{"id":135,"date":"2014-12-11T13:05:26","date_gmt":"2014-12-11T13:05:26","guid":{"rendered":"http:\/\/localhost\/asaltaold.com\/\/?p=135"},"modified":"2023-12-09T10:01:48","modified_gmt":"2023-12-09T10:01:48","slug":"wordpress-security-tutorial","status":"publish","type":"post","link":"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/","title":{"rendered":"WordPress Security Tutorial"},"content":{"rendered":"<h4 class=\"post-title\" style=\"color: #428bca;\">WordPress Security Tutorial<\/h4>\n<p>I have been revisiting the various security settings of my WordPress blog after the sudden database table corruption of this blog for <strong>unknown<\/strong> reason last week. In this post I have highlighted some of the security tips that can help protect your blog from possible outside attacks.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-998\" title=\"blog_security_128_2\" src=\"https:\/\/www.tipsandtricks-hq.com\/wp-content\/uploads\/2009\/03\/blog_security_128_2.jpg\" alt=\"blog_security_128_2\" width=\"128\" height=\"129\"><\/p>\n<div class=\"custom_yellow_box\" style=\"color: #3f2502;\">\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Protect your WordPress Admin Area<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">It is important to restrict the access to your WordPress admin area only to people that actually need access to it. If your site does not support registration or front-end content creation, your visitors should not be able to access your <strong>\/wp-admin\/<\/strong> folder or the <strong>wp-login.php<\/strong> file. The best you can do is to get our home IP address (you can use a site like <a style=\"color: #4290c5;\" href=\"http:\/\/www.whatismyip.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">whatismyip.com<\/a><\/p>\n<p style=\"color: #666666;\">In case you want to allow access to multiple computers (like your office, home PC, laptop, etc.), simply add another <em>Allow from xx.xxx.xxx.xxx<\/em> statement on a new line.<\/p>\n<p style=\"color: #666666;\">If you want to be able to access your admin area from any IP address (for example, if you often rely on free Wi-Fi networks) restricting your admin area to a single IP address or to few IPs can be inconvenient. In such cases we recommend that you limit the number of incorrect login attempt to your site. This way you will protect your WordPress site from brute-force attacks and people trying to guess your password. For such purposes, you can use a nice little plugin called <a style=\"color: #4290c5;\" href=\"http:\/\/wordpress.org\/plugins\/limit-login-attempts\/\" target=\"_blank\" rel=\"noopener noreferrer\">Limit login attempts<\/a>.<\/p>\n<p><a style=\"color: #4290c5;\" name=\"username\"><\/a><\/p>\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Don&#8217;t use the &#8220;admin&#8221; username<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">Most of the attackers will assume that your admin username is &#8220;admin&#8221;. You can easily block a lot of brute-force and other attacks simply by naming your admin username differently. If you&#8217;re installing a new WordPress site, you will be asked for username during the <a style=\"color: #4290c5;\" href=\"http:\/\/www.siteground.com\/tutorials\/wordpress\/wordpress-installation.htm\" target=\"_blank\" rel=\"noopener noreferrer\">WordPress installation<\/a> process. If you already have a WordPress site, you can follow the instructions in our tutorial on <a style=\"color: #4290c5;\" href=\"http:\/\/www.siteground.com\/tutorials\/wordpress\/change-wordpress-username.htm\" target=\"_blank\" rel=\"noopener noreferrer\">how to change your WordPress username<\/a>.<\/p>\n<p><a style=\"color: #4290c5;\" name=\"password\"><\/a><\/p>\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Use strong passwords<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">You will be surprised to know that there are thousands of people that use phrases like &#8220;password&#8221; or &#8220;123456&#8221; for their admin login details. Needles to say, such passwords can be easily guessed and they are on the top of the list of any dictionary attack. A good tip is to use an entire sentence that makes sense to you and you can remember easily. Such passwords are much, much better than single phrase ones.<\/p>\n<p><a style=\"color: #4290c5;\" name=\"twofactor\"><\/a><\/p>\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Consider two-factor authentication<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">Enabling two-factor authentication for your WordPress website will significantly improve the security of your website. One of the easiest ways to do this is to use<strong><span style=\"color: #0000ff;\"> <a href=\"https:\/\/www.google.com\/landing\/2step\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #0000ff;\">Google 2 factor authentication<\/span><\/a><\/span><\/strong> or Clef to authenticate using your mobile phone. For all SiteGround users, Clef authors have created an ad-free version of their plugin. Check out our <a style=\"color: #4290c5;\" href=\"http:\/\/www.siteground.com\/tutorials\/wordpress\/clef.