Just taking every possible defensive measure, update all of your software. I think it’s better to focus on just defense and death. But it can be really difficult to determine the source. If you have any plugins on your website that have known vulnerabilities, then that’s a pretty strong indicator that’s probably what happened. ![]() It’s already happened, but you can look at your server logs. These can be really difficult questions to answer, and sometimes it’s not even really worth answering, because the hack is done. People almost always want to know who hacked me, how did they hack me, when did it happen. ![]() Question #1: “Is there a way to figure out how the hacker got in so we can patch the vulnerability?” For example, they can clean up all the plugins, but if the vulnerability is within a plugin that they’re using, they can always get back in even with a fresh copy.Īnswer: This is one of the most common questions that we get asked at Sucuri.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |