SlideShare une entreprise Scribd logo
1  sur  22
Brian Layman
North East Ohio WordPress Meetup
             #NEOWP
   Who I am. What I do. What I see.
   What software do your blogs run on?
   Who here has had a blog hacked, defaced, stolen or
    taken down?
   Is your site safe? (No one would ever want to hack
    my blog about _____.)
   The title is a lie…
•   Twitter             •   PayPal’s Blog
•   Gawker              •   CorneliaMarie.com
•   PhotoMatt           •   ClimateCrisis.net
•   Problogger          •   Twilight Lexicon

            Go Daddy • DreamHost
            Blue Host • Bizland
            Network Solutions
http://bit.ly/AVCampaign
 Content or uploads destroyed
 Hidden hyperlinks added to your site
 Redirect to another site
 Content edited
 Hijacked website
 Defacement
 Bank fraud
 CSRF/XSRF – Cross Site Request Forgery
 XSS – Cross Site Scripting
 SQL Injection
 DDOS – (Distributed) Denial of Service
 DNS Hijacking – Spoofing or Poisoning
 Malvertising – Malicious Advertising
 Stolen Password
 Bad Code
   WordPress
     http://codex.wordpress.org/Hardening_WordPress
     security@wordpress.org
   Drupal
     http://drupal.org/security-team
     security@drupal.org
   Joomla
     http://developer.joomla.org/security.html
     security@joomla.org
  What is it? You tell me…
  Who is right?
  My thought:
    Any steps that may eliminate a large subset of
attacks on your blog should be taken.
   The basics
     Passwords
     Communication (Plain Text vs. SSL)
     Updates
     Watch what you add to your sites
      (plugins/themes/add-ons)
     Backups
     Google Webmaster Tools
   Use strong passwords
   Make them unique in high value situations
   Pay attention to how you are sending your
    passwords
     Wireless Networks = Risk
     FTP – Use SFTP instead
     Email – Use SSL Ports 587,995,993 vs 25,110,143
     Skype – Syncs history upon connect, never send
      secure passwords – EVER
     CPanel/WHM/Admin pages – if it is http not https, your
      password can be scraped
   Keep your blog, plugins, themes, & operating system
    current – yes, even Linux
   Security and attacks improve over time
    2005 – Admin operations required a referrer
    2006 – Admin operations required a NONCE
    2007 – Plugin pages forced to check security
    2008 – Randomized keys and salts & upgrades
    2009 – Security escalations issues – full review
    2010 – Automated plugin and theme upgrades
    2011 – Sniffing, upload, clickjacking, file cleanup
   Every plugin or theme is a security risk
   “Free Theme” sites are a very high risk
   Less popular & highly specialized plugins have had
    less eyes on them and are riskier
   Older plugins used older security standards - we
    simply knew less and had fewer tools
   You are responsible for your site. Learn how to
    identify problems or make a friend who can.
 Both files and database
 Keep the files offline
 If you have files online keep them out of public_html
 As important as having the backups…
   Know how to restore them!
 Before you restore – delete the files and directories
  to remove the hack files
   How do you know you are hacked?
   Google will email you when they consider you a risk
     http://www.google.com/webmasters/
     http://www.google.com/webmasters/checklist/
     https://www.google.com/webmasters/tools/reconsideration
   You can configure multiple owners
   EVERYTHING that is displayed on the screen must
    be filtered.
     WordPress provides: esc_html esc_url esc_*
    http://codex.wordpress.org/Data_Validation
   EVERYTHING that you send to the database must
    be filtered.
     WordPress provides: $wpdb->prepare
   TRUST NOTHING
     Try to use your text instead of user input
   Permissions - The 755 myth
     chmod -R 755 *
     Generic: Directories Should be 755 Files 644
     Reality: The least privileges provides the most access
   VPS vs Shared Hosting vs Managed Hosting
     Flexibility, Access, Less risk = More $
     Harden your own server or let someone do it
     suPHP – Isolates your installation
   Create a “Editor” user for posting
   Create a new “Administrator”, delete the old one,
    then only use it for maintenance
   Never use wp_ as your table prefix
   Look at wp-config-sample.php now and then and
    update your wp-config.php
   Force Secure password logins
     http://codex.wordpress.org/Administration_Over_SSL
 Move wp-config.php
 Remove version Info
 Rename the admin user
 Move your wp-content directory – Possibly worth
  doing but will break many plugins and themes
 Use .htaccess to white list IP addresses or add an
  extra password layer
   Free Plugins
    http://wordpress.org/extend/plugins/
     exploit-scanner
     wp-security-scan
     wordpress-file-monitor
  Paid Plugins
http://pluginbuddy.com/purchase/backupbuddy/
Site Rescue, Securing & Code Review
  Sucuri.net
  WebDevStudios.com
  WebDevStudios.com
  CoveredWebServices.com

