8/1/2015. Please Ask Questions! 2 Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures.

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

WordPress from Start to Finish Day 1: Installing and Using WordPress Looking at the WordPress database.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Getting Set-up with Hosting and WordPress Gregory Young Alternative Hosting
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Easy Website Creation Using WordPress Welcome and Thank You to our Sponsors.
A WordPress Business Website Checklist THE CHECKLIST MANIFESTO AS APPLIED TO WORDPRESS AND YOUR BUSINESS.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
About the CMS WordPress A brief overview of both Wordpress.org & WordPress.com WordPress is one of the most popular content management and blog publishing.
Threats to I.T Internet security By Cameron Mundy.
Higher Order WP Security Hacks, attacks, and getting your site back Dougal Campbell.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
MAKING GOOD PASSWORDS (AND HOW TO KEEP THEM SAFE).
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Drupal Security Securing your Configuration Justin C. Klein Keane University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
www.ursamajorconsulting.com1 Avoid Getting Hacked Joomla! Web Security Northern Virginia Joomla Users Group January 2012 Dorothy Firsching, Ursa.
IT security By Tilly Gerlack.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
CIS 450 – Network Security Chapter 8 – Password Security.
In the old days... You Your computer. Then came... The Network.
Securing your WordPress Site Presented by Russ Sanderlin.
SIG Leader: Mike Smith Host of the Mike Tech Show podcast
Wordpress Ben Mulpeter. What is wordpress?  Wordpress is a free Content management system (CMS)  It allows free tools to help design your website and.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Basics of Drupal for Admins Rochelle Terman
Apache Security Travis Jeffries. Introduction Authentication and Authorization Strict Access Methods Defending against Attacks Bad CGI Programs Apache.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Web Applications Testing By Jamie Rougvie Supported by.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Wireless and Mobile Security
Xytron data recovery re-launches blog 1888PressRelease - A full remake and re-launch of the Xytron blog has been rolled out following an attack by the.
ASSIGNMENT 2 Salim Malakouti. Ticketing Website  User submits tickets  Admins answer tickets or take appropriate actions.
PUBLISHING & COLLABORATION. SOCIAL NETWORKING ▪ Web sites such as Facebook, Twitter and LinkedIn are generally the first names people associate with social.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
SEARCH ENGINE OPTIMIZATION, SECURITY, MAINTENANCE.
Computer Security Sample security policy Dr Alexei Vernitski.
Website Update and Use of Official accounts Dr.Lasantha Ranwala ( MBBS,MSc-Biomedical Informatics) Medical Officer - Health Informatics RDHS Office.
Backup, Updates and Security Russ Sanderlin #wcjax 1.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Effective Wordpress Hosting Service By InstantAppz.
Some More Points on Why WordPress CMS is Preferred & About Free WordPress Themes.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Wordpress Overview Wordpress is an open-source and free Web publishing application, content management system( CMS) and blogging tool built by a community.
Migrating Wordpress Migrating Wordpress can sometimes get more complicated as it should. There is no plugin that does this for you, the best way is to.
Common Methods Used to Commit Computer Crimes
TECHNOLOGY GUIDE THREE
Web Maintenance with WordPress
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Easy Website Creation Using WordPress
Web Servers / Deployment
REDCap and Data Governance
Welcome to WordUp Pompey! 15th November 2018
Welcome to WordUp Pompey! 15th November 2018
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Backup Before You Crackup
Woocommerce Security, Shipping & Payment Integrations.
10 REASONS TO USE JETPACK FOR WORDPRESS IN 2019
Presentation transcript:

8/1/2015

Please Ask Questions! 2

Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures Home Depot/Target Credit Card Loss NSA Metadata 3

Security x Convenience = Constant 4

Some security issues are out of your hands

Why Does WordPress Get Hacked? Widely Used Thousands plugins which are unmonitored from a single source Same reasons Windows gets hacked more 6

What Happens When Your Site Gets Hacked Spam links Infect other sites Political messages 7

Security Helps SEO 8

9

Keep WordPress And Plugins Updated 10 Also remove plugins and themes you’re not using

Protect Your Login Weak or common passwords Brute force attack 11

Adobe Password Leak Last summer, Adobe lost 150 million passwords The passwords had flaws in their encryption that let hackers easily reverse engine the password list 12

Top 100 Most Common Passwords 13

Improve Password Security Use a password with upper case, lower case, numbers and symbols Use at least 9 characters Do not use a word that is found in a dictionary Use a separate password for all of your sites 14

Protect Your Login Do not use “admin” as your admin name Use a password manager like LastPass or Roboform to generate and store passwords Use SFTP and not FTP 15

Be Aware of Insecure Access 16

Increase Password Security Use Two Factor Authentication Google Authenticator 17

Use A VPN (Virtual Private Network) 18 Check your home router to see if it has this functionality built in

Keep Your Sites Up To Date 19

Google Webmaster Tools Early Warning System Will also give you SEO tips 20

Include Security Plugin Stop brute force password attacks Scan for core code changes Notification of out of date WP and plugins Block entire countries Takes care of a lot of manual blocking 21

Other Quick Tips Change default database table prefix from wp_ Change your authentication keys in wp-config.php ( g/secret-key/1.1/salt/) g/secret-key/1.1/salt/ 22

23

What Is SSL Paid Cheap-Comodo Expensive-Verisign Free Comdo (for 90 days) EFF's Out in Septemberhttps:// startssl.com (free for personal use) Self signed just for security 24

Make Sure WordPress Knows To Use SSL Force SSL login directive in wp-config.php WordPress HTTPS (SSL) Hasn't been updated in a while but it is a pretty simple plugin 25

Brief Overview Of WordPress File Structure / (the root) /wp-admin/ /wp-includes/ /wp-content/ /themes /plugins /uploads /upgrade 26

Check Your Permissions Only allow the web server to read and write, everyone else can only read Files 664 Directories

Stop Key Files From Executing.htaccess deny from all 29 /wp-content/uploads /wp-includes

Stop Key Files From Executing.htaccess order allow,deny deny from all 30 wp-config.php

Restrict Dashboard And Posting To Specific IP Address.htaccess order deny,allow deny from all Allow from xx.xxx.xxx.xxx order deny,allow deny from all Allow from xx.xxx.xxx.xxx WhatIsMyIP.com 31 wp-admin

32

Use A CDN Content Distribution Network Speeds up your site Visitors get something even if your site is down 33

Revert To Backup Hosting Provider BackUpWordPress VaultPress WP-DB-Backup Strategy 34

Cleaning Up Back up what you have including the database and move it offline. Completely replace wp-admin and wp- include. Re-install all plugins from the source. Check all of the files in your theme. Delete everything else. 35

Questions? 36

Twitter.com/ccondray 9/26/2012 Twitter.com/ccondray /1/2015