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Clef tutorial<\/a> for more information on that matter.<\/p>\n<p><a style=\"color: #4290c5;\" name=\"hosting\"><\/a><\/p>\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Make sure you&#8217;re site is on a secured WordPress hosting<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">Your WordPress site is as secured as your hosting account. If someone can exploit a vulnerability in an old PHP version for example or other service on your hosting platform it won&#8217;t matter that you have the latest WordPress version. This is why it is important to be hosted with a company that has security as a priority. Some of the features that you should look for are:<\/p>\n<ul style=\"color: #666666;\">\n<li>Support for the latest PHP and MySQL versions<\/li>\n<li>Account isolation<\/li>\n<li>Web Application Firewall<\/li>\n<li>Intrusion detecting system<\/li>\n<\/ul>\n<p><a style=\"color: #4290c5;\" name=\"computer\"><\/a><\/p>\n<h2 class=\"heading h3\" style=\"font-weight: 400; color: #666666;\"><span style=\"color: #000080;\"><strong>Ensure your computer is free of viruses and malware<\/strong><\/span><\/h2>\n<p style=\"color: #666666;\">If your computer is infected with virus or a malware software, a potential attacker can gain access yo your login details and make a valid login to your site bypassing all the measures you&#8217;ve taken before. This is why it is very important do have an up-to-date antivirus program and keep the overall security of all computers you use to access your WordPress site on a high level.<\/p>\n<p style=\"color: #666666;\">\n<\/div>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\"><strong>Use Strong Passwords for all Entry Points<\/strong><\/span><\/h2>\n<p>I was surprised to find out how many of my friends use the WordPress admin password generated by WordPress during install time and thinks that their blog is protected from attacks as they are using a strong password! The WordPress admin password generated during install time is normally pretty strong (consists lowercase and uppercase letters with numbers and symbols) so there is nothing wrong with that. I was mainly shocked to find out that their ftp\/cPanel password for that domain is not that strong. It gets even better\u2026 one of them were using his partners name as the password (Did I mention that his partner\u2019s name was mentioned on his blog\u2019s \u2018About\u2019 page?)! The ftp\/cPanel password for your domain is equally important. If someone can access your cPanel then that person can delete your WordPress database from the cPanel-&gt;Databases-&gt;MySQL Databases. Anyway, the bottom line is to use strong passwords for all entry points not just one.<\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Add a CAPTCHA on your WordPress Login page<\/span><\/h2>\n<p>Adding a simple captcha to your WordPress login page is another great way to minimize the chance of a bot\/script gaining access to your site via a brute force attack. Its recommended to add <strong><span style=\"color: #000080;\"><a href=\"https:\/\/www.google.com\/recaptcha\/intro\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #000080;\">Googles Recaptcha<\/span><\/a><\/span><\/strong> for WP <a href=\"https:\/\/www.google.com\/recaptcha\/intro\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.google.com\/recaptcha\/intro\/index.html<\/a><\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Protect the \u2018wp-admin\u2019 Directory<\/span><\/h2>\n<p>Use a .htaccess file in the \u2018wp-admin\u2019 directory to limit access to only certain IP addresses (your home, work etc). The <a style=\"color: #16a6b6;\" href=\"https:\/\/www.tipsandtricks-hq.com\/cool-wordpress-htaccess-tips-to-boost-your-wordpress-sites-security-1676\">WordPress htaccess<\/a> tips post has more htaccess related tips and tricks. Below is an example .htaccess file that can be used for this purpose (replace \u2018x\u2019 and \u2018y\u2019 with your IP address)<\/p>\n<p>AuthUserFile \/dev\/null<br \/>\nAuthGroupFile \/dev\/null<br \/>\nAuthName \u201cAccess Control\u201d<br \/>\nAuthType Basic<br \/>\norder deny,allow<br \/>\ndeny from all<br \/>\n# whitelist home IP address<br \/>\nallow from xxx.xxx.xxx.xxx<br \/>\n# whitelist work IP address<br \/>\nallow from yy.yyy.yyy.yyy<\/p>\n<p>If you don\u2019t have static IP addresses then the above method can be a bit hard to implement. In that case you could the use of <a style=\"color: #16a6b6;\" href=\"https:\/\/wordpress.org\/extend\/plugins\/askapache-password-protect\/\" rel=\"nofollow\">AskApache Password Protect<\/a>WordPress plugin. The \u2018AskApache Password Protect\u2019 plugin adds good password protection to your WordPress Blog. Use the Login Lockdown feature of the all in one <a style=\"color: #16a6b6;\" href=\"https:\/\/www.tipsandtricks-hq.com\/wordpress-security-and-firewall-plugin\" target=\"_blank\" rel=\"noopener