 Managed Hosting
  WPEngine.com
  Page.ly
  WPSecuritylock.com

And of course doing it all:
  eHermitsInc.com
http://eHermitsinc.com
http://thecodecave.com
http://www.slideshare.net/brianlayman
http://twitter.com/brianlayman
@eHermits
Text ehermits to 50500
Brian@eHermitsInc.com

Contenu connexe

Tendances

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress TroubleshootingTiffany Bridge
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityNathan Platt
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityThe Toolbox, Inc.
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site MuhammadUsaid2
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014The Toolbox, Inc.
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate WorkshopThe Toolbox, Inc.
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security EssentialsAngela Bowman
 
WordPress Security
WordPress SecurityWordPress Security
WordPress SecurityIvan Storck
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress websiteSiteGround.com
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityMichelle Davies (Hryvnak)
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpackRich Collier
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and SecurityJoe Casabona
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's faultchadmow03
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013Thor Kristiansen
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites Catch Themes
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best PracticesRobert Vidal
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and securityWP Pittsburgh Meetup Group
 

Tendances (20)

Emergency WordPress Troubleshooting
Emergency WordPress TroubleshootingEmergency WordPress Troubleshooting
Emergency WordPress Troubleshooting
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Fav Plugins & Security
WordPress Fav Plugins & SecurityWordPress Fav Plugins & Security
WordPress Fav Plugins & Security
 
How to create a WordPress Site
How to create a WordPress Site How to create a WordPress Site
How to create a WordPress Site
 
WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014WordCamp Boston WordPress plugins-8-2014
WordCamp Boston WordPress plugins-8-2014
 
WordPress Intermediate Workshop
WordPress Intermediate WorkshopWordPress Intermediate Workshop
WordPress Intermediate Workshop
 
WordPress Security Essentials
WordPress Security EssentialsWordPress Security Essentials
WordPress Security Essentials
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Wordpress introduction
Wordpress introductionWordpress introduction
Wordpress introduction
 
8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website8 Ways to Hack a WordPress website
8 Ways to Hack a WordPress website
 
NEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & SecurityNEPA BlogCon 2013 - WordPress Customization & Security
NEPA BlogCon 2013 - WordPress Customization & Security
 
Coding with jetpack
Coding with jetpackCoding with jetpack
Coding with jetpack
 
Installing and Setting Up WordPress
Installing and Setting Up WordPressInstalling and Setting Up WordPress
Installing and Setting Up WordPress
 
WordPress Customization and Security
WordPress Customization and SecurityWordPress Customization and Security
WordPress Customization and Security
 
Using Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections versionUsing Wordpress for Internet Publishing--TechConnections version
Using Wordpress for Internet Publishing--TechConnections version
 
Why it's not your host's fault
Why it's not your host's faultWhy it's not your host's fault
Why it's not your host's fault
 
WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013WordPress Security - WordPress Meetup Copenhagen 2013
WordPress Security - WordPress Meetup Copenhagen 2013
 
Building Secure WordPress Sites
Building Secure WordPress Sites Building Secure WordPress Sites
Building Secure WordPress Sites
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
Getting started with wordpress hosting and security
Getting started with wordpress hosting and securityGetting started with wordpress hosting and security
Getting started with wordpress hosting and security
 

En vedette

WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1Brian Layman
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?Brian Layman
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBrian Layman
 

En vedette (6)

WordPress 3.8 Beta 1
WordPress 3.8 Beta 1WordPress 3.8 Beta 1
WordPress 3.8 Beta 1
 
Why WordPress?
Why WordPress?Why WordPress?
Why WordPress?
 
