SlideShare a Scribd company logo
Secure Your WordPress Site –
AND Your Business
Stacy M. Clements
WordCamp Minneapolis 2019
https://www.linkedin.com/in/stacyclements
@StacyClements
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site
– And Your Business
Why you should care
Ways you’re vulnerable
Cybersecurity Framework
Three cybersecurity fundamentals
• Small business owner
• Air Force veteran
• Technology & security enthusiast
Stacy M. Clements
Fixer • Problem Solver • Pitbull
Why should you care?
• Computing power
• Server resources
• Personal information
• Connections / access
What Do You Have?
• Phishing
• Ransomware
• Cryptojacking
• Denial of service
• Insider attack
What Can Happen To It?
• Technical problems and
changes
• Security misconfiguration
• Uneducated or inattentive
users
How Can They Get It?
VULNERABILITY
THREATASSET
RISK
VULNERABILITY
THREATASSET
RISK
Risk
Why isn’t a plugin enough?
Secure Your WordPress Site - And Your Business
Application
• WordPress core
• Themes/plugins
• cPanel
Network
• Server
• Computer/mobile device
• Router
• “Tubes”
Human
• Site administrators
• Contributors/users
ATTACK
SURFACE
Secure Your WordPress Site - And Your Business
Secure Your WordPress Site - And Your Business
NIST Cybersecurity Framework
• Collaborative effort
• Built using “best
practice” guidelines for
organizations to better
manage and reduce
cybersecurity risk
• Designed to be flexible
Framework Core Elements
Functions organize basic cybersecurity activities at
the highest level
Framework Core Elements
Categories break down Functions into groups of
cybersecurity outcomes
Framework Core Elements
Subcategories get more specific – describing specific outcomes
of technical and/or management activities
Framework Core Elements
Informative References are common standards, guidelines,
and practices used to achieve these outcomes
Once Upon A Time…
BOB
Source: Sucuri Website Hack
Trend Report 2018
Secure Your WordPress Site - And Your Business
IDENTIFY Asset Management
Identify
WordPress
site
Cloud
storage
Plugins
Database
Users
Files
Payments
Server
• What are your assets?
• Who can access – and how?
SALLY
Identify
IDENTIFY Asset Management
Risk Assessment
• What are the threats and vulnerabilities?
• How do you get your “cyber threat intelligence”?
PROTECT Access Control
Protect
• Enforce strong passwords and use 2FA
• Change default credentials!
Protect
PROTECT Access Control
Information Protection Procedures
Protect
• Secure – Update – Backup – TEST!
• Develop and exercise response and recovery plans
PROTECT Access Control
Information Protection Procedures
Protective Technology
Protect
• Plugin is protective technology – if configured
• Logs / removable media / no “kitchen sink” servers
Detect
DETECT Security Continuous Monitoring
• Awareness – have a baseline and know
when something looks suspicious
Detect
• Who is getting and assessing alerts?
• Who is taking action?
DETECT Security Continuous Monitoring
Detection Processes
Respond
RESPOND Execute Response Plan
• What immediate actions do you need to take?
• Make required notifications
Respond
RESPOND Execute Response Plan
Analysis & Mitigation
• Restore from the backup you created and tested
(You did do that, right?)
• Communicate with your customers
Recover
RECOVER Execute Recovery Plan
Recover
• Recovery is not just returning to the pre-incident
state
• Hotwash / Lessons Learned?
RECOVER Execute Recovery Plan
Improvements
Secure Your WordPress Site - And Your Business
Secure Access
• Password management
• Multi-factor authentication
Update
• Inventory
• Regular update schedule
• Periodic review
Backup
• Backup
• Backup
• Backup
• TEST!
Takeaways
Security is managing risk
Protect your entire “attack surface”
Cybersecurity Framework
3 fundamentals to do now
S-U-B set – Secure Access, Update, Backup (and test)
Secure Your WordPress Site –
AND Your Business
Stacy M. Clements
WordCamp Minneapolis 2019
https://www.linkedin.com/in/stacyclements
@StacyClements

More Related Content

PPTX
Security Essentials
PDF
Web Application Firewall - Web Application & Web Services Security integrated...
PDF
Security Training: Making your weakest link the strongest - CircleCityCon 2017
PDF
CIS Security Benchmark
PPTX
Jason Kent - AppSec Without Additional Tools
PPTX
WordPress Security: Beyond The Plugin
PPTX
AWS Security Ideas - re:Invent 2016
PDF
Top Azure security fails and how to avoid them
Security Essentials
Web Application Firewall - Web Application & Web Services Security integrated...
Security Training: Making your weakest link the strongest - CircleCityCon 2017
CIS Security Benchmark
Jason Kent - AppSec Without Additional Tools
WordPress Security: Beyond The Plugin
AWS Security Ideas - re:Invent 2016
Top Azure security fails and how to avoid them

What's hot (20)

