Securing your own blog

Honeypots

The blog can be run off a virtual machine, this allow the website to look like an easy target by weakening it’s security so that a hacker would aim for it. This would attract the hacker to access the virtual machine while providing the system administrator with valuable information.

VPN – Virtual private network

The users accessing the blog may want to do this privately. They can use the VPN to mask themselves. A VPN will intercept the data through a different network before reaching the user.

Encryption

The blog can use a digital certificate with the encryption key to access the blog. Should the user not have the certificate installed, they will not gain access to the website.

2FA – Two factor authentication

When a user logs on to WordPress they may want to use a second method of authentication. For example they can opt in to receive an SMS on their phone to verify their identity.

Firewall

When setting up the blog the administrator may set up a set of rules to determine who gets trusted access to the blog.

Leave a comment