News, news analysis, and commentary on the latest trends in cybersecurity technology.
7 Ways SMBs Can Secure Their WordPress Sites7 Ways SMBs Can Secure Their WordPress Sites
This Tech Tip outlines seven easy fixes that small and midsize businesses can use to prevent the seven most common WordPress vulnerabilities.
September 28, 2023
Enterprises large and small rely on WordPress: At least 43% of websites on the entire Internet use WordPress to power their sites, e-commerce applications, and communities. Running WordPress has its risks, however. In 2022 alone, just two plug-ins led to 6 million users experiencing critical vulnerabilities that put at risk user data, financial information, login credentials, and more.
Securing WordPress can be expensive and complicated for small and midsize businesses (SMBs) with little to no dedicated security staff. Fortunately, seven of the most common issues plaguing WordPress sites can be countered by seven easy fixes.
1. Update WordPress Core
One of the leading issues for WordPress vulnerabilities is an out-of-date core — the foundational files that WordPress sites need to operate. WordPress releases core updates every three months, and missing one or two release cycles can easily leave a site vulnerable. Usage statistics from WordPress show that about 40% of sites are running on outdated versions.
Site administrators need to regularly check their site's WordPress dashboard for the latest updates and schedule maintenance windows when the site will be unavailable in order to apply the updates.
2. Update Themes and Plug-ins, Too
Thanks to a plethora of themes and plug-ins, users can easily customize and experiment with new functionalities. These same themes and plug-ins must also be updated regularly to work with the latest version of Core. The WordPress plug-in dashboard can display the newest versions of each installed plug-in that corresponds with the latest core version.
3. Run Regular Malware Scans
Attackers routinely exploit vulnerabilities in widely used plug-ins to compromise websites. Check plug-ins for flaws prior to installation (and always install the latest version). Regularly conducting security scans can help detect potential malware infections. In case of infection, WordPress offers several cybersecurity detection and removal plug-ins that can assist you in quickly rooting out threats. The primary goal is to confirm that your site core, theme, and plug-in are up to date and void of suspicious file injections or malware. Scanners are overarchingly set up to run at scheduled intervals, and all of them offer on-demand scan capabilities, which users can initiate from an administrative interface.
Note that there is no cybersecurity detection and removal plug-in from the core team. Independent researchers — such as Patchstack, WPScan, and Wordfence — can report vulnerabilities to the plug-in author and core team, and the core team may remove the plug-in from wordpress.org.
4. Sidestep Credit Card Skimming
Business owners can protect themselves against this by using integrations like Stripe or PayPal, essentially verified payment merchants whose systems automatically protect clients from skimming. Conducting a PCI compliance audit alongside an auditor is critical, as they will share reports with recommended actions to get in compliance.
5. Block Unauthorized Logins
Brute-force attacks, where attackers repeatedly run through every possible password combination to gain access to the site, are another common method of attack. Make it difficult for attackers to launch brute-force attacks by using strong login credentials and making it hard to find the site's back-end login page. Configure your WordPress site to have a different wp-admin login URL, not the default path. Adding bot protection provides login protection against potential threats.
Additionally, incorporating CAPTCHAs into your site can quickly stonewall repeated login attempts. The most popular technology and plug-ins used include GoogleReCAPTCHA v3 (Invisible reCaptcha for WordPress) and Hcapchta (hCaptcha for WordPress). A user-friendly alternative is Cloudflare Turnstile or Simple Cloudflare Turnstile.
6. Stop Search Engine Optimization (SEO) Spam
Attackers can take advantage of a site's outdated plug-ins and themes, undefined user roles, spam-like content, and weak security controls to insert spam keywords and pop-up ads. One sign of SEO spam is a malicious plug-in or theme. Clean up all suspicious-looking plug-ins and themes, install spam security plug-ins, and monitor your site frequently.
7. Plug Up File-Inclusion Vulnerability
WordPress installations rely on numerous sensitive files (for example, wp-config.php, install.php, and readme.html). If the proper precautions are not taken, these sensitive files can quickly be rendered vulnerable, allowing hackers to execute their code on your site by including dangerous code alongside these files.
To prevent these vulnerabilities, insert the following code into your .htaccess file:
Options All -Indexes
<Files .htaccess> Order allow,deny Deny from all </Files>
<Files farhan.php> Order allow,deny Deny from all </Files>
<Files license.txt> Order allow,deny Deny from all </Files>
<Files install.php> Order allow,deny Deny from all </Files>
<Files wp-config.php> Order allow,deny Deny from all </Files>
<Files error _log> Order allow,deny Deny from all </Files>
<Files fantastico_fileslist.txt> Order allow,deny Deny from all </Files>
<Files fantversion.php> Order allow,deny Deny from all </Files>
This code can prevent access to sensitive user directories and keep critical WordPress files from being modified, as well as protect your files from unauthorized access.
Keeping Security Tight
Tight security is key to making the most out of WordPress. While WordPress can be a tempting target for many hackers, users can take easy steps to reduce cyber-risk and stave off attacks.
Repelling malicious actors can be as simple as ensuring that your WordPress is completely up to date and taking advantage of the wealth of security plug-in offerings available. Careful research of themes and plug-ins you are looking to use, as well as your host provider of choice, can go a long way toward preventing the pitfalls that have crippled millions of sites.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023