This document discusses the challenges of securing websites and monitoring for web defacement attacks. It notes that traditional prevention-focused security strategies are obsolete against advanced attacks. Approximately 70% of breaches are discovered by external parties like law enforcement or customers rather than internal detection. Restoring compromised websites can take days or weeks. The document advocates adopting a comprehensive approach to web security that includes protection, detection, response, recovery and review capabilities. This includes technologies like web application scanning, web application firewalls, intrusion detection, website monitoring, file integrity monitoring and backup/restoration solutions.