{"id":1797,"date":"2016-12-05T04:55:07","date_gmt":"2016-12-05T10:55:07","guid":{"rendered":"https:\/\/www.supportpro.com\/blog\/?p=1797"},"modified":"2026-01-08T00:40:41","modified_gmt":"2026-01-08T06:40:41","slug":"few-tips-to-improve-your-website-security","status":"publish","type":"post","link":"https:\/\/www.supportpro.com\/blog\/few-tips-to-improve-your-website-security\/","title":{"rendered":"Improve your Website Security, But How?"},"content":{"rendered":"<div>\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.supportpro.com\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" class=\"wp-image-15054\" src=\"https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-1024x576.jpeg\" alt=\"\" srcset=\"https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-1024x576.jpeg 1024w, https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-300x169.jpeg 300w, https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-768x432.jpeg 768w, https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-1170x658.jpeg 1170w, https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio-585x329.jpeg 585w, https:\/\/www.supportpro.com\/blog\/wp-content\/uploads\/2016\/12\/BlueandWhiteModernCyberSecurityPresentatio.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<p data-start=\"657\" data-end=\"888\">\u00a0<\/p>\n<p data-start=\"657\" data-end=\"888\"><!-- \/wp:post-content -->After the dot com bubble and information technology explosion, data and information are available and accessible around the globe. Making your website live is like unlocking the door to your premises with your office and safe open.<\/p>\n<p data-start=\"890\" data-end=\"1507\">Things are just the same, except that you will never see anyone come to your website unless you have protection systems in place. Data thieves are invisible and fast, searching for your website for details of your customers\u2019 account data, especially for their e-payment information. You have a legal obligation to protect this data from theft and to report if security breaches occur, particularly when dealing with <a href=\"https:\/\/www.supportpro.com\/blog\/how-managed-cloud-services-improve-security-and-compliance\/how-managed-cloud-services-improve-security-and-compliance\/\"><strong data-start=\"1306\" data-end=\"1339\">cloud security and compliance<\/strong><\/a> requirements<\/p>\n<p data-start=\"1509\" data-end=\"1941\">Stealing your data or information is not the only thing on the mind of a hacker: compromising security is a major motivator. Hackers may want to destroy all your records, put a sick message on your customers\u2019 screens or just destroy your reputation. This is why maintaining <a href=\"https:\/\/www.supportpro.com\/blog\/strengthening-server-hosting-compliance\/strengthening-server-hosting-compliance\/\"><strong data-start=\"1783\" data-end=\"1812\">server hosting compliance<\/strong><\/a> is critical<\/p>\n<p data-start=\"1509\" data-end=\"1941\"><br data-start=\"1824\" data-end=\"1827\" \/>You can never undo the damage done by a hacker, you can take steps to prevent it. Even the most basic protection will discourage many hackers enough to make them go looking for easier pickings elsewhere. Thieves are likelier to steal from people who leave their doors unlocked.<\/p>\n<h2 data-start=\"2227\" data-end=\"2245\">1. Stay updated<\/h2>\n<p data-start=\"2247\" data-end=\"2535\">You need to stay up to date with hacking threats. If you have at least a basic knowledge of what is possible then you can protect your website against it. Follow updates at a tech site such as The Hacker News. Use the information you gain to put fresh precautions in place when necessary.<\/p>\n<h2 data-start=\"2542\" data-end=\"2573\">2. Toughen up access control<\/h2>\n<p data-start=\"2575\" data-end=\"3054\">The admin level of your website is an easy way into everything you do not want a hacker to see. Enforce usernames and passwords that cannot be guessed like <strong data-start=\"2731\" data-end=\"2748\">AvasQ9r_6eDx2<\/strong>, a combination of lower and upper cases of alphabets, numerics, and symbols. Limit the number of login attempts within a certain time, even with password resets, because email accounts can be hacked as well. Never send login details by email, in case an unauthorised user has gained access to the account.