WordPress is one of the biggest blogging platforms right now it’s important to keep your website safe. Here at Atilus, we take the security of your sites very seriously and make every effort to keep our clients aware of any potential security issues. Here are three common security vulnerabilities & how to fix them.
1. Plugin Vulnerabilities
Plugins often have glitches that make your website vulnerable to hackers. To help prevent this, keep on top of updating your plugins.
If you’re a client of Atilus, we have processes in place to take care of this for you. If there’s ever a plugin with a possible threat in the update we automatically revert it to the old version until the update is patched. To check to see if any of the plugins you are using have any potential threats, click here.
2. Default Admin User Account/Default Passwords
Is your login to the website the default username and password that came with WordPress when you installed it? I would change it as soon as possible.
Here at Atilus, we purposely change the username to be more complex & we use a 13+ character password that is unique for each of our clients’ websites. When we give our clients access to the website, we also recommend that they change their passwords to a secure password after their first sign-in. If you struggle with remembering passwords, try using a secure password bank such as LastPass.
3. Vulnerable Hosting Servers
Since the server where your WordPress website resides is a target for attackers, using low-quality hosting services can make your site more vulnerable to being compromised. While all hosts take precautions to secure their servers, not all hosting providers are as vigilant or implement the latest security measures to protect websites on the server-level.
We frequently (every 24 hours) run scans of our servers to ensure that our client sites are safe. If there’s a possible threat we are immediately alerted by the scan & take action to ensure that the sites are not affected.
Do you have any questions regarding your website’s safety? Contact [email protected]!