Every day, some 30,000 websites are attacked, and new dangers are always appearing. You may reduce your chances of getting hacked by using this checklist.
1. Malware Check Locally
Verify that there are no trojans or viruses on the machine that manages this account. Password breach in situations like these is frequently caused by malware.
If you're not sure which application to use to check for malware, we've discovered that the following ones work well:
MalwareBytes: http://www.malwarebytes.org/mbam.php
HouseCall: http://housecall.trendmicro.com/
Spybot S&D: http://www.safer-networking.org/index2.html
Microsoft Security Essentials: http://www.microsoft.com/Security_Essentials/
Go to http://www.superantispyware.com/superantispyware.html to access SUPERAntiSpyware.
It is advised to run scans with two or more reliable malware scanners because no one anti-malware program can detect 100% of all malware that is present in the wild.
2. Robust Passwords
Make sure all of the passwords you use for this account are strong.
This might involve, but is not restricted to:
Password for cPanel account
Passwords for sub FTP accounts
Passwords for e-mail accounts
Passwords for installing CMS
Passwords for databases
The ability of a password to withstand guessing and brute-force attacks is measured by its strength. In its standard version, it calculates the average number of tries an attacker without direct access to the password would need to guess it properly. A password's strength is determined by its length, intricacy, and unpredictable nature.
Changing passwords on a regular basis will help prevent them from becoming stale and simple to guess over time. The hacker has to start again every time you change your password in order to attempt to guess it. Nevertheless, the hacker has all the time they need to crack your password if it stays the same.
Strong passwords reduce the overall danger of a security breach, but they cannot take the place of other practical security measures. The design and implementation of the authentication system software, in particular how frequently password guesses may be checked by an attacker and how securely user password information is saved and transferred, greatly determines the efficacy of a password of a given strength.
3. Captchas
Make sure that every contact and form page contains a robust captcha.
The following details may be used to add a ReCAPTCHA captcha: Google Inc.'s recaptcha, introduction, and index page.
4. Updates for CMS Installations
To make sure you have the most recent security patches loaded, make sure your CMS installations are up to date with the most recent version.
It is advised that you enable automatic updates.
5. Cover Up Indices
To stop hackers from taking advantage of known files and folders on your account, hide directory indices.
This is necessary to stop unauthorized public viewing of the files and folders within your account when someone visits specific sections of your URL.
6. Sanitation of Input
Make sure your developer uses input sanitation to aid in preventing harmful stuff from being uploaded.
7. Backups off-site
You should keep off-site backups of your account that are not updated automatically in order to keep it uncompromised.
8. Keep an eye on e-mails
It is crucial that you make sure you get e-mails from us in order to be informed about any impending changes or emerging security concerns.
9. Appropriate Permissions for Files
Make sure the permissions on your files and folders are appropriate to stop hackers from using your material to run dangerous malware.
Permissions for secure folders: 755
Permissions for secure files: 644
10. Software Updates
Update any other software that you have control over. By doing this, you can make sure that you have the most recent security updates applied.
When feasible, we advise turning on automatic updates.