<\/p>\n<h2 data-start=\"3061\" data-end=\"3084\">3. Update everything<\/h2>\n<p data-start=\"3086\" data-end=\"3694\">Many people who use software do not install updates immediately. If the reason behind the update is a security vulnerability, delaying an update exposes your websites to attack in the interim period. Hackers can scan thousands of websites an hour looking for vulnerabilities that will allow them to break in. Their internal network is crazy, so if one hacker gets into the website then hundreds of hackers will know as well.<br data-start=\"3510\" data-end=\"3513\" \/>Choosing the right operating system for your <a href=\"https:\/\/www.supportpro.com\/blog\/debian-vs-centos-a-comparison-based-on-webhosting-needs\/\"><strong data-start=\"3558\" data-end=\"3588\">web hosting security needs<\/strong><\/a> also matters<br data-start=\"3601\" data-end=\"3604\" \/><br \/><\/p>\n<h2 data-start=\"3701\" data-end=\"3722\">4. Tighten network<\/h2>\n<h3 data-start=\"3724\" data-end=\"3739\">Check List:<\/h3>\n<p data-start=\"3740\" data-end=\"4029\">a) Expire logins after a short period of inactivity<br data-start=\"3791\" data-end=\"3794\" \/>b) Change passwords frequently<br data-start=\"3824\" data-end=\"3827\" \/>c) Choose strong passwords and NEVER write them down<br data-start=\"3879\" data-end=\"3882\" \/>d) Scan all devices for malware before they are plugged into the network<br data-start=\"3954\" data-end=\"3957\" \/>e) Program for one minute-by-one minute security run for your websites<\/p>\n<p data-start=\"4031\" data-end=\"4274\">Managing these controls efficiently helps overcome common <a href=\"https:\/\/www.supportpro.com\/blog\/5-common-cloud-management-challenges-and-how-to-overcome\/common-cloud-management-challenges-and-how-to-overcome-them\/\"><strong data-start=\"4089\" data-end=\"4120\">cloud management challenges<\/strong><\/a><\/p>\n<h2 data-start=\"4281\" data-end=\"4321\">5. Install a web application firewall<\/h2>\n<p data-start=\"4323\" data-end=\"4784\">A Web Application Firewall (WAF), software or hardware that sits between your website server and the data connection, can help by reading every bit of data passing through it. Cloud-based WAF is the best available for data processing and data security when <a href=\"https:\/\/www.supportpro.com\/blog\/comparing-aws-google-and-azure-which-is-right-for-your-business\/how-managed-cloud-services-improve-security-and-compliance-2\/feed\/\"><strong data-start=\"4580\" data-end=\"4617\">choosing the right cloud platform<\/strong><\/a><br data-start=\"4617\" data-end=\"4620\" \/><br \/><\/p>\n<h2 data-start=\"4791\" data-end=\"4826\">6. Install security applications<\/h2>\n<p data-start=\"4828\" data-end=\"5063\">There are some free plugins such as <strong data-start=\"4864\" data-end=\"4888\">Acunetix WP Security<\/strong> that can provide an additional level of protection by hiding the identity of your website\u2019s CMS. This tool makes your websites more resilient against automated hacking tools.<\/p>\n<h2 data-start=\"5070\" data-end=\"5092\">7. Hide admin pages<\/h2>\n<p data-start=\"5094\" data-end=\"5380\">Don\u2019t let your admin pages be indexed by search engines. You should use the <strong data-start=\"5170\" data-end=\"5184\">robots.txt<\/strong> file to discourage search engines from listing them. If they are not indexed, then they are harder for hackers to find. Tutorials from trusted SEO resources can help you configure this correctly.<\/p>\n<h2 data-start=\"5387\" data-end=\"5411\">8. Limit file uploads<\/h2>\n<p data-start=\"5413\" data-end=\"5787\">File uploads are a major concern for electronic theft. No matter how thoroughly the system checks them, bugs can still get through and allow a hacker access to your website\u2019s data. The best approach is to prevent direct access to uploaded files, store them outside the root directory, and use a script to access them when necessary. <a href=\"https:\/\/www.supportpro.com\/\"><strong data-start=\"5746\" data-end=\"5760\">SupportPRO<\/strong><\/a> will help you set this up.