account to blog.
If you do have an administrative user named admin, safely remove it by following these instructions.
As always, backup your database first.
To Delete the Admin User When You are Using the Admin Account
Login to the account as admin.
From the Dashboard menu, select Users > Add New.
Enter the desired username of your new user.
Enter the email address. (Note that you will need a different email address than you have listed in the admin account.)
Enter the name and password.
Set the Role to Administrator. This is very important.
Click the Add New User button to Save the user.
Logout of WordPress, then log back in using the new user account information.
From the menu, select Users > All users. This opens a list of all users for your WordPress installation.
Hover your mouse over the username admin, then select Delete.
This opens the Delete User screen.
If you have posted using the admin account, you can select to have all posts attributed to the new account name, or you can delete all of the posts, which is not recommended.
Click on the Confirm Deletion button to delete the account.
Delete the Admin User When Not in Use
If your account has an admin user, but it is not being used, login to the account with your username and follow the instructions above for deleting the Admin user (Steps 9-13). There is no need to create a new account in this situation.
For maximum security, consider implementing the Sucuri Website Firewall plus security monitoring service. For $199.00 per year ($299.00 for SSL support and PCI compliance), your site is protected and monitored and, while doubtful, should any compromise occur the site is cleaned.
Bonus – Sign up for the Health Checklist (in the sidebar) for tips of checking your website health each month. This can help you keep your site secure and functioning at its best. It will also place you on the mailing list for alerts on the upcoming security webinar series.
Have questions? Please leave them in the comments.
More Security Tips will be provided in an upcoming webinar series. Sign up for the Health Checklist to be on the alert list for the webinars.
Some of the links on this site are Affiliate Links, and if you purchase using them, we receive a commission. We only recommend products that we LOVE and that we think will be relevant to our audience. We either use these products personally, or have helped clients implement them on their sites.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Policy
KS Training and Consulting, owner of https://whiteglovewebtraining.com is concerned about our customers' privacy. We use cookies to help your browsing experience and if you optin to an email or make a purchase, we collect data that you give us. We never see or keep credit card numbers in that we use PayPal and Stripe as our payment providers. For more information, view our complete Privacy Policy at https://whiteglovewebtraining.com/white-glove-web-training-privacy-policy/
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.