your server’s resources 2. something malicious or spammy 3. promote propoganda 4. make money 5. spread viruses 6. because they can 7. yes, big or small, everyone is a target 5
2. don’t use FTP, use SFTP or SSH 3. different passwords for everything 4. use a password manager (Lastpass) 5. practice least privilege 6. access only what is needed and when 7. remove old accounts 8
“password” 2. don’t use pet or children’s names 3. uppercase letters, lowercase letters, numbers, special characters 4. longer is better than shorter 5. use password managers to create and store new passwords 9
reputable web hosting company 2. should offer SFTP or SSH access 3. pay now for good hosting or pay later for bad hosting 4. shared hosting or VPS? 5. keep server software PHP & MySQL up-to- date (you or host) 6. do they have emergency backups? Fees? 10
(1. vs .1 releases) 2. don’t login with admin, create new account 3. each user should have their own account 4. use the user roles - admin, editor 5. always practice least privilege 6. remove unused accounts 12
know your sources (WordPress.org) 2. backup, then update plugins and themes 3. test on a local or development server 4. delete inactive plugins and themes 5. use as few plugins as it takes to get the job done 14
reinfection: clean up, restore, or take down site ASAP 2. don’t get google blacklisted 3. hire experts, like Sucuri 4. restore site from recent backup 5. does your host offer emergency backups? 6. time matters! 15
be cleaned, but… 2. usually can not undo damage done 3. updates to software may break sites 4. maintaining backups is essential 5. set up an automatic schedule 6. know how to do a manual backup 7. backup files as well as database 16
and db before updates! 2. don’t store backups on your server 3. schedule backups based on how much information you’re willing to lose 4. test backups periodically 5. keep backups accessible for emergencies 6. http://codex.wordpress.org/ WordPress_Backups