Month: February 2016

Website backups

The Case For Website Backups

File backups are essential to the security of any site. With regular, tested website backups, you can recover your site easily from any of the following issues:

  • hardware failures
  • accidental deletions
  • defacements
  • ransomware

They can also be problematic. This week we’ll discuss why website backups are essential, and then reveal how faulty backup security can harm a site and how to prevent that from happening.

Read More

WordCamp Jacksonville

We Can’t Stay Away!

We had such a good time @WordCampMiami that we’re heading back to the Sunshine State in April for @WordCampJax.

We’re stoked to be sponsoring and attending the inaugural WordCamp Jacksonville at Florida State College in April. We’ll be soaking in the sun, handing out swag (spoiler: it’s awesome), and of course meeting all of you incredible WordPressers! So mark April 16th and 17th on your calendar and we will see you there!

So mark April 16th and 17th on your calendar and we will see you there!

WordPress security

Speeding Up Your WordPress Site

 

CDNs are great for WordPress sites because much of the post content is static and can easily be cached and served by a CDN. With visitors receiving cached content from the closest CDN data center, origin server load decreases, allowing sites to load faster for site visitors. At the same time, serving a site from multiple data centers makes the origin server more robust. A fortuitous spike in traffic won’t take a site down as the data centers handle the increased load.

Visit wpdistrict.sitelock.com for the full story.

Speeding Up Your WordPress Site with a CDN

A content delivery network (CDN) is a network of powerful computers located in geographically disparate locations designed to serve web content to visitors with higher performance and efficiency. When a user visits a site using a CDN, the traffic routes through the closest or most efficient server for that user and serves up cached, or stored, versions of the site resources. This allows the site to load faster and eliminate requests back to the origin server. Common resources served by a CDN include static resources like images, HTML, CSS and JavaScript files.

Read More

IoT security needed

Does Your Coffee Maker Need IoT Security?

There’s no bigger buzzword in the security world now than the ‘Internet of Things.’ The Internet of Things, or IoT, is the connectedness of everyday devices and sensors to allow the quantification and control of systems. Video doorbells alert wayward homeowners of visitors. Bluetooth fobs connect car keys to smartphones. Thermostats track heating and cooling preferences to select a tailored temperature for a homeowner.  Unfortunately, the design complexity of a previously unconnected device now given intelligence and network access can lead to unforeseen issues and real-world consequences. Therefore, IoT security must be a consideration and, ideally, a foundational characteristic in their design.

Read More

Tax refund

Learn How to Protect Your Tax Refund from Hackers

Filing for your taxes can be a nuisance, but the refund you receive is well worth the effort, especially if you have big plans for your tax credit. But how would you feel if your refund check was stolen?

Read More

how to prevent security breaches

Authentication Failure in File Browser, Manager, Backup (+ Database) WordPress Plugin

While reviewing malware, the SiteLock Research Team detected suspicious code in a WordPress plugin. We reviewed the suspicious code and found the plugin wasn’t malicious per se, though it was potentially vulnerable to attack. We will discuss the plugin and analyze its unique authentication issues, and then discuss mitigation and the dangers of using unsupported plugins.

Visit wpdistrict.sitelock.com for the full story.

WordPress plugin vulnerability

Authentication Failure in File Browser, Manager, Backup (+ Database) WordPress Plugin

While reviewing malware, the SiteLock Research Team detected suspicious code in a WordPress plugin. We reviewed the suspicious code and found the plugin wasn’t malicious per se, though it was potentially vulnerable to attack. We will discuss the plugin and analyze its unique authentication issues, and then discuss mitigation and the dangers of using unsupported plugins.

Read More

Powered by WordPress & Theme by Anders Norén