noreferrer\">WP Security Plugin<\/a> to protect your blog against brute force attack (a brute force attack is a method of defeating a cryptographic scheme by systematically trying a large number of possibilities)<\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Deny access to your Plugins and other directories<\/span><\/h2>\n<p>A lot of bloggers don\u2019t protect access to their WordPress plugins directory. What I mean by this is that if you go to the www.your-domain.com\/wp-content\/plugins\/ from a browser it shows all the plugins that you are using. Many wordpress plugins can have vulnerabilities which the attacker can use to harm your blog. So, its a good idea to block access to these directories. You can use a .htaccess file or just upload a blank \u2018index.html\u2019 file to that directory to block access to these directories. (download a blank <a style=\"color: #16a6b6;\" href=\"https:\/\/www.tipsandtricks-hq.com\/wp-content\/plugins\/index.html\" rel=\"nofollow\">index.html<\/a>)<\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Update WordPress to the Latest Release<\/span><\/h2>\n<p>As new WrodPress versions are released the security bugs for previous release becomes public information. WordPress could have vulnerabilities as a result of how the program is written that allow an attacker to pass HTTP arguments, bad URI strings, form input, etc, that could cause Bad Things to happen. So always upate your WordPress to the latest version to make sure that you are protected against any known security bugs.<\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Don\u2019t Show WordPress Version on Your Blog<\/span><\/h2>\n<p>You should not make the WordPress version that you are using visible to others for the same reason explained above. The specific WordPress version that you are using can give the attacker an upper hand in finding a way to break in.<\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Backup Your Data<\/span><\/h2>\n<p>I can\u2019t stress this enough\u2026 always keep backups of all the important files. I always backup my WordPress Database and WordPress files in case of emergency. Read my <a style=\"color: #16a6b6;\" href=\"https:\/\/www.tipsandtricks-hq.com\/what-would-you-do-if-somehow-you-lost-your-blog-content-today-958\">what would you do if you lost all your blog\u2019s content<\/a> article to find out how backups can help you sleep better at night <img class=\"wp-smiley\" src=\"https:\/\/www.tipsandtricks-hq.com\/wp-includes\/images\/smilies\/icon_smile.gif\" alt=\":)\"><\/p>\n<h2 style=\"color: #0f548b;\"><span style=\"color: #000080;\">Be careful when you upload something to your site<\/span><\/h2>\n<p>When you upload a script (example: a plugin, a theme or just a normal script) to your site you need to be extra careful as it can harm your site if it was designed to do so. Only upload authentic content to your site. <strong>Never <\/strong>download a plugin or a theme from a warez or torrent or file sharing sites. The content on these sites can be disguised as a plugin or a theme but it will harm your site when uploaded to your server. You can read more on these types of attack from the <a style=\"color: #16a6b6;\" href=\"https:\/\/www.tipsandtricks-hq.com\/free-premium-plugin-and-theme-downloaders-beware-3035\">free premium plugin and theme downloaders beware<\/a> article.<\/p>\n<h1 class=\"entry-title\"><span style=\"color: #000080;\">Advanced WordPress Security Tips<\/span><\/h1>\n<div class=\"post-info\" style=\"color: #666666;\">In general WordPress is pretty secure as long as you apply common sense and follow standard security practices. The tips mentioned in this article are for added security (you don\u2019t need to apply them all).<\/div>\n<div class=\"entry-content\">\n<p>However, if you are in the mood for some advanced tweaking then the following security tips should come in handy <img class=\"wp-smiley\" src=\"https:\/\/www.tipsandtricks-hq.com\/wp-includes\/images\/smilies\/icon_wink.gif\" alt=\";)\"><\/p>\n<h3><span style=\"color: #000080;\">NOTE and DISCLAIMER<\/span><\/h3>\n<p>Most of these techniques require you to understand what you are doing.<\/p>\n<p>It is strongly recommended that you first test these techniques on a test or development site before applying them to your live site. Doing some of the tips suggested here can break your site if not performed correctly.<\/p>\n<p>We take no responsibility for any mishaps as a result of your efforts in applying the techniques discussed in this article.<\/p>\n<p>Also note that these techniques assume that your WordPress installation is running Apache and you have <strong>mod_alias<\/strong> and <strong>mod_rewrite<\/strong> installed.<\/p>\n<h2><span style=\"color: #000080;\">1. Disable HTTP Trace Method<\/span><\/h2>\n<p>There is a security attack technique called <strong>Cross Site Tracing (XST)<\/strong> which can be used together with another attack mechanism called Cross Site Scripting (XSS) which exploits systems which have HTTP TRACE functionality. HTTP TRACE is a default functional feature on most webservers and is used for things like debugging. Hackers who use XST will usually steal cookie and other sensitive server information via header requests.