Is your WiFi protected? Are you using WPA2? If not, then I recommend it.
Do you like to work from Coffee Shop or Starbucks? Maybe you donāt want to log in to your bank account, WordPress site, cPanel, or anything that is sensitive and is of value to you.
Maybe you can try using VPN software?
I recommend using a work computer or bank account details on a computer which is only used for āsafe-browsingā purposes. Do not mix torrents or websites which are really malware-prone with your work.
In short, make your local environment safe and secure. It just takes awareness and following certain guidelines mentioned above.
Is your hosting secure?
Shared hosting: Usually unsafe if you are a reputed business and also it becomes easier for hackers to see your data when they hack into someone elseās account.
How credible is your hosting company? Maybe you can do some search on Google, ask questions, and do some research. WARNING: Avoid FAKE warning sites.
Good web hosting = Pricing is gonna be a bit expensive. Bad Web Hosting = Very cheap and very vulnerable.
WordPress Security – Are you doing these?
Are you updating your WordPress timely?
Maybe you can turn on auto-updates on your hosting control panel?
Are you using WordPress hosting services?
Are you using backup services and also some secure server settings on your cPanel?
Maybe you want to look at https://wpengine.com/plans/ (Managed Hosting and Security plans) for your WordPress. [ Optional ].
Changing the configuration of your WordPress
Change the settings of your WordPress because WordPress is open-source and black-hat hackers may be aware of certain naming conventions and try to gain access or try hacking using those default values. Change is for the better š
Modify the table prefix (change wp_ to something else).
Change the āadminā username. Change it to something else which is not easy to guess by a human or brute force tool.
Set a secure password. (Do not use the family name, dictionary name, 123456 sequences, or 123 at the end of the password).
Security keys in WordPress to add a layer of security.
I see some WordPress sites show the username as author/display name in articles or blog posts. In such a case, changing the āadminā default username to something else is a total waste. Doesnāt make sense.
WordPress Secure Installation
Create a new database with a ānot so easy to guessā database name. (This is to change the table prefix of default WordPress which is wp_)
Go to MySQL in cPanel and create a new database. Create the database name something like, ār238ab991ā this is hard to guess.
The next step is to create a strong username and strong password (I know itās hard, but you can try).
Use usernames like ew8292lkn320 and password as (maybe you can use password generators provided in your hosting. But, make sure they are more than 10 characters with better password rules). Look into the password strength meter as well if your hosting has one (But, beware of buggy ones. I can show 100/100 by using less than 6 characters as well ;-)).
Make sure you give āAll Privilegesā to the database user you created.
Open the wp-config-sample.php file with the text editor once you extract the compressed files or archive.
Replace the values with your database name, database user, and database password.
In the same file wp-config-sample.php, you will find a place to add secure keys. Generate the keys and use them. Your WordPress API to create these salt/keys.
Also, change the table prefix from wp_ to something else.
Change the wp-config-sample.php file to wp-config.php
Connect to FTP using FileZilla and transfer all the WordPress files to your server.
Once uploaded, go to your website in the web browser. [ You will see wp-admin/install.php Choose your language and continue ]
In the username āDO NOT USE admin as USERNAMEā. Choose something obscure. For instance: ce897esc
Choose the password which is stronger. Longer the password, the better the password. Maybe you can use http://strongpasswordgenerator.com/ to generate a secure password with better entropy.
There is a setting called āAllow your website to be indexed by search engineā. It is checked by default. You can uncheck it till you create a full-fledged website with all pages in place.
Once the installation is done, make sure you change your Display Name. You donāt want your obscure username to be displayed as an author under every blog post. Thatās a hint for black-hat hackers to use the same username in the wp-admin login form. To change this, go to Users ā Your Profile and go to the āNicknameā field. Change it to something else. It can be your name or full name or anything else. Then choose the Nickname as āDisplay name publicly asā.
