{"id":21139,"date":"2016-11-15T15:28:35","date_gmt":"2016-11-15T21:28:35","guid":{"rendered":"https:\/\/wpengine.com\/?p=21139"},"modified":"2023-04-09T16:57:31","modified_gmt":"2023-04-09T21:57:31","slug":"5-insights-website-security-threat-landscape","status":"publish","type":"post","link":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/","title":{"rendered":"5 Insights On The Website Security Threat Landscape"},"content":{"rendered":"<p>At WP Engine, we&#8217;ve got your back when it comes to website security. While we&#8217;ve covered website security extensively, it remains a hot topic that can\u2019t be talked about enough in the news, tech, and many other industries.<\/p>\n<p>In fact, we have several blog posts and white papers on the <a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/resources\/what-are-ssl-certificates\/\" target=\"_blank\" rel=\"noopener noreferrer\">importance of SSL security<\/a>, <a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/blog\/wordpress-security-best-practices-white-paper\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 WordPress security best practices<\/a>, and <a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/blog\/15-ways-harden-wordpress-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">15 tips to harden the security of your WordPress site<\/a>\u00a0that offer advice on how to make your WordPress site nearly impenetrable.<\/p>\n<p>However, there&#8217;s always more to elaborate on. In a recent webinar, WP Engine invited <a style=\"text-decoration: none;\" href=\"https:\/\/twitter.com\/perezbox\" target=\"_blank\" rel=\"noopener noreferrer\">Tony Perez<\/a>, CEO of <a style=\"text-decoration: none;\" href=\"https:\/\/sucuri.net\" target=\"_blank\" rel=\"noopener noreferrer\">Sucuri<\/a> to lead a <a href=\"https:\/\/wpengine.com\/resources\/todays-website-security-threat-landscape\/\">webinar<\/a> to explore the topic even further.<\/p>\n<p>Here\u2019s what we learned from this insightful session:<\/p>\n<h3>Human errors are hacker\u2019s favorite target<\/h3>\n<p>Hackers will take advantage of anything they can. Don\u2019t give them a reason to attack your site by having poor management of site configuration, improper configuration tools, lack of active administration or all around bad habits, like weak passwords.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21140 size-large\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-1024x549.png\" alt=\"5 Insights On The Website Security Threat Landscape\" width=\"1024\" height=\"549\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-1024x549.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-300x161.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-768x412.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-268x144.png 268w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM-1057x567.png 1057w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.21.36-AM.png 1678w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>\u201cThis makes their tactics highly effective. Because of these weaknesses, websites get compromised\u2014in mass\u2014through automation. There are targeted attacks, of course. But for the masses, I\u2019d say that approximately 95 percent of the attacks we see every day with website owners are \u2018Targets of Opportunity\u2019 or targeted attacks,\u201d said Perez.<\/p>\n<p>Perez also mentioned security is one of the last priorities that website owners\u00a0neglect to address.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21154 size-full\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic.png\" alt=\"5 Insights On The Website Security Threat Landscape\" width=\"1690\" height=\"948\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic.png 1690w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic-300x168.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic-768x431.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic-1024x574.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic-257x144.png 257w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-landscape-graphic-1011x567.png 1011w\" sizes=\"auto, (max-width: 1690px) 100vw, 1690px\" \/><\/a><\/p>\n<h3>There are many different kinds of attacks<\/h3>\n<p>Types of attacks range from <strong>external<\/strong> to <strong>internal<\/strong> to <strong>reflective<\/strong>.<\/p>\n<p>The types of external attacks hackers use are a \u201cshotgun-like approach,\u201d where they fire a lot of shots and see what works. For example, a \u201cBrute-Force Attack,\u201d is where an attacker sends a barrage of requests to the username and password fields to find the right combination.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-21156\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM.png\" alt=\"screen-shot-2016-11-15-at-1-37-24-pm\" width=\"1698\" height=\"944\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM.png 1698w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM-300x167.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM-768x427.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM-1024x569.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM-259x144.png 259w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-1.37.24-PM-1020x567.png 1020w\" sizes=\"auto, (max-width: 1698px) 100vw, 1698px\" \/><\/a><\/p>\n<p>Internal attacks can include a hosting misconfiguration\u00a0and cross-site contamination.<\/p>\n<p>Lastly, reflective attacks are when an attacker compromises your site by not penetrating it. This happens when you trust your site too much and encompass malvertising and third-party integration.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-threats.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-21158\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-threats.png\" alt=\"website-security-threats\" width=\"1692\" height=\"956\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats.png 1692w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-300x170.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-768x434.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1024x579.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-255x144.png 255w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1004x567.png 1004w\" sizes=\"auto, (max-width: 1692px) 100vw, 1692px\" \/><\/a><\/p>\n<p>The order of precedence in a security attack is exploitation of software vulnerabilities, brute-force attempts, users, security misconfiguration, and cross-site contamination.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-threats-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-21159\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-threats-1.png\" alt=\"website-security-threats\" width=\"1634\" height=\"772\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1.png 1634w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1-300x142.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1-768x363.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1-1024x484.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1-303x144.png 303w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-threats-1-1200x567.png 1200w\" sizes=\"auto, (max-width: 1634px) 100vw, 1634px\" \/><\/a><\/p>\n<h3>Once hackers have entered your site, they have the world at their fingertips<\/h3>\n<p>\u201cA lot of the time, it\u2019s not what they will do with your audience as it is what they will do with your resources,\u201d said Perez. \u201cYour website is another connected device that can be added to a larger botnet that can be used to disseminate some traffic or otherwise used to abuse or confuse online visitors.