{"id":945,"date":"2016-08-01T09:00:45","date_gmt":"2016-08-01T13:00:45","guid":{"rendered":"https:\/\/blog.knownhost.com\/?p=945"},"modified":"2020-03-23T12:52:53","modified_gmt":"2020-03-23T16:52:53","slug":"ensure-website-cannot-hacked-easily","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/","title":{"rendered":"How to Ensure Your Website Stays Secure"},"content":{"rendered":"<h2>Updated November 22, 2019<\/h2>\n<p>&nbsp;<\/p>\n<p>Hackers are becoming an ever-present threat, and you need to be able to respond to that threat. <strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\">Securing your website against hackers is easier than you think.<\/a><\/strong> This guide is going to teach you how you should go about defending your website from malicious attacks.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>How Hack Attacks Actually Happen<\/h2>\n<p>Watch the movies and you may think that the majority of people are sitting behind their computers typing in long lines of code as they break through your defenses. This couldn\u2019t be further from the truth. Most hack attacks happen automatically through the use of bots.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Automatic Scripts<\/strong><\/p>\n<p>Bots and automatic scripts are responsible for much of the hacking that goes on. The hackers only come in manually when they have successfully broken into a system, assuming they ever act manually at all. Since you\u2019re working with a bot, it makes it easier for you to defend your website.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Keep Your Software Updated<\/strong><\/p>\n<p>This is one of the most obvious pieces of advice that you can give someone, and yet so many people still fail to do it. Your website should be fully updated at all times. Your server operating system and the various bits of software on your website should have the latest version installed.<\/p>\n<p>&nbsp;<\/p>\n<p>If anything, you should have updates install automatically.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Managed Hosting Solutions Make this Easy<\/strong><\/p>\n<p>One of the big benefits of using a managed hosting solution is that they will handle everything for you. For entrepreneurs that aren\u2019t as effective at keeping up with updates, this is the option for them. Updating everything requires minimal input on your part.<\/p>\n<p>&nbsp;<\/p>\n<h2>Beware of SQL Injection<\/h2>\n<p>The SQL injection attack is one of the most common tactics that hackers use to destroy business websites. The way this works is an attacker will use some sort of URL parameter to get into your database. From there, they can insert code into your database that can extract information and delete parts of it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Parameterized Queries<\/strong><\/p>\n<p>To stop an SQL injection attack, make sure that your SQL queries are parameterized. Without limits, hackers can add on any parameters they feel like. These can overwrite your already existing queries, which can enable them to do anything they want.<\/p>\n<p>&nbsp;<\/p>\n<h2>Take into Account XSS<\/h2>\n<p>Cross-site scripting is another type of attack that primarily uses JavaScript. A hacker will pass JavaScript, or some other type of scripting code, into your web form so they can run malicious code on your visitors. You won\u2019t even notice what\u2019s going on because it\u2019s your visitors that are being attacked.<\/p>\n<p>&nbsp;<\/p>\n<p>Get around this by stripping out any HTML from your web forms.<\/p>\n<p>&nbsp;<\/p>\n<h2>What Information Should You Give Away with Error Messages?<\/h2>\n<p>Error messages are a back door for hackers trying out your security measures. When you get an error message, be as vague as possible with the information you give out. Stick with generic messages otherwise, you could give out information that makes it easier for hackers to get into your system.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>An Example<\/strong><\/p>\n<p>The most common example of this is when someone attempts to login to their account and gets the wrong password. If you tell them it\u2019s the wrong password, a hacker knows they got half of the information right. But telling them they have the incorrect information doesn&#8217;t reveal anything. They either got one or both pieces of information wrong.<\/p>\n<p>&nbsp;<\/p>\n<h2>Dealing with Passwords<\/h2>\n<p>Passwords are always a complex issue. You can write an entire book on password security, and many people already have. Hackers are mainly trying to get directly into your interface by grabbing your passwords. This is easier than you think for a lot of hackers because so many people don\u2019t follow good password practices.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Enforce Good Practices<\/strong><\/p>\n<p>Make sure that you are enforcing good password practices for your users. It can be annoying to have all this required information within a password, but it\u2019s for their own good. Remember that if they do get hacked the first person they\u2019ll shout at will be you.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Encryption Values<\/strong><\/p>\n<p>When you store passwords in your database, only store them as encrypted. You should stick to one-way hashing algorithms like SHA. SHA will allow you to authenticate users using encrypted information, so passwords always stay hidden from third-party eyes.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Salt the Passwords<\/strong><\/p>\n<p>To add a further layer of security, you should salt the passwords on your database. This will make decrypting them almost impossible, and even if they do manage to do it this would take weeks to accomplish. It\u2019s what a lot of huge corporations do to limit the damage of major attacks.