PPTX
So Your Company Hired A Pentester
PPTX
The Teams Behind DevSecOps
PDF
Technical Services eBook
PPTX
Security O365 Using AI-based Advanced Threat Protection
PPTX
The Threat Is Real. Protect Yourself.
PPTX
Where To Start When Your Environment is Fucked
PDF
Top 18 azure security fails and how to avoid them
PPTX
Turning security into code by Jeff Williams
PPTX
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
PDF
5 things that could get your business hacked
PDF
Top 5 Data Security Strategies in QA
PDF
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
PPTX
How to-become-secure-and-stay-secure
PPTX
241_ATD_TUE_1430_EagleRockEnergy_final
PPTX
SPI Dynamics web application security 101
PDF
Your internet-exposure-that-makes-you-vulnerable
PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
PDF
Feeding the Virtual Patch Pipeline
PDF
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
PPTX
Internet security for browser support
So Your Company Hired A Pentester
The Teams Behind DevSecOps
Technical Services eBook
Security O365 Using AI-based Advanced Threat Protection
The Threat Is Real. Protect Yourself.
Where To Start When Your Environment is Fucked
Top 18 azure security fails and how to avoid them
Turning security into code by Jeff Williams
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
5 things that could get your business hacked
Top 5 Data Security Strategies in QA
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
How to-become-secure-and-stay-secure
241_ATD_TUE_1430_EagleRockEnergy_final
SPI Dynamics web application security 101
Your internet-exposure-that-makes-you-vulnerable
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
Feeding the Virtual Patch Pipeline
DevSecCon Asia 2017 - Abhay Bhargav: Building an Application Vulnerability To...
Internet security for browser support
Ad

Similar to Secure Your WordPress Site - And Your Business (20)

PPTX
Cyber security fundamentals & ethical hacking
PDF
Top Security Challenges Facing Credit Unions Today
PPTX
Web Security Overview
PPTX
Cyber Security and Healthcare
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
Starting your Career in Information Security
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PDF
Decrease Cyber Risk at your Community Bank
PDF
AppSec in an Agile World
PPTX
Just Trust Everyone and We Will Be Fine, Right?
PPTX
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
PPTX
Safe Internet Banking Cyber Security
PPTX
00. introduction to app sec v3
PPTX
CIO Summit: Data Security in a Mobile World
PPTX
CIO Summit: Data Security in a Mobile World
PDF
Cybersecurity Basics - Aravindr.com
PPTX
RMS Security Breakfast
PPTX
Succeeding-Marriage-Cybersecurity-DevOps final
PDF
Annual OktCyberfest 2019
Cyber security fundamentals & ethical hacking
Top Security Challenges Facing Credit Unions Today
Web Security Overview
Cyber Security and Healthcare
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Starting your Career in Information Security
How to develop an AppSec culture in your project
Building an AppSec Culture
Decrease Cyber Risk at your Community Bank
AppSec in an Agile World
Just Trust Everyone and We Will Be Fine, Right?
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Safe Internet Banking Cyber Security
00. introduction to app sec v3
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
Cybersecurity Basics - Aravindr.com
RMS Security Breakfast
Succeeding-Marriage-Cybersecurity-DevOps final
Annual OktCyberfest 2019
Ad

Recently uploaded (20)

PPTX
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
PPTX
Transforming Finance with Ratiobox – Oracle NetSuite Bookkeeping & Accounting...
PPTX
Introduction to Computing Profession.pptx
PPTX
6. FINANCE FOR NON-FINANCIAL MANAGERS.15.08.2024.pptx
PDF
Qloudhost DMACA ignored hosting provider
PDF
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
PPT
Organizational Culture and Management.ppt
PDF
Decision trees for high uncertainty decisions
PPTX
The quotation presentation for diffferent businesses
PPT
Chap8. Product & Service Strategy and branding
PDF
india-2024-agrifoodtech-investment-report.pdf
DOC
BHCC毕业证学历认证,埃德蒙学院毕业证毕业证书样本
PPT
chap9.New Product Development product lifecycle.ppt
PPTX
Daily stand up meeting on the various business
PDF
Captivating LED Visuals, Built to Impress Brightlink.pdf
PPTX
Spread Maya's Sustainable Product Collection 2025.pptx
PPTX
Structure of Organization in Professional Practices.pptx
PDF
AgriTech-Indias-Sunrise-Sector- Investor
PDF
The Potential for EV Battery Recycling in Europe.pdf
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
Transforming Finance with Ratiobox – Oracle NetSuite Bookkeeping & Accounting...
Introduction to Computing Profession.pptx
6. FINANCE FOR NON-FINANCIAL MANAGERS.15.08.2024.pptx
Qloudhost DMACA ignored hosting provider
Why DevOps Teams Are Dropping Spreadsheets for Real-Time Cloud Hygiene.pdf
Organizational Culture and Management.ppt
Decision trees for high uncertainty decisions
The quotation presentation for diffferent businesses
Chap8. Product & Service Strategy and branding
india-2024-agrifoodtech-investment-report.pdf
BHCC毕业证学历认证,埃德蒙学院毕业证毕业证书样本
chap9.New Product Development product lifecycle.ppt
Daily stand up meeting on the various business
Captivating LED Visuals, Built to Impress Brightlink.pdf
Spread Maya's Sustainable Product Collection 2025.pptx
Structure of Organization in Professional Practices.pptx
AgriTech-Indias-Sunrise-Sector- Investor
The Potential for EV Battery Recycling in Europe.pdf
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?

Secure Your WordPress Site - And Your Business