November 3, 2017

Securing Your Plugins, Themes, and Services

By CloudTweaks

Securing Your Plugins, Themes, and Services

Continued from part 1 of our 2 part WordPress security series.

For web scribblers who use WordPress, security should always come first since news of exploited vulnerabilities crop up with intensifying frequency. WordPress powers 74.7 million websites and is officially the world’s most popular – and most targeted – content management system. So, high ROI of a single WordPress exploit drives hoards of script kiddies to target the platform.

If it isn’t a wordpress vulnerability that sends shock waves through the community, it’s the plugins’ security holes. So WordPress security experts urge all bloggers to install updates to their plugins as soon as they are released.

With that in mind, let’s see how you can protect your blog against Vulnerabilities in third-party plugins and services.

Validating Plugins

WordPress plugins are thoroughly vetted for Malware before they make it to the repository. But plugins aren’t perfect – security weaknesses can be found in any utility. Treating plugin updates as a low-priority routine is a big mistake since a single unpatched hole can lead to your entire blog getting hijacked.

Things to consider before installing any third-party plugin:

  • Availability of credible user reviews and high rating.
  • Avoid new plugins, as well as those with few installs.
  • Study plugin documentation – is it thorough, detailed, and polished?
  • Opt for plugins from developers with a positive track record of releasing solid work.

Steering Clear of Malvertising

Many blogs monetize their traffic through third-party ads. Unfortunately, some ad services spread malicious code. If your readers find out your blog spreads malware, it’s not your ad service they’re going to blame, but you. And few things are worse than getting caught spreading malware. You can lose your readers and get punished by Google big time. So you need to make sure your ads aren’t malvertising on your behalf.

Here is how:

  • Use only established ad services like Google AdSense or Bing Ads.
  • Install an internal security monitoring solution (i.e., Sucuri, WordFence). That way, even if a popular ad network is infested through an unknown vulnerability, your monitoring solution would identify the malicious code faster than your ad provider.
  • Stay on top of the security news and updates.
  • Be vigilant – if you suspect something is off, deal with it ASAP even if it means taking down your ads until the issue is solved. You may lose a few dollars, but if your ads are spreading malware, you will lose your traffic and reputation.

Potentially Harmful Utilities

Just like you only should install mobile apps and Steam games from legitimate repositories, you want to stick to the official WordPress repository for your plugins and themes.

The Internet abounds in lucrative offers of popular “premium plugins for free,” but the websites giving away such freebies are major malware distributors. These premium plugins were hacked; a malicious code was injected. Whenever you get a premium plugin for free, you voluntarily infect your blog with a virus that’s going to hit you or your users.

So, do yourself a favor and only download plugins and themes from the official WordPress library, and steer clear of offers that sound too good to be true.

Less Is Better

When it comes to plugins, less is better. But many bloggers – especially novices – rush to beef up their sites with a gazillion plugins with fantastic functionality.

The accessibility of plugins almost makes it seem irrational to stick to the necessary minimum only. And yet, you should hold your horses.

A multitude of plugins isn’t conducive to security, nor is it necessary for the smooth operation of your blog. The more plugins you install, the more they chip away from your site’s performance and responsiveness. From the security perspective, each plugin is a security risk with holes yet to be uncovered and patched.

Finally, an excess of plugins makes blog maintenance an updates overkill, and you might skip installing important patches.

Maintenance Tips

Now that you’ve configured your blog properly and installed your utilities, you need to account for maintenance. Things get broken, outdated, or compromised. So you can’t neglect nor underestimate the importance of thorough maintenance and monitoring of your WordPress blog.

  • Uninstall Outdated Plugins

Outdated plugins and WordPress installations contain known vulnerabilities that are patched in the newer versions.

If your plugins don’t get frequent updates or aren’t tested with the current WordPress version, it is always a bad sign. Uninstall them and replace with up-to-date plugins with similar functionality. There’s ample selection of plugins on WordPress repository.

  • Keep It Clean

As your blog grows some muscle, you will add and remove content, plugins, themes, and whatnot. Keeping things tidy – and secure – is a matter of deleting everything you no longer use.

Inactive themes and plugins not only take up space and consume resources but also represent a security risk. Even if you deactivate a plugin, it’s still on your server and hackers can run a script to exploit its vulnerabilities. Instead, delete unneeded plugins completely.

WordPress security is not rocket science but a matter of not ignoring what every single security expert is saying – update! Even Equifax owes its hack to an unpatched vulnerability. So, be vigilant and don’t let small things escape you!

Endpoint Security And Disaster Preparedness

Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination of tweaks and plugins, won’t get you far.

You need to have a security strategy that not only oversees most attack vectors but also allows you to mitigate damage and restore your site quickly in the event of an accidental data loss, breach or a hijack.

Endpoint Security

Securing your WordPress blog requires more than just watertight backend protection, timely updates of the WordPress core and plugins, or an internal monitoring system. One of the frequently overlooked breach points in your blog’s security perimeter is your endpoint device.

WordPress makes it possible to access your admin dashboard from many devices such as computers, laptops, smartphones, and tablets. Losing any of the devices you use to access your blog, or having them hacked, means exposing your blog to great risks.

