SlideShare a Scribd company logo
1 of 17
Download to read offline
HACKED
Ten tips on
what to do next.
MY SITE WAS
!
You wake up one morning, get
your coffee, open your browser,
and navigate to your website.
To your horror, your discover that your website is
simply not there anymore. Or worse, it's been
replaced by a NSFW (not safe for work) page or a
crowd of ads for unsavory pharmaceutical
products.
To your horror, your discover that your website is simply
not there anymore. Or worse, it's been replaced by a NSFW
(not safe for work) page or a crowd of ads for unsavory
pharmaceutical products.
Even without reading the
solemn notification from your
browser, you know the grim
truth: you've been hacked.
Now you're in a panic.
How did this happen?
Where are your site
assets? Will you ever
get control back?
Oh No!
STEP 1
Calm down.
You can recover from this. You can contact a
professional service or fix it yourself.
Google even has an
that's ready to help you when you are ready.
8-step DIY recovery process
STEP 2
Let people know
you've been hacked.
Notify your host, webmaster, and, if you can,  your
customers. Now either clean up your local PC by
running anti-virus/anti-malware software, along with
your latest OS update, or, if you have doubts that
your machine is truly uninfected, commandeer a PC
that you're sure is clean.
STEP 3
Make sure.
Log into your hosting account to make sure you’ve
been hacked. Sometimes what you think is a hack is a
product of a service outage or maybe even a bad
plug-in that you might have installed. Your host will be
able to tell you if you were actually hacked and, if so,
begin to trace what caused it.
STEP 4
Backup (or back to
the drawing board).
In some cases, a good hosting company will have an
old backup of your site to serve as a starting point to
rebuild your site. You may also have backed up your
site locally. If your site is built with WordPress,
here is a guide for restoring your site from a backup.
STEP 5
Worst case scenario:
There is no back up. Data is corrupted beyond repair.
You need to rebuild.
There is one last refuge
you need to visit:
The Internet Archive
may have recorded your site
in its 456 billion page directory. 

STEP 6
Find your site snapshot.
Go to the last date your website was archived in a site
snapshot. It’s tedious, but you will at least see your old
data, and be able to copy and paste it into your new
site's pages.*
* I realize that this process is impractical with large database-driven sites, but for small sites
without hundreds of entries, it’s better than nothing, and can be a real life saver. 

STEP 8
Get a secure username
and password.
Many hackers use "brute force" attacks that look for
the easiest method to break into your site’s control
panel, often by using the username “admin” and
password “password.” If you've failed to change the
default settings that came with your hosting setup,
you're just inviting the hackers to get you.
Use http://passwordsgenerator.net/ to create names
and passwords that are harder to crack.

STEP 9
Don't wait for the next
catastrophe to strike.
Always back up your website
on a regular schedule.
WordPress site users have a vast library of backup tools
to choose from. For the rest of us, logging on via FTP
and whacking your content to your local PC is a task
that you need to mark on your calendar and stick to.
STEP 10
Check your users.
Delete any unwanted users
Delete users that are no longer
using your dashboard (guests)
Only give others the access they
need. For example, a guest
blogger on your site should
never be given admin status,
but give contributor status.
If this all seems to difficult, then by all means hire a
professional, or upgrade your hosting service to
include automatic backups, with managed security.
You may pay a premium for
this service, but it is totally
worth the peace of mind.
1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your-
website-is-hacked.html
2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my-
site.html
3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when-
your-wordpress-website-has-been-hacked
4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked-
now-what
SOURCES
A digital marketing leader since 1996, Didit provides
full-service online advertising and marketing services
with award-winning expertise and innovation.
Our full-service approach applies multi-faceted skill
sets, including SEO, PPC, CSEs, PLAs, Content
Marketing, and Social Media strategies that create a
holistic synergy of online marketing tools.

More Related Content

What's hot

WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017Otto Kekäläinen
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionOtto Kekäläinen
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomAnonDownload
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomAnonDownload
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and ThyselfiLinkoln Meetup
 
Testing and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsTesting and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsOtto Kekäläinen
 
The GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressThe GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressSarah Dutkiewicz
 
HTML5@电子商务.com
HTML5@电子商务.comHTML5@电子商务.com
HTML5@电子商务.comkaven yan
 
Share cash sucess! review 1, make money online from home
Share cash sucess! review 1,  make money online from homeShare cash sucess! review 1,  make money online from home
Share cash sucess! review 1, make money online from homeDuy Lên
 
Taking Web Applications Offline
Taking Web Applications OfflineTaking Web Applications Offline
Taking Web Applications OfflineMatt Casto
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017Otto Kekäläinen
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla websiteMike Carson
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Bastian Grimm
 
