Tips to prevent and secure Joomla 3 from being hacked

How_to_Monitor_IIS_Performance
 
Here follow a list of tips to keep your site secure and prevent the most common attacks that use know exploits in Joomla websites. Security tips Prevent script execution in .htaccess  There is something easy that can save your site from being hacked and used as source for spam senders. In some hacked sites I found lot of malicious php files inside sub-sub-subfoders of media, images or tmp joomla default folders. Why there? Because when your site

Continue Reading

7 tips to optimize Joomla! security

tipsjm
 
Joomla! is a great CMS that is used worldwide. For this reason, hackers often try to find a way to hack a Joomla! website. Here are 7 tips to optimize your Joomla! security, preventing your Joomla! website getting hacked. Always remember to make a regular backup of your website and database. If you still get hacked, you can always get back to an older version of your website. Make sure you find out which extension caused the vulnerability and un-install it. Change

Continue Reading

Reasons Why Your Joomla Website Got Hacked

joomla_secure
 
Usually, the Joomla website will be either filled with hidden malicious content, is redirected to another website with malicious content, has all its data erased, or is simply does not show up. Here are, according to our experience, the top 10 reasons on why your Joomla website got hacked: Your website has very old extensions installed: This is the top and most common reason behind a hacked Joomla website. You should always keep your extensions

Continue Reading

Tips on How to Protect Your Joomla Website Against Hackers

joomla_main
 
Joomla is an open source Content Management System, which will make it easy for you to create awesome websites. Joomla has been around since 2005 and ever since has been working hard to improve its security and usability. But of course this does not mean that it is an uncrackable platform. Since its open source it can be subjected to all kinds of hacks that could affect the security of your precious data. It is

Continue Reading