<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclusion<\/h2>\n<p>These are the main strategies you should employ to keep your website safe from harm. If you want to make sure a hack attack doesn\u2019t happen to you, consider calling in the help of an independent security auditor. They can inspect your website provide recommendations for where you can make changes.<\/p>\n<p>&nbsp;<\/p>\n<p>Just remember, security starts when picking a host. <strong><a href=\"https:\/\/www.knownhost.com\/\">KnownHost<\/a><\/strong> takes security seriously. All of our services have security options and configurations in mind. From optimizing server installations for hardened configurations to free SSL certificates across all service aspects and offering software such as Imunify 360\/ImunifyAV+ to help protect your websites against malware, even going one step further by providing 10gbit DDoS protection on a redundant network. We provide the platform giving site owners a starting point that&#8217;s much more secure than many competitors. Don&#8217;t wait another day to get protected, <strong><a href=\"https:\/\/www.knownhost.com\/\">start today!<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated November 22, 2019 &nbsp; Hackers are becoming an ever-present threat, and you need to be able to respond to that threat. Securing your website against hackers is easier than you think. This guide is going to teach you how you should go about defending your website from malicious attacks. &nbsp; &nbsp; &nbsp; &nbsp; How [&hellip;]<\/p>\n","protected":false},"author":69,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1424],"tags":[243,1604,1608],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-security","tag-hackers","tag-passwords","tag-updates"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Ensure Your Website Cannot be Hacked Easily<\/title>\n<meta name=\"description\" content=\"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Ensure Your Website Cannot be Hacked Easily\" \/>\n<meta property=\"og:description\" content=\"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-01T13:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-23T16:52:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2016\/08\/canva-finger-print-on-enter-key-of-keyboard-MADGxt0gKXw-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"541\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/\"},\"author\":{\"name\":\"Alex\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/659373fdc5d0ec62fb1a0888afe4690d\"},\"headline\":\"How to Ensure Your Website Stays Secure\",\"datePublished\":\"2016-08-01T13:00:45+00:00\",\"dateModified\":\"2020-03-23T16:52:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/\"},\"wordCount\":945,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"hackers\",\"passwords\",\"updates\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/\",\"name\":\"How to Ensure Your Website Cannot be Hacked Easily\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2016-08-01T13:00:45+00:00\",\"dateModified\":\"2020-03-23T16:52:53+00:00\",\"description\":\"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/ensure-website-cannot-hacked-easily\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Ensure Your Website Stays Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/659373fdc5d0ec62fb1a0888afe4690d\",\"name\":\"Alex\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/reliablesoft\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Ensure Your Website Cannot be Hacked Easily","description":"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/","og_locale":"en_US","og_type":"article","og_title":"How to Ensure Your Website Cannot be Hacked Easily","og_description":"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.","og_url":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2016-08-01T13:00:45+00:00","article_modified_time":"2020-03-23T16:52:53+00:00","og_image":[{"width":800,"height":541,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2016\/08\/canva-finger-print-on-enter-key-of-keyboard-MADGxt0gKXw-copy.jpg","type":"image\/jpeg"}],"author":"Alex","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Alex","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/"},"author":{"name":"Alex","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/659373fdc5d0ec62fb1a0888afe4690d"},"headline":"How to Ensure Your Website Stays Secure","datePublished":"2016-08-01T13:00:45+00:00","dateModified":"2020-03-23T16:52:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/"},"wordCount":945,"commentCount":0,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["hackers","passwords","updates"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/","url":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/","name":"How to Ensure Your Website Cannot be Hacked Easily","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2016-08-01T13:00:45+00:00","dateModified":"2020-03-23T16:52:53+00:00","description":"Are you on the edge about whether your website is secure? If so, read this article to find out how to make sure your site cannot be hacked.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/ensure-website-cannot-hacked-easily\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Ensure Your Website Stays Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/659373fdc5d0ec62fb1a0888afe4690d","name":"Alex","url":"https:\/\/www.knownhost.com\/blog\/author\/reliablesoft\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=945"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/945\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}