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 201340 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013Bastian Grimm
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Freehuutienmmo
 
Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Phil Sturgeon
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012Angela Bowman
 
Word press security 101 2018
Word press security 101  2018 Word press security 101  2018
Word press security 101 2018 Laura Hartwig
 

What's hot (20)

WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017
 
Technical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 editionTechnical SEO for WordPress - 2017 edition
Technical SEO for WordPress - 2017 edition
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Expect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedomExpect declining living standards from decaying economic freedom
Expect declining living standards from decaying economic freedom
 
Protect Thy Computer and Thyself
Protect Thy Computer and ThyselfProtect Thy Computer and Thyself
Protect Thy Computer and Thyself
 
Testing and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressionsTesting and updating WordPress - Advanced techniques for avoiding regressions
Testing and updating WordPress - Advanced techniques for avoiding regressions
 
Hit On The Internet
Hit On The InternetHit On The Internet
Hit On The Internet
 
The GiveCamp Guide to WordPress
The GiveCamp Guide to WordPressThe GiveCamp Guide to WordPress
The GiveCamp Guide to WordPress
 
HTML5@电子商务.com
HTML5@电子商务.comHTML5@电子商务.com
HTML5@电子商务.com
 
Share cash sucess! review 1, make money online from home
Share cash sucess! review 1,  make money online from homeShare cash sucess! review 1,  make money online from home
Share cash sucess! review 1, make money online from home
 
Taking Web Applications Offline
Taking Web Applications OfflineTaking Web Applications Offline
Taking Web Applications Offline
 
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
WordPress security 101 - WP Jyväskylä Meetup 21.3.2017
 
Securing Your Joomla website
Securing Your Joomla websiteSecuring Your Joomla website
Securing Your Joomla website
 
Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)Hardening WordPress - Friends of Search 2014 (WordPress Security)
Hardening WordPress - Friends of Search 2014 (WordPress Security)
 
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 201340 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
40 WordPress Tips: Security, Engagement, SEO & Performance - SMX Sydney 2013
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Free
 
Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013Become Master of Your Own Universe - DIBI 2013
Become Master of Your Own Universe - DIBI 2013
 
WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012WordPress Security Essentials WordCamp Denver 2012
WordPress Security Essentials WordCamp Denver 2012
 
Word press security 101 2018
Word press security 101  2018 Word press security 101  2018
Word press security 101 2018
 
Browsers
BrowsersBrowsers
Browsers
 

Viewers also liked

Finding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiFinding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiSaurabh Sahni
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008abhijitapatil
 
オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )博宣 今村
 
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012Saurabh Sahni
 
Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Steve Hoffman
 
Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Masami Ogoshi
 
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Saurabh Sahni
 
Hacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkHacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkSaurabh Sahni
 
The Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataThe Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataRingLead
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application DevelopersPrabath Siriwardena
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusPrabath Siriwardena
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsJon Todd
 
ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )博宣 今村
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013tmd800
 
AppSec And Microservices
AppSec And MicroservicesAppSec And Microservices
AppSec And MicroservicesSam Newman
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016Sam Newman
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki WattOpenCredo
 

Viewers also liked (20)

Finding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT DelhiFinding things on the web with Yahoo! BOSS: IIT Delhi
Finding things on the web with Yahoo! BOSS: IIT Delhi
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )オープンソースによるドローン開発の概要( #ABC2015S )
オープンソースによるドローン開発の概要( #ABC2015S )
 
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
YQL: Hacking on steroids - Yahoo! Open Hack Day 2012
 
Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015Enabling Microservices @Orbitz - Velocity Conf 2015
Enabling Microservices @Orbitz - Velocity Conf 2015
 
Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要Dronekitによる python apiとアプリ開発の概要
Dronekitによる python apiとアプリ開発の概要
 
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
Hacking & everything you need to survice a hackday - Yahoo! Agency Hack Day N...
 
Hacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New YorkHacking for Innovation - WPP, New York
Hacking for Innovation - WPP, New York
 
The Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) DataThe Cost of Bad (And Clean) Data
The Cost of Bad (And Clean) Data
 
The Worst Code
The Worst CodeThe Worst Code
The Worst Code
 
Identity Management for Web Application Developers
Identity Management for Web Application DevelopersIdentity Management for Web Application Developers
Identity Management for Web Application Developers
 
Connected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity BusConnected Identity : The Role of the Identity Bus
Connected Identity : The Role of the Identity Bus
 
REST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTsREST Service Authetication with TLS & JWTs
REST Service Authetication with TLS & JWTs
 
ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )ドローンの仕組み( #ABC2015S )
ドローンの仕組み( #ABC2015S )
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
AppSec And Microservices
AppSec And MicroservicesAppSec And Microservices
AppSec And Microservices
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 

Similar to My Site Was Hacked!

