How to Secure Your WordPress Site
Thinking of setting up a WordPress site? Since there’s so much info floating around, here’s an easy guide on how to secure your WordPress site against hackers.
Welcome to Silicon Overdrive!
Every 39 seconds a cyberattack occurs, 75% of which start with an email (Phishing). 72% of hackers target larger companies and 80% of breaches involve stolen credentials or brute force attacks.
Every 39 seconds a cyberattack occurs, 75% of which start with an email (Phishing). 72% of hackers target larger companies and 80% of breaches involve stolen credentials or brute force attacks.
There are a multitude of reasons why cybercriminals wreak havoc on people including money, for fun, to gain access to sensitive information, etc.
Malware (Malicious Software) isn’t just one attack, it’s a collective name for various types of attacks including ransomware, spyware, and viruses.
Malicious software contains code developed by hackers to cause substantial damage to an individual or company’s data and/or systems. Typically these attacks are also used to gain access to the victim’s network.
The simplest ransomware type is called Scareware. It simply means hackers make use of scare tactics to trick victims of the attack to pay the ransom. For example, a fake message appearing on your computer screen saying your computer has a virus and online payment is necessary.
Via email. Credit: Digital Guardian
Via pop-up. Credit: Digital Guardian
A common cyber-attack where users (often hundreds) are contacted via email, text, or phone call by a hacker which often poses as a legitimate business to retain sensitive information from the user such as their credit card details, passwords, etc.
Check out the origins of phishing and how it received its name here.
Credit: Imperva
Trojan (or Trojan horse) is a type of malicious code created to take control of your device. It’s designed to damage, steal, or disrupt an individual or organisation’s data or network.
Common Types of Trojans (norton.com)
View the rest on here.
A Man-in-the-Middle (MitM) attack is when communication between two parties is intercepted by a cybercriminal. The two affected parties think they are in direct contact when in fact, the hacker is relaying or modifying the communication.
A Distributed Denial-of-Service (DDoS) Attack is when an attacker uses a network of infected computers (botnet) to overwhelm a targeted server with phoney requests, preventing the server to handle legitimate requests. The goal is to overwhelm the server with traffic to render the website or online service inoperable.
Botnet – Network of computers that are hacked and controlled remotely by an attacker.
Brute Force Attacks – A trial and error process where a hacker guesses username and password combinations to log in to the backend of a site or application. Hackers often also try to find encryption keys or hidden web pages.
Command and Control (C&C) Server – A computer-controlled by a cybercriminal that sends commands to a system compromised by malware. These servers allow a hacker to gain complete control of a victim’s computer to execute malicious code.
Spyware – Unwanted software created to steal sensitive information about an individual or business by gaining access to their hardware devices. Hackers can also steal information from users via web tracking.
Web Tracking – When websites collect, store and share information about visitor’s activities on the Internet.
Worms – Worms get their name from the way they infect systems. Worms typically start with one machine then work their way through the network, spreading the infection. This type of malware works rapidly, causing damage in a short period.
As a full-stack IT solutions provider, we are the ideal IT consultant to reduce your costs, manage your risk and ensure business continuity through our comprehensive IT Managed Services, support and solutions. Get in touch with our consultants for expert advice.
Thinking of setting up a WordPress site? Since there’s so much info floating around, here’s an easy guide on how to secure your WordPress site against hackers.
Trend Micro Workload Security Trend Micro Workload Security is a comprehensive security and cloud protection suite that scales seamlessly and helps you maintain continuous compliance. Workload Security protects your AWS workloads against threats, malware and vulnerabilities with IPS/IDS, application control,
Considering switching from in-house email to cloud email? Then you might want to consider using..
We use cookies to track visitors, measure ads, ad campaign effectiveness and analyze site traffic. We may also share information about your use of our site with 3rd parties. For more info, see, our Cookies Policy, our Privacy Notice. By clicking “Accept All” you agree to the storing of all cookies on your device. In case you don’t choose one of these options and use our website, we will treat it as if you have accepted all cookies.
We use cookies to track visitors, measure ads, ad campaign effectiveness and analyze site traffic. We may also share information about your use of our site with 3rd parties. For more info, see, our Cookies Policy, our Privacy Notice. By clicking “Accept All” you agree to the storing of all cookies on your device. In case you don’t choose one of these options and use our website, we will treat it as if you have accepted all cookies.