<\/p>\n<p>You can disable the trace functionality either via your Apache configuration file or by putting the following in your .htaccess file:<\/p>\n<h2><span style=\"color: #000080;\">2. Remove header outputs from your WordPress installation<\/span><\/h2>\n<p>WordPress can often add quite a lot of output in your header pertaining to various services. The following code shows how you can remove a lot of this output.<\/p>\n<p><strong>Warning<\/strong><strong>:<\/strong> <strong>This can break some functionality if you are not careful. Eg, if you\u2019re using RSS feeds then you may want to comment that line out.<\/strong><\/p>\n<p>Add the following code to your theme\u2019s functions.php file:<\/p>\n<h2><span style=\"color: #000080;\">3. Deny comment posting via proxy server<\/span><\/h2>\n<p>You can reduce spam and general proxy requests by attempting to prevent comments which are posted via a proxy server. Use the code below (compliments of perishablepress.com) in your .htaccess file:<\/p>\n<h2><span style=\"color: #000080;\">4. Change your default WordPress DB prefix<\/span><\/h2>\n<p>You may already be aware that WP uses a default prefix value of \u201cwp_\u201d for the DB tables. This can in turn be used by malicious bots and hackers to guess your DB table names.<\/p>\n<p>In general, changing your WP DB prefix value is much easier to do at installation time because you can set it in your wp-config.php file.<\/p>\n<p>Conversely if you already have a live WP site and you wish to change your DB prefix, then the procedure is a little more complicated.<\/p>\n<p>A basic guide for changing the DB prefix after an install for those who are curious is briefly outlined below:<\/p>\n<p>1) Do a full DB backup and save the backup somewhere offboard. Using something like BackupBuddy can useful.<br \/>\n2) Do a complete dump of your WP DB using PHPMyAdmin into a text file and save 2 copies \u2013 one for editing and the other as an original just in case.<br \/>\n3) Using a good code editor, replace all instances of \u201cwp_\u201d with your own prefix.<br \/>\n4) From your WP admin panel, deactivate all plugins<br \/>\n5) Using PHPMyAdmin, drop your old DB and import your new one using the file you edited in step 3.<br \/>\n6) Edit your wp-config.php file with the new DB prefix value.<br \/>\n7) Re-activate your WP plugins<br \/>\n8) Perform another save on your permalink settings by going to Settings-&gt;Permalinks in order to refresh your permalink structure.<\/p>\n<p><strong>Caution<\/strong>:<\/p>\n<p>Sometimes plugins add their own prefix after the wordpress prefix where both are identical.<\/p>\n<p>example, you might have a table name from a certain plugin has a name like the following: wp_wp_abc_table_name.<\/p>\n<p>Be sure when replacing the \u201cwp_\u201d instances in step 2 above that you only replace the first \u201cwp_\u201d prefix and not the one following it.<br \/>\nFor instance if we take the example we just mentioned we would replace the first prefix with our new prefix which for this example might be called \u201ctrx_\u201d.<\/p>\n<p>The new name would look like:<\/p>\n<p><strong>trx_<\/strong>wp_abc_tablename<\/p>\n<p>Note that there are also WP plugins out there which can achieve the above steps for those who are not prepared to get their hands dirty.<\/p>\n<h2><span style=\"color: #000080;\">5. Deny Potentially Dangerous Query Strings<\/span><\/h2>\n<p>You can put the following code in your .htacces file to help prevent XSS attacks.<\/p>\n<p><strong>BEWARE<\/strong><strong>: Functionality of some plugins or themes could break if you are not careful to exclude strings which are used by them.<\/strong><\/p>\n<h2><span style=\"color: #000080;\">6. Apply PHP hardening to your system<\/span><\/h2>\n<p>You can install and enable <strong>Suhosin <\/strong>which is a PHP hardening system on your server. This can further increase the security of your system by protecting against various vulnerabilities.<\/p>\n<p>Suhosin typically installs on most PHP installations and is sometimes included by webhosting companies by default. (Check with your hosting provider)<\/p>\n<p>If you can read more about Suhosin <a style=\"color: #16a6b6;\" href=\"http:\/\/www.hardened-php.net\/suhosin\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Further reading:<a href=\"%20http:\/\/codex.wordpress.org\/Hardening_WordPress\"> http:\/\/codex.wordpress.org\/Hardening_WordPress<\/a><\/p>\n<p>Source:<\/p>\n<div class=\"entry-content-asset\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"wvRNOn1pW6\"><p><a href=\"https:\/\/www.tipsandtricks-hq.com\/advanced-wordpress-security-tips-4659\">Advanced WordPress Security Tips<\/a><\/p><\/blockquote>\n<p><iframe title=\"&#8220;Advanced WordPress Security Tips&#8221; &#8212; Tips and Tricks HQ\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.tipsandtricks-hq.com\/advanced-wordpress-security-tips-4659\/embed#?secret=wvRNOn1pW6\" data-secret=\"wvRNOn1pW6\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/div>\n<div class=\"entry-content-asset\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"MrWvMSEwrq\"><p><a href=\"https:\/\/www.tipsandtricks-hq.com\/essential-wordpress-security-tips-is-your-blog-protected-987\">Essential WordPress Security Tips &#8211; Is Your Blog Protected?