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!J_Cortes
 
15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solutionkethyjewel
 
WordPress Website Down.pdf
WordPress Website Down.pdfWordPress Website Down.pdf
WordPress Website Down.pdfHost It Smart
 
Responsible [digital] Home Ownership
Responsible [digital] Home OwnershipResponsible [digital] Home Ownership
Responsible [digital] Home OwnershipDenise (Dee) Teal
 
Software Support Done Right
Software Support Done RightSoftware Support Done Right
Software Support Done RightAndreas Zeitler
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressChelsea O'Brien
 
How to get recover from a hacked website
How to get recover from a hacked websiteHow to get recover from a hacked website
How to get recover from a hacked websitemounika k
 
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedWordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedMarshall Reyher
 
Troubleshooting WordPress
Troubleshooting WordPressTroubleshooting WordPress
Troubleshooting WordPressNile Flores
 
Debugging wordpress
Debugging wordpress Debugging wordpress
Debugging wordpress Steve Collins
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeLaura Eagin
 
How to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteHow to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteMeganGood12
 
How I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update ButtonHow I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update Buttonchris-koerner
 
Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesArea41
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Rob Fuller
 

Similar to My Site Was Hacked! (20)

Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution15 Most Common WordPress Errors and Solution
15 Most Common WordPress Errors and Solution
 
WordPress Website Down.pdf
WordPress Website Down.pdfWordPress Website Down.pdf
WordPress Website Down.pdf
 
Responsible [digital] Home Ownership
Responsible [digital] Home OwnershipResponsible [digital] Home Ownership
Responsible [digital] Home Ownership
 
Software Support Done Right
Software Support Done RightSoftware Support Done Right
Software Support Done Right
 
How To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your WordpressHow To Lock Down And Secure Your Wordpress
How To Lock Down And Secure Your Wordpress
 
How to get recover from a hacked website
How to get recover from a hacked websiteHow to get recover from a hacked website
How to get recover from a hacked website
 
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site OptimizedWordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
WordPress Maintenance: 14 Essential Tasks to Keep Your Site Optimized
 
Zero To WordPress Plubish
Zero To WordPress PlubishZero To WordPress Plubish
Zero To WordPress Plubish
 
Troubleshooting WordPress
Troubleshooting WordPressTroubleshooting WordPress
Troubleshooting WordPress
 
Setup and run wordpress: 201
Setup and run wordpress: 201Setup and run wordpress: 201
Setup and run wordpress: 201
 
Debugging wordpress
Debugging wordpress Debugging wordpress
Debugging wordpress
 
Wordpress Guide
Wordpress GuideWordpress Guide
Wordpress Guide
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've MadeWordcamp North Canton 2013 - 13 Mistakes I've Made
Wordcamp North Canton 2013 - 13 Mistakes I've Made
 
How to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress WebsiteHow to Increase Security on your Wordpress Website
How to Increase Security on your Wordpress Website
 
Pimp my Plone
Pimp my PlonePimp my Plone
Pimp my Plone
 
How I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update ButtonHow I Learned to Stop Worrying and Love the Update Button
How I Learned to Stop Worrying and Love the Update Button
 
Rob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost StoriesRob "Mubix" Fuller: Attacker Ghost Stories
Rob "Mubix" Fuller: Attacker Ghost Stories
 
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
Attacker Ghost Stories (CarolinaCon / Area41 / RVASec)
 

More from Didit Marketing

What makes SEO good or bad?
What makes SEO good or bad?What makes SEO good or bad?
What makes SEO good or bad?Didit Marketing
 
The Art of the 404 Error Page
The Art of the 404 Error PageThe Art of the 404 Error Page
The Art of the 404 Error PageDidit Marketing
 
INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadDidit Marketing
 
Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Didit Marketing
 
Kevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingKevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingDidit Marketing
 
10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn ExpertsDidit Marketing
 
Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Didit Marketing
 
Maximizing Social Advertising
Maximizing Social AdvertisingMaximizing Social Advertising
Maximizing Social AdvertisingDidit Marketing
 

More from Didit Marketing (9)

What makes SEO good or bad?
What makes SEO good or bad?What makes SEO good or bad?
What makes SEO good or bad?
 
Developing Buyer Personas
Developing Buyer PersonasDeveloping Buyer Personas
Developing Buyer Personas
 
The Art of the 404 Error Page
The Art of the 404 Error PageThe Art of the 404 Error Page
The Art of the 404 Error Page
 
INFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The BadINFOGRAPHICS: The Good and The Bad
INFOGRAPHICS: The Good and The Bad
 
Let's Throw A Twitter Party!
Let's Throw A Twitter Party!Let's Throw A Twitter Party!
Let's Throw A Twitter Party!
 
