SlideShare a Scribd company logo
1 of 17
Download to read offline
HACKED
Ten tips on
what to do next.
MY SITE WAS
!
You wake up one morning, get
your coffee, open your browser,
and navigate to your website.
To your horror, your discover that your website is
simply not there anymore. Or worse, it's been
replaced by a NSFW (not safe for work) page or a
crowd of ads for unsavory pharmaceutical
products.
To your horror, your discover that your website is simply
not there anymore. Or worse, it's been replaced by a NSFW
(not safe for work) page or a crowd of ads for unsavory
pharmaceutical products.
Even without reading the
solemn notification from your
browser, you know the grim
truth: you've been hacked.
Now you're in a panic.
How did this happen?
Where are your site
assets? Will you ever
get control back?
Oh No!
STEP 1
Calm down.
You can recover from this. You can contact a
professional service or fix it yourself.
Google even has an
that's ready to help you when you are ready.
8-step DIY recovery process
STEP 2
Let people know
you've been hacked.
Notify your host, webmaster, and, if you can,  your
customers. Now either clean up your local PC by
running anti-virus/anti-malware software, along with
your latest OS update, or, if you have doubts that
your machine is truly uninfected, commandeer a PC
that you're sure is clean.
STEP 3
Make sure.
Log into your hosting account to make sure you’ve
been hacked. Sometimes what you think is a hack is a
product of a service outage or maybe even a bad
plug-in that you might have installed. Your host will be
able to tell you if you were actually hacked and, if so,
begin to trace what caused it.
STEP 4
Backup (or back to
the drawing board).
In some cases, a good hosting company will have an
old backup of your site to serve as a starting point to
rebuild your site. You may also have backed up your
site locally. If your site is built with WordPress,
here is a guide for restoring your site from a backup.
STEP 5
Worst case scenario:
There is no back up. Data is corrupted beyond repair.
You need to rebuild.
There is one last refuge
you need to visit:
The Internet Archive
may have recorded your site
in its 456 billion page directory. 

STEP 6
Find your site snapshot.
Go to the last date your website was archived in a site
snapshot. It’s tedious, but you will at least see your old
data, and be able to copy and paste it into your new
site's pages.*
* I realize that this process is impractical with large database-driven sites, but for small sites
without hundreds of entries, it’s better than nothing, and can be a real life saver. 

STEP 8
Get a secure username
and password.
Many hackers use "brute force" attacks that look for
the easiest method to break into your site’s control
panel, often by using the username “admin” and
password “password.” If you've failed to change the
default settings that came with your hosting setup,
you're just inviting the hackers to get you.
Use http://passwordsgenerator.net/ to create names
and passwords that are harder to crack.

STEP 9
Don't wait for the next
catastrophe to strike.
Always back up your website
on a regular schedule.
WordPress site users have a vast library of backup tools
to choose from. For the rest of us, logging on via FTP
and whacking your content to your local PC is a task
that you need to mark on your calendar and stick to.
STEP 10
Check your users.
Delete any unwanted users
Delete users that are no longer
using your dashboard (guests)
Only give others the access they
need. For example, a guest
blogger on your site should
never be given admin status,
but give contributor status.
If this all seems to difficult, then by all means hire a
professional, or upgrade your hosting service to
include automatic backups, with managed security.
You may pay a premium for
this service, but it is totally
worth the peace of mind.
1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your-
website-is-hacked.html
2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my-
site.html
3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when-
your-wordpress-website-has-been-hacked
4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked-
now-what
SOURCES
A digital marketing leader since 1996, Didit provides
full-service online advertising and marketing services
with award-winning expertise and innovation.
Our full-service approach applies multi-faceted skill
sets, including SEO, PPC, CSEs, PLAs, Content
Marketing, and Social Media strategies that create a
holistic synergy of online marketing tools.

More Related Content

What's hot

Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
AnonDownload
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
AnonDownload
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
Mike Carson
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
Angela Bowman
 

What's hot (20)

WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 edition
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Testing and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsTesting and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressions
 
Hit On The Internet
Hit On The InternetHit On The Internet
Hit On The Internet
 
The GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressThe GiveCamp Guide to WordPress
The GiveCamp Guide to WordPress
 
HTML5@电子商务.com
HTML5@电子商务.comHTML5@电子商务.com
HTML5@电子商务.com
 
Share cash sucess! review 1, make money online from home
Share cash sucess! review 1,  make money online from homeShare cash sucess! review 1,  make money online from home
Share cash sucess! review 1, make money online from home
 
Taking Web Applications Offline
Taking Web Applications OfflineTaking Web Applications Offline
Taking Web Applications Offline
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)
 
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 201340 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Free
 
Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Word press security 101 2018
Word press security 101  2018 Word press security 101  2018
Word press security 101 2018
 
Browsers
BrowsersBrowsers
Browsers
 

Viewers also liked

Viewers also liked (20)

Finding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiFinding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT Delhi
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )
 
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
 
Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015
 
Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要
 
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
 
Hacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkHacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New York
 
The Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataThe Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) Data
 
The Worst Code
The Worst CodeThe Worst Code
The Worst Code
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
 
ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
AppSec And Microservices
AppSec And MicroservicesAppSec And Microservices
AppSec And Microservices
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 

Similar to My Site Was Hacked!

