WordPress is now one of the biggest blogging platforms and it’s important to keep your website safe. Respire Digital takes the security of your sites very seriously and make every effort to keep our clients aware of any potential security issues. Here are three common WordPress vulnerabilities & how to fix them.

1. Plugin Vulnerabilities

Plugins often have glitches that make your website vulnerable to hackers. To help prevent this, keep on top of updating your plugins.

If you’re a client of ours, we have processes in place to take care of this for you. If there’s ever a plugin with a possible threat in the update we automatically revert it to the old version until the update is patched. To check to see if any of the plugins you are using have any potential threats, click here.

2. Default Admin User Account/Default Passwords

Is your login to the website the default username and password that came with WordPress when you installed it? I would change it as soon as possible.

We purposely change the username to be more complex & we use a 13+ character password that is unique for each of our clients’ websites. When we give our clients access to the website, we also recommend that they change their passwords to a secure password after their first sign-in. If you struggle with remembering passwords, try using a secure password bank such as LastPass.

3. Vulnerable Hosting Servers

Since the server where your WordPress website resides is a target for attackers, using low-quality hosting services can make your site more vulnerable to being compromised. While all hosts take precautions to secure their servers, not all hosting providers are as vigilant or implement the latest security measures to protect websites on the server-level.

Respire Digital frequently run scans of our servers to ensure that our client sites are safe. If there’s a possible threat we are immediately alerted by the scan & take action to ensure that the sites are not affected.

Do you have any questions regarding your website’s safety? Contact Us Today!