<\/a><\/p><\/blockquote>\n<p><iframe title=\"&#8220;Essential WordPress Security Tips &#8211; Is Your Blog Protected?&#8221; &#8212; Tips and Tricks HQ\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.tipsandtricks-hq.com\/essential-wordpress-security-tips-is-your-blog-protected-987\/embed#?secret=MrWvMSEwrq\" data-secret=\"MrWvMSEwrq\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>WordPress Security Tutorial I have been revisiting the various security settings of my WordPress blog after the sudden database table corruption of this blog for unknown reason last week. In this post I have highlighted some of the security tips &hellip; <a href=\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":3028,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[63],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Learn how to enhance the security of your WordPress website with our comprehensive tutorial. Protect your site from potential threats and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WordPress Security Tutorial - Asalta - An End-to-End Business Automation Software\" \/>\n<meta property=\"og:description\" content=\"Learn how to enhance the security of your WordPress website with our comprehensive tutorial. Protect your site from potential threats and vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/\" \/>\n<meta property=\"og:site_name\" content=\"Asalta - An End-to-End Business Automation Software\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-11T13:05:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-09T10:01:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.asalta.com\/blog\/wp-content\/uploads\/2014\/12\/Wordpress-security-tutorial-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"524\" \/>\n\t<meta property=\"og:image:height\" content=\"286\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"11 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.asalta.com\/blog\/#website\",\"url\":\"https:\/\/www.asalta.com\/blog\/\",\"name\":\"Asalta - An End-to-End Business Automation Software\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.asalta.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.asalta.com\/blog\/wp-content\/uploads\/2014\/12\/Wordpress-security-tutorial-1.jpg\",\"contentUrl\":\"https:\/\/www.asalta.com\/blog\/wp-content\/uploads\/2014\/12\/Wordpress-security-tutorial-1.jpg\",\"width\":524,\"height\":286,\"caption\":\"asalta\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#webpage\",\"url\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/\",\"name\":\"WordPress Security Tutorial - Asalta - An End-to-End Business Automation Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.asalta.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#primaryimage\"},\"datePublished\":\"2014-12-11T13:05:26+00:00\",\"dateModified\":\"2023-12-09T10:01:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.asalta.com\/blog\/#\/schema\/person\/951dc8b71e8f8f415d35475f398a1555\"},\"description\":\"Learn how to enhance the security of your WordPress website with our comprehensive tutorial. Protect your site from potential threats and vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asalta.com\/blog\/\",\"url\":\"https:\/\/www.asalta.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asalta.com\/blog\/tips\/\",\"url\":\"https:\/\/www.asalta.com\/blog\/tips\/\",\"name\":\"Tips\"}},{\"@type\":\"ListItem\",\"position\":3,\"item\":{\"@id\":\"https:\/\/www.asalta.com\/blog\/wordpress-security-tutorial\/#webpage\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.asalta.com\/blog\/#\/schema\/person\/951dc8b71e8f8f415d35475f398a1555\",\"name\":\"Arun\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.asalta.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9754c5db66d8fed356126969acbb5341?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9754c5db66d8fed356126969acbb5341?s=96&d=mm&r=g\",\"caption\":\"Arun\"},\"sameAs\":[\"Arun Karthikeyan\"],\"url\":\"https:\/\/www.asalta.com\/blog\/author\/admin-2-2-2-2-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/posts\/135"}],"collection":[{"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":7,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"predecessor-version":[{"id":3740,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions\/3740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/media\/3028"}],"wp:attachment":[{"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asalta.com\/blog\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}