Honeypots
The blog can be run off a virtual machine, this allow the website to look like an easy target by weakening it’s security so that a hacker would aim for it. This would attract the hacker to access the virtual machine while providing the system administrator with valuable information.
VPN – Virtual private network
The users accessing the blog may want to do this privately. They can use the VPN to mask themselves. A VPN will intercept the data through a different network before reaching the user.
Encryption
The blog can use a digital certificate with the encryption key to access the blog. Should the user not have the certificate installed, they will not gain access to the website.
2FA – Two factor authentication
When a user logs on to WordPress they may want to use a second method of authentication. For example they can opt in to receive an SMS on their phone to verify their identity.
Firewall
When setting up the blog the administrator may set up a set of rules to determine who gets trusted access to the blog.