Joomla spécialiste

Preview:

DESCRIPTION

Joomla is said to be one of the most popularly used Content Management Systems used worldwide. Most people are attracted towards Joomla is because of its $0 price tag.

Citation preview

Simple steps to improve Joomla Security

Joomla is said to be one of the most popularly used Content Management Systems used worldwide. Most people are attracted towards Joomla is because of its $0 price tag.

However, its open source nature automatically drives hackers towards this CMS to exploit the software by finding vulnerabilities in the code of the application. To avoid such situation, all the Joomla website owners should post updates and patches to the software on a veritable basis.

A few points to avoid attacks and secure your Joomla site

1. Proper Hosting or Server EnvironmentIt is very vital to select an appropriate host and server for the website. To avoid shared security issues, it is advisable to change the host supplier or use a completely separate server.

2. Using .htaccess to block common Joomla security exploitsUsing .htaccess file would help prevent the site from getting hacked. This file will help in blocking the database as well as the file exploits. This should be one of the first weaknesses, blocked by any Joomla website owner.

3. Changing Site’s permission and default admin accountUtilization of appropriate CHMOD for every folder and files is necessary. Nothing must be set to 777 or 707, which is a default CHMOD. It gives full rights to the account and can be easily accessed by the hackers.

4. Managing the Extensions wellThe most vulnerable elements found on Joomla website are old third-party extensions, it is recommended to keep the add-ons up to date. All the extensions, that are not used at all, should be removed.

Extension’s version information should be deleted as well (i.e. component ABC version 3.0.1). Hackers try to concentrate on the specific version of the extension; hence doing the above will help the website from getting hacked.

5. Using A Strong PasswordChanging the password now and then can prove to be fruitful in terms of security. Modify the password with upper and lower cases, special symbol, letter and number. The database access should be password protected at MySQL to avoid any security glitches.

6. Running a vulnerability scanThere are many security scanners out there. One should regularly run a vulnerability scan on the website. However, it is best to choose the one that is tested and will be provided with reliable results.

7. Turning off FTP layerIt is a sound practice to turn off the FTP layer and make certain, that it did not save the log-in information.

8. Using SEF URLsSearch Engine Friendly URLs not only improve the rank of the site in Google search results, but also prevents from hackers using Google search results to hack the website.

It would be advisable to do the above to protect the site from being hacked. Let’s just say “Protection is better than cure”.

Contact Us

www.heliossolutions.frHelios Solutions

802 Iskon Atria II,Gotri Road ,

Baroda.Gujarat. India.

Phone+91 265 653 5602+91 98250 96949

Email: info@heliossolutions.in

Recommended