Kevin Lee- The New Online Marketing
Kevin Lee- The New Online MarketingKevin Lee- The New Online Marketing
Kevin Lee- The New Online Marketing
 
10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts10 Quotes from LinkedIn Experts
10 Quotes from LinkedIn Experts
 
Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird? Are You Feeding the Hummingbird?
Are You Feeding the Hummingbird?
 
Maximizing Social Advertising
Maximizing Social AdvertisingMaximizing Social Advertising
Maximizing Social Advertising
 

Recently uploaded

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Recently uploaded (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

My Site Was Hacked!

  • 1. HACKED Ten tips on what to do next. MY SITE WAS !
  • 2. You wake up one morning, get your coffee, open your browser, and navigate to your website.
  • 3. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products. To your horror, your discover that your website is simply not there anymore. Or worse, it's been replaced by a NSFW (not safe for work) page or a crowd of ads for unsavory pharmaceutical products.
  • 4. Even without reading the solemn notification from your browser, you know the grim truth: you've been hacked. Now you're in a panic. How did this happen? Where are your site assets? Will you ever get control back? Oh No!
  • 5. STEP 1 Calm down. You can recover from this. You can contact a professional service or fix it yourself. Google even has an that's ready to help you when you are ready. 8-step DIY recovery process
  • 6. STEP 2 Let people know you've been hacked. Notify your host, webmaster, and, if you can,  your customers. Now either clean up your local PC by running anti-virus/anti-malware software, along with your latest OS update, or, if you have doubts that your machine is truly uninfected, commandeer a PC that you're sure is clean.
  • 7. STEP 3 Make sure. Log into your hosting account to make sure you’ve been hacked. Sometimes what you think is a hack is a product of a service outage or maybe even a bad plug-in that you might have installed. Your host will be able to tell you if you were actually hacked and, if so, begin to trace what caused it.
  • 8. STEP 4 Backup (or back to the drawing board). In some cases, a good hosting company will have an old backup of your site to serve as a starting point to rebuild your site. You may also have backed up your site locally. If your site is built with WordPress, here is a guide for restoring your site from a backup.
  • 9. STEP 5 Worst case scenario: There is no back up. Data is corrupted beyond repair. You need to rebuild. There is one last refuge you need to visit: The Internet Archive may have recorded your site in its 456 billion page directory. 

  • 10. STEP 6 Find your site snapshot. Go to the last date your website was archived in a site snapshot. It’s tedious, but you will at least see your old data, and be able to copy and paste it into your new site's pages.* * I realize that this process is impractical with large database-driven sites, but for small sites without hundreds of entries, it’s better than nothing, and can be a real life saver. 

  • 11. STEP 8 Get a secure username and password. Many hackers use "brute force" attacks that look for the easiest method to break into your site’s control panel, often by using the username “admin” and password “password.” If you've failed to change the default settings that came with your hosting setup, you're just inviting the hackers to get you. Use http://passwordsgenerator.net/ to create names and passwords that are harder to crack.

  • 12. STEP 9 Don't wait for the next catastrophe to strike.
  • 13. Always back up your website on a regular schedule. WordPress site users have a vast library of backup tools to choose from. For the rest of us, logging on via FTP and whacking your content to your local PC is a task that you need to mark on your calendar and stick to.
  • 14. STEP 10 Check your users. Delete any unwanted users Delete users that are no longer using your dashboard (guests) Only give others the access they need. For example, a guest blogger on your site should never be given admin status, but give contributor status.
  • 15. If this all seems to difficult, then by all means hire a professional, or upgrade your hosting service to include automatic backups, with managed security. You may pay a premium for this service, but it is totally worth the peace of mind.
  • 16. 1. http://www.katalystcreativegroup.com/blog/140-5-critical-steps-if-your- website-is-hacked.html 2. http://www.katalystcreativegroup.com/blog/137-how-can-i-protect-my- site.html 3. http://www.elegantthemes.com/blog/tips-tricks/what-to-do-when- your-wordpress-website-has-been-hacked 4. http://www.slideshare.net/michelebutcher/your-site-has-been-hacked- now-what SOURCES
  • 17. A digital marketing leader since 1996, Didit provides full-service online advertising and marketing services with award-winning expertise and innovation. Our full-service approach applies multi-faceted skill sets, including SEO, PPC, CSEs, PLAs, Content Marketing, and Social Media strategies that create a holistic synergy of online marketing tools.