<\/p>\n<h2 data-start=\"5794\" data-end=\"5807\">9. Use SSL<\/h2>\n<p data-start=\"5809\" data-end=\"6013\">Use an encrypted SSL protocol to transfer users\u2019 personal information between the website and your database. This prevents the information from being read in transit and accessed without proper authority.<\/p>\n<h2 data-start=\"6020\" data-end=\"6048\">10. Remove auto fill form<\/h2>\n<p data-start=\"6050\" data-end=\"6295\">When you leave auto-fill enabled for forms on your website, you leave it vulnerable to attack from any user\u2019s computer or phone that has been stolen. You should never expose your website to attacks that utilise the laziness of a legitimate user.<\/p>\n<h2 data-start=\"6302\" data-end=\"6327\">11. Back-up frequently<\/h2>\n<p data-start=\"6329\" data-end=\"6681\">Just in case the worst happens anyway, keep everything backed up. Backup on-site, backup off-site, backup everything multiple times a day. Every time a user saves a file it should automatically back up in multiple locations. Backing up once a day means that you lose that day\u2019s data when your hard drive fails. Remember every hard drive will also fail.<\/p>\n<h2 data-start=\"6688\" data-end=\"6719\">12. You can\u2019t hide your code<\/h2>\n<p data-start=\"6721\" data-end=\"6946\">You can buy software that claims it will hide the code on your web pages. It doesn\u2019t work. Browsers need access to your code in order to render your website pages, so there are simple ways to get around web-page \u201cencryption.\u201d<\/p>\n<h3 data-start=\"6953\" data-end=\"6974\">Need expert help?<\/h3>\n<p data-start=\"6976\" data-end=\"7188\">If you require help, contact <strong data-start=\"7005\" data-end=\"7032\"><a href=\"https:\/\/www.supportpro.com\/\">SupportPRO<\/a> Server Admin<\/strong> and get assistance from a <a href=\"https:\/\/www.supportpro.com\/blog\/why-every-business-needs-a-reliable-dedicated-support-team\/\"><strong data-start=\"7059\" data-end=\"7094\">reliable dedicated support team<\/strong><\/a><\/p>\n<p data-start=\"7190\" data-end=\"7378\">You can also explore how to <a href=\"https:\/\/www.supportpro.com\/blog\/using-social-medias-to-bring-in-more-hosting-business\/\"><strong data-start=\"7218\" data-end=\"7255\">grow your hosting business online<\/strong><\/a> while maintaining strong security<\/p>\n<\/div>\n<div>\n<p><b><span style=\"font-size: large;\">If you require help, <a href=\"https:\/\/www.supportpro.com\/requestquote.php\">contact SupportPRO Server Admin<\/a><\/span><\/b><\/p>\n<\/div>\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-9d590242-d641-4383-94b4-8cfd62f0af6b\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-9d590242-d641-4383-94b4-8cfd62f0af6b\" class=\"hs-cta-node hs-cta-9d590242-d641-4383-94b4-8cfd62f0af6b\"><!-- [if lte IE 8]><\/p>\n\n\n\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2725694\/9d590242-d641-4383-94b4-8cfd62f0af6b\"><img decoding=\"async\" id=\"hs-cta-img-9d590242-d641-4383-94b4-8cfd62f0af6b\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2725694\/9d590242-d641-4383-94b4-8cfd62f0af6b.png\" alt=\"Server not running properly? Get A FREE Server Checkup By Expert Server Admins - $125 Value\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(2725694, '9d590242-d641-4383-94b4-8cfd62f0af6b', {}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->","protected":false},"excerpt":{"rendered":"<p>\u00a0 After the dot com bubble and information technology explosion, data and information are available and accessible around the globe. Making your website live is like unlocking the door to&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1797","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/posts\/1797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/comments?post=1797"}],"version-history":[{"count":9,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/posts\/1797\/revisions"}],"predecessor-version":[{"id":15057,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/posts\/1797\/revisions\/15057"}],"wp:attachment":[{"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/media?parent=1797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/categories?post=1797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.supportpro.com\/blog\/wp-json\/wp\/v2\/tags?post=1797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}