Success Story
vTESTās involvement leads to lower bugs in each release and overall higher quality, acting as a partner in initial processes and conversations. Communication is easy and prompt, and they constantly work to improve. They also provide valuable documentation and feedback after each release.
– CTO , Flight App, USA
Plugins to be installed on WordPress for better security
[ Be careful as some plugins may slow down your website ]
Limit login attempts
Clef secure passwordless login
All in one WP Security and Firewall
Wordfence
Limit IP addresses to login (whitelisting IP addresses)
Hide the login page
CAPTCHA on the login page (reCAPTCHA)
Two-factor authentication
.htpasswd (You need to enter this password and only then the server will authenticate you to show the login page. Extra layer for better security).
Check the pluginās last updated date on the WordPress.org plugins page.
Also, look into the reviews and star rating for the specific plugin
Add Google Authenticator on your Smartphone and then install the Google Authenticator plugin on your WordPress site.
Some other easier plugins: Due 2 Factor Authentication and UNLOQ.io Authentication
Create .htaccess and .htpasswd file to protect wp-login.php
Also, password protect /wp-admin directory through cPanel
Login errors that give hints to the black-hat hackers about valid usernames and invalid ones. (Wordfence plugin has this option under āOptionsā to avoid this).
Turn on āAutomatic updatesā for plugins
WP Updates Settings (To update the plugins always)
Remove /readme.html from the File Manager. Also, remove the license.txt file from the web server.
Change the permissions for files and folders for User, Group, and World. (Read Write Execute permissions). Never give 777 to directories.
Move wp-config.php file from public_html or wwwroot folder to one level higher folder. This way we make sure it is a bit more secure as hackers cannot try to access it whatsoever unless they break into the cPanel or Control Panel of the hosting provider or they get access to FTP.
Create a robots.txt file to secure your folders or sensitive files being indexed by search engine spiders
Also, Jetpack provides whitelist IP addresses (Just in case if you try to do invalid login attempts).
Wordfence also has brute-force protection (Not sure at this point of time if that feature is in the commercial version or free version).
Summary / Quickview
Take backup [ Regular ] – Full backups / Partial backups
Run scheduled full scan on your local environment
Use WiFi with WPA encryption
Use secure FTP to transfer files from your computer to the server
Maintain audit logs on your hosting environment
Check your .htaccess files to see if it was modified by a hacker to have a redirect
Check your plugins
Check your users [ Maybe it was some other user who has admin access. Is it only you who is admin? If itās only you, was the password leaked or cracked? ]
Use the GOTMLS scan and run the scanner ā Get off the maliciously loaded scripts
Protect your privacy of whois information [ You donāt want hackers to know the administratorās email address and hack it in order to compromise your hosting account ].
Something fishy? Change all your passwords. WordPress, hosting account, .htaccess .htpasswd, salt keys in wp-config.php, Google Authenticator / 2 factor authentication etc.
Use WP Security Audit Log to do automatic audits for your WordPress website.
Use Wordfence to avoid brute-force attacks, live traffic analysis, use it for blocking IPs or networks for a specific time, and more features.
Santhosh Tuppad has played different roles in his life which include being a passionate entrepreneur, liar, lover, boyfriend, thief, software tester, blogger, reader, trainer, coach, black-hat hacker, white-hat hacker, grey-hat hacker and what not. In this amazing journey of life, he has experienced his salvation. Not to forget that āSalvation comes at a priceā and of course he has paid that price. Before he was known for being merciless, ruthless, unkind, evil etc. And today he is known for kindness, humbleness, and some people call him āPrivacy Fighterā. Santhosh is also one of the OWASP Cheatsheet Contributors and shares his knowledge on Security and Testing unconditionally. The world finds his ways “Unconventional”, but he thinks that it’s the best š
About VTEST
VTEST is independent software testing company catering to product and services teams across the globe. We are a team of software testers that are passionate about quality and love to test. We develop an in-depth understanding of the applications under test and include software testing services strategies that deliver quantifiable results.
In short, we help in building incredible software.