WordPress 3.5
WordPress 3.5WordPress 3.5
WordPress 3.5
 
Brethren - What Does It Mean?
Brethren - What Does It Mean?Brethren - What Does It Mean?
Brethren - What Does It Mean?
 
Blog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being HackedBlog World 2010 - How to Keep Your Blog from Being Hacked
Blog World 2010 - How to Keep Your Blog from Being Hacked
 
Unfailing Love
Unfailing LoveUnfailing Love
Unfailing Love
 

Similaire à WordPress Security Tips from Brian Layman

WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User SecurityDre Armeda
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012Angela Bowman
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Laskywordcampgc
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)Michael Carnell
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateZero Point Development
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Vasile
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutSiteGround.com
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignJudy Wilson
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014Judy Wilson
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening StepsPlasterdog Web Design
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Think Media Inc.
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!Marko Heijnen
 

Similaire à WordPress Security Tips from Brian Layman (20)

WordPress End-User Security
WordPress End-User SecurityWordPress End-User Security
WordPress End-User Security
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Securing Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad LaskySecuring Your WordPress Website by Vlad Lasky
Securing Your WordPress Website by Vlad Lasky
 
WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)WordPress Setup and Security (Please look for the newer version!)
WordPress Setup and Security (Please look for the newer version!)
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
WordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 UpdateWordPress Security Best Practices 2019 Update
WordPress Security Best Practices 2019 Update
 
Locking down word press
Locking down word pressLocking down word press
Locking down word press
 
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress EcosystemDan Catalin Vasile - Hacking the Wordpress Ecosystem
Dan Catalin Vasile - Hacking the Wordpress Ecosystem
 
Protect Your WordPress From The Inside Out
Protect Your WordPress From The Inside OutProtect Your WordPress From The Inside Out
Protect Your WordPress From The Inside Out
 
WordPress Security 101
WordPress Security 101WordPress Security 101
WordPress Security 101
 
Up and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web DesignUp and Running with WordPress - Site Shack Nashville Web Design
Up and Running with WordPress - Site Shack Nashville Web Design
 
WordPress Resources Nov 2014
WordPress Resources Nov 2014WordPress Resources Nov 2014
WordPress Resources Nov 2014
 
Wordpress Security & Hardening Steps
Wordpress Security & Hardening StepsWordpress Security & Hardening Steps
Wordpress Security & Hardening Steps
 
WordPress Security Best Practices
WordPress Security Best PracticesWordPress Security Best Practices
WordPress Security Best Practices
 
Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013Presentation to SAIT Students - Dec 2013
Presentation to SAIT Students - Dec 2013
 
Joomla! security jday2015
Joomla! security jday2015Joomla! security jday2015
Joomla! security jday2015
 
WordPress security
WordPress securityWordPress security
WordPress security
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 

