WordPress powers over 800 million websites. That popularity makes it a target for automated attacks that scan the internet for vulnerable WordPress installations. Here is how to make yours resilient.
Immediate Security Actions
1. Update Everything
WordPress core, themes, and plugins -- update all of them within 48 hours of new releases. Enable auto-updates for minor WordPress versions and plugin security patches. Most hacks exploit vulnerabilities that have available patches.
2. Strong Authentication
- Change the default admin username from "admin" to something unique
- Use passwords with 16+ characters (password manager generated)
- Enable two-factor authentication for all admin and editor accounts
- Limit login attempts (block IPs after 5 failed attempts)
3. Remove Attack Surface
- Delete unused themes and plugins (deactivated is not enough -- delete them)
- Remove the WordPress version number from the source code
- Disable XML-RPC if you do not use it (common attack vector)
- Disable file editing in the WordPress admin (define DISALLOW_FILE_EDIT in wp-config.php)
Server-Level Security
- Web Application Firewall: Filter malicious requests before they reach WordPress
- File permissions: Directories at 755, files at 644. wp-config.php at 600.
- Database prefix: Change from the default wp_ to something unique
- Disable directory listing: Prevent browsing your file structure
- Security headers: X-Frame-Options, X-Content-Type-Options, Content-Security-Policy
Ongoing Maintenance
Security is not a one-time setup. Monthly maintenance includes: reviewing admin accounts, checking for file changes, testing backup restoration, reviewing security logs, and verifying all plugins are still maintained.
Need WordPress security help? Check our security services or contact us for an audit.
Tags
Tony Paris
Founder and Tech Wizard at AppWT Web & AI Solutions. With over 29 years of experience in web development, Tony helps businesses succeed online through custom websites, SEO, and AI integration.
Learn more about TonyEnjoyed this article?
Share it with your network