When considering why hackers are attacking websites, you might think that there’s a specific reason they target you as a website owner—your business, your reputation,…
What are internet cookies, how should you feel about them? Are they helpful, harmless, dangerous? Cookies are key to our modern online experience with targeted…
Most of us are already familiar with phishing: A common type of internet scam where unsuspecting victims are conned into entering their real login credentials…
Can you think of an online service that doesn’t require a password? Everything on the internet requires a password. However, constantly creating and remembering new…
We have discussed in the past how out-of-the-box security configurations tend to not be very secure. This is usually true for all software and WordPress…
Recently we have been seeing a rash of WordPress website compromises with attackers abusing the plugin upload functionality in the wp-admin dashboard to redirect visitors…
According to the 2020 Data Breaches report by Verizon, 25% of all breaches involved the use of stolen credentials. And for small businesses, that number…
What is file integrity monitoring? File Integrity Monitoring (FIM) is a security measure that checks and compares files against a known baseline to detect any…
What does your WordPress site look like to hackers? Would it be tough to crack? Or does it have unlocked doors and unlatched windows just waiting for someone…