Dernier

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 

Dernier (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 

WordPress Security Tips from Brian Layman

  • 1. Brian Layman North East Ohio WordPress Meetup #NEOWP
  • 2. Who I am. What I do. What I see.  What software do your blogs run on?  Who here has had a blog hacked, defaced, stolen or taken down?  Is your site safe? (No one would ever want to hack my blog about _____.)  The title is a lie…
  • 3. Twitter • PayPal’s Blog • Gawker • CorneliaMarie.com • PhotoMatt • ClimateCrisis.net • Problogger • Twilight Lexicon  Go Daddy • DreamHost  Blue Host • Bizland  Network Solutions
  • 5.  Content or uploads destroyed  Hidden hyperlinks added to your site  Redirect to another site  Content edited  Hijacked website  Defacement  Bank fraud
  • 6.  CSRF/XSRF – Cross Site Request Forgery  XSS – Cross Site Scripting  SQL Injection  DDOS – (Distributed) Denial of Service  DNS Hijacking – Spoofing or Poisoning  Malvertising – Malicious Advertising  Stolen Password  Bad Code
  • 7. WordPress  http://codex.wordpress.org/Hardening_WordPress  security@wordpress.org  Drupal  http://drupal.org/security-team  security@drupal.org  Joomla  http://developer.joomla.org/security.html  security@joomla.org
  • 8.  What is it? You tell me…  Who is right?  My thought: Any steps that may eliminate a large subset of attacks on your blog should be taken.
  • 9. The basics  Passwords  Communication (Plain Text vs. SSL)  Updates  Watch what you add to your sites (plugins/themes/add-ons)  Backups  Google Webmaster Tools
  • 10. Use strong passwords  Make them unique in high value situations
  • 11. Pay attention to how you are sending your passwords  Wireless Networks = Risk  FTP – Use SFTP instead  Email – Use SSL Ports 587,995,993 vs 25,110,143  Skype – Syncs history upon connect, never send secure passwords – EVER  CPanel/WHM/Admin pages – if it is http not https, your password can be scraped
  • 12. Keep your blog, plugins, themes, & operating system current – yes, even Linux  Security and attacks improve over time 2005 – Admin operations required a referrer 2006 – Admin operations required a NONCE 2007 – Plugin pages forced to check security 2008 – Randomized keys and salts & upgrades 2009 – Security escalations issues – full review 2010 – Automated plugin and theme upgrades 2011 – Sniffing, upload, clickjacking, file cleanup
  • 13. Every plugin or theme is a security risk  “Free Theme” sites are a very high risk  Less popular & highly specialized plugins have had less eyes on them and are riskier  Older plugins used older security standards - we simply knew less and had fewer tools  You are responsible for your site. Learn how to identify problems or make a friend who can.
  • 14.  Both files and database  Keep the files offline  If you have files online keep them out of public_html  As important as having the backups… Know how to restore them!  Before you restore – delete the files and directories to remove the hack files
  • 15. How do you know you are hacked?  Google will email you when they consider you a risk  http://www.google.com/webmasters/  http://www.google.com/webmasters/checklist/  https://www.google.com/webmasters/tools/reconsideration  You can configure multiple owners
  • 16. EVERYTHING that is displayed on the screen must be filtered.  WordPress provides: esc_html esc_url esc_* http://codex.wordpress.org/Data_Validation  EVERYTHING that you send to the database must be filtered.  WordPress provides: $wpdb->prepare  TRUST NOTHING  Try to use your text instead of user input
  • 17. Permissions - The 755 myth  chmod -R 755 *  Generic: Directories Should be 755 Files 644  Reality: The least privileges provides the most access  VPS vs Shared Hosting vs Managed Hosting  Flexibility, Access, Less risk = More $  Harden your own server or let someone do it  suPHP – Isolates your installation
  • 18. Create a “Editor” user for posting  Create a new “Administrator”, delete the old one, then only use it for maintenance  Never use wp_ as your table prefix  Look at wp-config-sample.php now and then and update your wp-config.php  Force Secure password logins  http://codex.wordpress.org/Administration_Over_SSL
  • 19.  Move wp-config.php  Remove version Info  Rename the admin user  Move your wp-content directory – Possibly worth doing but will break many plugins and themes  Use .htaccess to white list IP addresses or add an extra password layer
  • 20. Free Plugins http://wordpress.org/extend/plugins/  exploit-scanner  wp-security-scan  wordpress-file-monitor  Paid Plugins http://pluginbuddy.com/purchase/backupbuddy/
  • 21. Site Rescue, Securing & Code Review  Sucuri.net  WebDevStudios.com  WebDevStudios.com  CoveredWebServices.com Managed Hosting  WPEngine.com  Page.ly  WPSecuritylock.com And of course doing it all:  eHermitsInc.com