Frequently Asked QuestionsRandom

How can I protect my website from attackers?

In this article, we will offer you some tips that you should follow to stay as protected as possible from attackers.

5
Views 561Updated 3 luniPublished on 11/06/2019by Cătălin Adrian

There are a few very important tips that any web hosting user should follow to protect themselves as much as possible from malicious individuals and robot attacks.

  1. Use complex and unique passwords for all accounts. Keep these passwords in a secure environment, preferably using a free password manager like KeePass. Do not share passwords with others, regardless of the circumstances.

  2. Make sure that the device from which you access the hosting account, the control panel (cPanel, Plesk, Webuzo, etc.), the email addresses, or the website administration panel has an installed and activated firewall and updated antivirus. This prevents the infection of the device and the compromise of the data you have access to.

  3. Incorrectly set permissions for the directories and files of the site represent a significant risk. Never use permissions 777 on files or directories. The correct permissions are usually 755 for directories and 644 for files. Permissions 777 can provide unauthorized access to attackers or bots, exploiting their vulnerabilities.

  4. If you have contact forms, registration, or account creation on your site, they need to be protected by implementing security plugins such as CAPTCHA or reCAPTCHA. These measures prevent bots from generating SPAM through forms.

  5. Scripts, applications, themes, and outdated modules pose a major risk to the site. Vulnerabilities that developers fix through updates can be exploited if they are not applied in a timely manner. Ensure that the site is always updated with the latest versions.

  6. Immediately remove scripts, modules, or themes that are no longer in use. These are often forgotten, do not receive the necessary maintenance, and can become a source of vulnerabilities.

  7. Never use pirated software (nulled). These are often accompanied by intentionally introduced vulnerabilities that can be easily exploited after installation.