{"id":18771,"date":"2018-06-24T08:00:49","date_gmt":"2018-06-24T12:00:49","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18771"},"modified":"2022-04-27T15:05:01","modified_gmt":"2022-04-27T19:05:01","slug":"tips-to-secure-your-wordpress-site-against-hackers","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/tips-to-secure-your-wordpress-site-against-hackers\/","title":{"rendered":"Tips to Secure Your WordPress Site Against Hackers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">WordPress is an extremely powerful website platform that has been utilized by web developers over the past decade to build anything from blogs to e-commerce sites. In fact, the blog post you\u2019re currently reading is built on WordPress &#8211; as many other sites that you probably visit each day. What\u2019s also risen in the past decade are cyber attacks on WordPress sites, which can be alarming if your business depends on having a working site. Here are a few tips to keep your WordPress site secure.<\/span><\/p>\n<p><b>Lock Down Your Admin Account<br \/>\n<\/b><span style=\"font-weight: 400;\">When you first signup for a WordPress account or you decide to self-host, your website is controlled by an administrator account. By default, the name of a WordPress administrator account is \u2018admin.\u2019 While this username is easy to remember when you want to log in, it also gives hackers half the information they need to hack your website.<\/span> <span style=\"font-weight: 400;\">Start by <\/span><a href=\"http:\/\/www.wpbeginner.com\/wp-tutorials\/how-to-change-your-wordpress-username\/\"><span style=\"font-weight: 400;\">changing the default \u2018admin\u2019 login<\/span><\/a><span style=\"font-weight: 400;\"> to something different &#8211; think of a username that is easy to remember, but also not obvious such as your business name. In addition, be sure that your password is a strong alphanumeric combination and isn\u2019t based on something easily guessable such as your birthday or a pet\u2019s name.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/common-passwords-ranked\/\"><b>Here Are the Most Common Passwords, Ranked<\/b><\/a><\/p>\n<p><b>Keep Everything Up To Date<br \/>\n<\/b><span style=\"font-weight: 400;\">No matter what device or service you\u2019re trying to protect, it\u2019s essential that your WordPress site is updated regularly to combat security threats. Unfortunately, in a recent survey, it was found that almost half of all WordPress sites are not updated to the latest version. Don\u2019t concern yourself with the momentary downtime to perform a critical update, many hosting companies now do automatic updates for you. If your hosting company doesn\u2019t provide this service &#8212; don\u2019t ignore notifications to update, it really is painless and only takes a few minutes.<\/span><\/p>\n<p><b>Change Your Login Address<br \/>\n<\/b><span style=\"font-weight: 400;\">You can generally access the login of a WordPress site by typing in the website address and adding \u2018\/wp-admin\/\u2019 to the URL. For example, if Google was hosted on WordPress, you would head to \u2018www.google.com\/wp-admin\/\u2019 to gain access to their login prompt. By leaving this login address at the default value, you\u2019ve basically shown hackers to the front door. Consider <\/span><a href=\"https:\/\/managewp.com\/blog\/change-your-wordpress-login-url\"><span style=\"font-weight: 400;\">changing the default login<\/span><\/a><span style=\"font-weight: 400;\"> to something more unique to keep hackers guessing. After all, if you knowingly give them access, can you blame them once they break in?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many blogs and websites are built on the popular WordPress platform, but are you doing enough to keep hackers at bay?<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[358,545,249,243,223],"class_list":["post-18771","post","type-post","status-publish","format-standard","hentry","category-security","tag-protection","tag-safety","tag-security","tag-technology","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18771"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18771\/revisions"}],"predecessor-version":[{"id":18837,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18771\/revisions\/18837"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}