Frequently Asked Questions

What optimizations do you perform on our site to ensure it is secure?

We provide comprehensive, multi-layered security from the server level up to the WordPress dashboard, ensuring your data and online presence are protected against modern threats.

1. Hosting and Infrastructure Security

We build your site’s defense on a solid foundation, managing security at the server level where the most serious attacks are stopped.

  • Secure WordPress Hosting: We use a hosting provider (Google Cloud Platform powered by Kinsta) that implements both active and passive measures to stop attacks, including Hardware Firewalls and DDoS Detection systems that prevent downtime caused by malicious traffic spikes.
  • Encrypted Connections: All file transfers use Encrypted SFTP and SSH connections (we never use standard, unencrypted FTP). This keeps your site files protected during transfer.
  • SSL Certificate Included: Every site includes a free SSL certificate, which enables HTTPS encryption. This secures the connection between your visitors and your website, keeping sensitive data protected.

2. Access and Login Control

We focus on restricting access to the WordPress dashboard to only authorized users, minimizing the risk of unauthorized entry.

  • Two-Factor Authentication (2FA): We implement 2FA to ensure that only you and your team can access the WordPress Dashboard, adding a critical second layer of protection beyond a simple password.
  • Unique Login URLs: We prevent hackers and bots from easily finding your admin login page by changing the default WordPress login URL to a unique, secure address.
  • Spam and Bot Protection: We integrate reCAPTCHA Support to protect forms and other entry points from spam, fraud, and automated abuse.

3. Application and File Hardening

We implement strict rules and security settings directly on your WordPress installation and file system to block common exploits.

  • WordPress Security Plugins: We install dedicated security plugins that provide an extra layer of on-site security, monitoring for malicious activity and unauthorized file changes.
  • Hardened Security Headers: We configure HTTP Security Headers to harden your site’s security settings at the server level, preventing issues like clickjacking and cross-site scripting (XSS).
  • XML-RPC Disabled: We disable the XML-RPC feature by default, which is commonly exploited by hackers to launch brute-force attacks against your site.
  • Secure Permissions: We apply Secure File and Server Permissions to prevent unauthorized access to your site files, and we implement Database Security measures to protect your data at the source.
Any other questions?

Download PDF

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Request