So you need to exercise appropriate precautions and account for endpoint security.

Endpoint Security Tips:

  • Secure your devices by using a strong PIN or password, and enabling two-factor authentication to unlock your device such as biometric ID, if possible.
  • Set your devices to auto-lock after a set time on idle.
  • Don’t access your WordPress backend from public computers, as these often are riddled with spyware and keyloggers. Likewise, their browsers can be configured to automatically store your login credentials, in which case you’d be giving away your login details to an awful lot of strangers using the computer after you.
  • Don’t check your email from public computers, either, for the same reasons. Your email is vital to your WordPress security – anyone gaining access to it could reset your WordPress password.
  • Do not access your WordPress admin dashboard nor your email from public Wi-Fi hotspots, unless you are using a trusted Virtual Private Network (VPN) with robust encryption and OpenVPN protocol.
  • Only install apps and games on your smartphone from the official app store.

Disaster Preparedness

Hope for the best but prepare for the worst. Assume that, even with the latest updates and the best of manual tweaks, there is a vulnerability that escaped your scrutiny.

When the worst happens, do you have the backups to fall back to, or do you know where they are? Are they even current? How long will your blog be down while you mitigate the damage? What if your hosting provider goes out of business suddenly? Or you just lose data by accident?

When you know the answers to all these questions, you have a security strategy.

Disaster Preparedness Tips:

  • Have a plan. Break down a huge task of restoring your blog from a hack/accident/act of God into smaller, digestible chunks.
  • Consider having a failover service that would redirect your traffic while your blog is down.
  • Have a temporary notification page you can display to your readers telling them that you won’t be down for long.
  • Be ready to start and restart your blog’s services, such as your database and web service, if needed.

WordPress Backups

Without a current backup on hand, you’ll have to clean your blog manually or pay someone to do it for you. On the other hand, if your web hosting gets compromised, there’s little you can do but move to another hosting service. In this case, a current backup is also crucial. An ideal backup tactic would be to combine several backup storage locations so that if one location gets compromised, you can always use the alternative source.

Likewise, backups should be incremental and automatic. When your backups are current and readily available, you will restore your data and re-deploy your blog almost immediately, with minimum downtime. On the contrary, a slow recovery from a hack could have a negative SEO impact on your blog’s rankings, organic search traffic, and revenue.

Backup Tips:

  • Have a plan and a step-by-step “note to self” on where your backups are, and how to restore them quickly.
  • Automate your backups. Manual backups aren’t reliable as you will inevitably forget to backup at some point.
  • Schedule backups to run during hours with the lowest traffic since backups can consume a lot of system resources.
  • Check up on your scheduled backups. If you run out of storage space, backups could fail. A gazillion of other things could cause a backup failure, so be vigilant.
  • Have incremental backups – daily, weekly, and monthly you can fall back on in case disaster happens. There are too many unknowns in a disaster equation, and having ample backups to restore from is a key to minimizing downtime.
  • Have multiple backups stored in various places such as with your web host and a secondary service, or even locally on your hard drive or external drive.

Backup Options:

  • Most web hosting providers offer native backup solutions. Use that as a secondary backup storage. Note that, with some providers, you may need to set up your backups manually, especially with the Virtual Private Server systems (VPS).
  • Cloud-based backups are efficient since they can be automated and convenient to restore from, especially with the native WordPress cloud backups available as a part of the WordPress Security plugin.
  • Internal monitoring systems like Sucuri and Wordfence also let you set up and manage your backups.

Wrapping Up

The WordPress threat landscape is continuously changing, so you need to be on top of the security best practices, expert findings, patch releases, and community discussions. In other words, be proactive, not reactionary.

By securing your blog properly, you will be able to develop a solid reputation, build traffic faster and avoid costs associated with site cleaning and recovery after a hack.

That’s it. Hope this helps.

By Alex Grant

CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information, resources and thought leadership services. Contact us for ways on how to contribute and support our dedicated cloud community.
Alex Dean

Privacy in Personalization: Strategies for Trust & Compliance

Enabling Privacy and Personalization (Updated: 02.16.2024) Most businesses today rely on data collected online to [...]
Read more
Rakesh Soni

Breaking Barriers with the Cloud: How Computing is Unlocking New Business Horizons

Breaking Barriers with the Cloud The ever-increasing rate of global cloud adoption is enough to [...]
Read more
Mark Rochester

Episode 23: The Missing Link in Migration Work

Active Directory Migration Performing an Active Directory migration to the cloud can be quite an [...]
Read more
Rahul Subramanyam

Episode 18: Fixing AWS: The CloudFix Story 

Fixing AWS: The CloudFix Story A conversation with Rahul Subramanyam. CEO at CloudFix, and CTO [...]
Read more
Jeremy Smillie

Securing the Future: Insights from DevSecOps Expert, Jeremy Smillie

Welcome to another insightful discussion on CloudTweaks. Today, we have the privilege of delving into [...]
Read more
Laduram Vishnoi

8 Best Practices for Real User Monitoring

Real User Monitoring You have built an amazing website or app but still do not [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.