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
J_Cortes
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
Chelsea O'Brien
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Laura Eagin
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Rob Fuller
 

Similar to My Site Was Hacked! (20)

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution
 
WordPress Website Down.pdf
WordPress Website Down.pdfWordPress Website Down.pdf
WordPress Website Down.pdf
 
Responsible [digital] Home Ownership
Responsible [digital] Home OwnershipResponsible [digital] Home Ownership
Responsible [digital] Home Ownership
 
Software Support Done Right
Software Support Done RightSoftware Support Done Right
Software Support Done Right
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
How to get recover from a hacked website
How to get recover from a hacked websiteHow to get recover from a hacked website
How to get recover from a hacked website
 
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedWordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
 
Zero To WordPress Plubish
Zero To WordPress PlubishZero To WordPress Plubish
Zero To WordPress Plubish
 
Troubleshooting WordPress
Troubleshooting WordPressTroubleshooting WordPress
Troubleshooting WordPress
 
Setup and run wordpress: 201
Setup and run wordpress: 201Setup and run wordpress: 201
Setup and run wordpress: 201
 
Debugging wordpress
Debugging wordpress Debugging wordpress
Debugging wordpress
 
Wordpress Guide
Wordpress GuideWordpress Guide
Wordpress Guide
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've Made
 
How to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteHow to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress Website
 
Pimp my Plone
Pimp my PlonePimp my Plone
Pimp my Plone
 
How I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update ButtonHow I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update Button
 
Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 

More from Didit Marketing

INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The Bad
Didit Marketing
 

More from Didit Marketing (9)

What makes SEO good or bad?
What makes SEO good or bad?What makes SEO good or bad?
What makes SEO good or bad?
 
Developing Buyer Personas
Developing Buyer PersonasDeveloping Buyer Personas
Developing Buyer Personas
 
The Art of the 404 Error Page
The Art of the 404 Error PageThe Art of the 404 Error Page
The Art of the 404 Error Page
 
INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The Bad
 
Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Let's Throw A Twitter Party!
Let's Throw A Twitter Party!
 
Kevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingKevin Lee- The New Online Marketing
Kevin Lee- The New Online Marketing
 
10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts
 
Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird?
 
Maximizing Social Advertising
Maximizing Social AdvertisingMaximizing Social Advertising
Maximizing Social Advertising
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

My Site Was Hacked!

  • 1. HACKED Ten tips on what to do next. MY SITE WAS !
  • 2. You wake up one morning, get your coffee, open your browser, and navigate to your website.
  • 3. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products.
  • 4. Even without reading the solemn notification from your browser, you know the grim truth: you've been hacked. Now you're in a panic. How did this happen? Where are your site assets? Will you ever get control back? Oh No!
  • 5. STEP 1 Calm down. You can recover from this. You can contact a professional service or fix it yourself. Google even has an that's ready to help you when you are ready. 8-step DIY recovery process
  • 6. STEP 2 Let people know you've been hacked. Notify your host, webmaster, and, if you can,  your customers. Now either clean up your local PC by running anti-virus/anti-malware software, along with your latest OS update, or, if you have doubts that your machine is truly uninfected, commandeer a PC that you're sure is clean.
  • 7. STEP 3 Make sure. Log into your hosting account to make sure you’ve been hacked. Sometimes what you think is a hack is a product of a service outage or maybe even a bad plug-in that you might have installed. Your host will be able to tell you if you were actually hacked and, if so, begin to trace what caused it.
  • 8. STEP 4 Backup (or back to the drawing board). In some cases, a good hosting company will have an old backup of your site to serve as a starting point to rebuild your site. You may also have backed up your site locally. If your site is built with WordPress, here is a guide for restoring your site from a backup.
  • 9. STEP 5 Worst case scenario: There is no back up. Data is corrupted beyond repair. You need to rebuild. There is one last refuge you need to visit: The Internet Archive may have recorded your site in its 456 billion page directory. 

  • 10. STEP 6 Find your site snapshot. Go to the last date your website was archived in a site snapshot. It’s tedious, but you will at least see your old data, and be able to copy and paste it into your new site's pages.* * I realize that this process is impractical with large database-driven sites, but for small sites without hundreds of entries, it’s better than nothing, and can be a real life saver. 

  • 11. STEP 8 Get a secure username and password. Many hackers use "brute force" attacks that look for the easiest method to break into your site’s control panel, often by using the username “admin” and password “password.” If you've failed to change the default settings that came with your hosting setup, you're just inviting the hackers to get you. Use http://passwordsgenerator.net/ to create names and passwords that are harder to crack.

  • 12. STEP 9 Don't wait for the next catastrophe to strike.
  • 13. Always back up your website on a regular schedule. WordPress site users have a vast library of backup tools to choose from. For the rest of us, logging on via FTP and whacking your content to your local PC is a task that you need to mark on your calendar and stick to.
  • 14. STEP 10 Check your users. Delete any unwanted users Delete users that are no longer using your dashboard (guests) Only give others the access they need. For example, a guest blogger on your site should never be given admin status, but give contributor status.
  • 15. If this all seems to difficult, then by all means hire a professional, or upgrade your hosting service to include automatic backups, with managed security. You may pay a premium for this service, but it is totally worth the peace of mind.
  • 16. 1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your- website-is-hacked.html 2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my- site.html 3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when- your-wordpress-website-has-been-hacked 4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked- now-what SOURCES
  • 17. A digital marketing leader since 1996, Didit provides full-service online advertising and marketing services with award-winning expertise and innovation. Our full-service approach applies multi-faceted skill sets, including SEO, PPC, CSEs, PLAs, Content Marketing, and Social Media strategies that create a holistic synergy of online marketing tools.