\u201d<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-actions.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-21160\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/website-security-actions.png\" alt=\"website-security-actions\" width=\"1686\" height=\"938\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions.png 1686w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions-300x167.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions-768x427.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions-1024x570.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions-259x144.png 259w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-actions-1019x567.png 1019w\" sizes=\"auto, (max-width: 1686px) 100vw, 1686px\" \/><\/a><\/p>\n<p>These resources include cross-site examination, your site\u2019s SEO, malware distribution, search engine poisoning, phishing, sending spam email, defacement of the site,\u00a0and so on.<\/p>\n<p>Search engine poisoning is making use of your online authority and pushing their agenda. Say someone searches your site and clicks on a link, but instead of your site, they will be directed somewhere else. This is the fastest growing number of attacks in cyber security today.<\/p>\n<p>Backdoors are also another issue to worry about. Perez said over 60 percent of infected sites we work on have some backdoor embedded within the system. For those who don\u2019t know, backdoors ensure the attacker is able to still have access to the site, even after the attack has been fixed.<\/p>\n<h3>There is no single best solution to cyber security<\/h3>\n<p>Perez introduces the idea that he uses at Sucuri, which is \u201cDefense in Depth.&#8221;<\/p>\n<p>\u201cIt\u2019s the idea that we deploy a series of overlapping, complementary defensive controls across our stack. This is all designed to work in unison with one another,\u201d said Perez. \u201cOne is not better than the other. The endpoint security is not better than cloud security. They have to work together.\u201d<\/p>\n<p>Perez advised that to employ an effective &#8220;Defense in Depth&#8221; strategy, you must focus on the things you can control. You must stay ahead of the unknowns. Security is an ever-going process and not in a static state.<\/p>\n<p>He emphasized that the people, process, and technology circle must all work together to make your site secure. For example, installing a plugin or tool and then forgetting to configure it is a huge security issue. Contrary to the principle of this circle is trying to find one golden thing to rely on to defend your site.<\/p>\n<p><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-21141 size-large\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-1024x569.png\" alt=\"screen-shot-2016-11-15-at-10-22-33-am\" width=\"1024\" height=\"569\" srcset=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-1024x569.png 1024w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-300x167.png 300w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-768x427.png 768w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-259x144.png 259w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM-1021x567.png 1021w, https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-15-at-10.22.33-AM.png 1624w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h3>WP Engine\u2019s commitment to security<\/h3>\n<p>As Perez concluded his presentation, WP Engine Security Engineer, Justin Dailey, took the mic to discuss how we at WP Engine combat malicious attacks.<\/p>\n<p>WordPress core upgrades, disk write protection, active intrusion detection, managed patching and updates, and malware remediation are some of the security features on WP Engine\u2019s <a href=\"https:\/\/wpengine.com\/\">WordPress hosting<\/a> platform.<\/p>\n<p>\u201cAt WP Engine, security is a shared responsibility between us and our customers. We do as much as we can to take some of the burden off of our customers,\u201d said Dailey.<\/p>\n<h3>Conclusion<\/h3>\n<p>One of the biggest things to take away from the webinar is that website security is ever-changing. It must be managed by multiple security tools. Hackers will take advantage of any weakness your site has. Yet, there are many simple ways to further harden the security of your site.<\/p>\n<p>You want to trust your hosting provider when it comes to website security. At WP Engine, we promote an open dialogue as well as our many <a href=\"https:\/\/wpengine.com\/secure-wordpress-hosting\/\">secure WordPress hosting<\/a> features.<\/p>\n<p><em><a style=\"text-decoration: none;\" href=\"https:\/\/wpengine.com\/resources\/todays-website-security-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">Check out<\/a> the entire webinar that includes slides and a Q&amp;A.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At WP Engine, we&#8217;ve got your back when it comes to website security. While we&#8217;ve covered website security extensively, it remains a hot topic that can\u2019t be talked about enough in the news, tech, and many other industries. In fact, we have several blog posts and white papers on the importance of SSL security, 10<span class=\"tile__ellipses\">&hellip;<\/span><span class=\"tile__ellipses--animated\"><\/span><\/p>\n","protected":false},"author":146,"featured_media":21150,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[85,452],"tags":[13,38,190,827,350,37],"class_list":["post-21139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","category-webinar","tag-security","tag-sucuri","tag-thought-leadership","tag-tony-perez","tag-webinar","tag-wordpress-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Insights On The Website Security Threat Landscape | WP Engine Blog<\/title>\n<meta name=\"description\" content=\"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri&#039;s Tony Perez...\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Insights On The Website Security Threat Landscape | WP Engine Blog\" \/>\n<meta property=\"og:description\" content=\"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri&#039;s Tony Perez...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"WP Engine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wpengine\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-15T21:28:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-09T21:57:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-facebook.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jack Riewe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-twitter.png\" \/>\n<meta name=\"twitter:creator\" content=\"@wpengine\" \/>\n<meta name=\"twitter:site\" content=\"@wpengine\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Riewe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/\",\"url\":\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/\",\"name\":\"5 Insights On The Website Security Threat Landscape | WP Engine Blog\",\"isPartOf\":{\"@id\":\"https:\/\/wpengine.com\/case-studies\/#website\"},\"datePublished\":\"2016-11-15T21:28:35+00:00\",\"dateModified\":\"2023-04-09T21:57:31+00:00\",\"author\":{\"@id\":\"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/efbffe89340325e7f387c74a7f3cff5f\"},\"description\":\"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri's Tony Perez...\",\"breadcrumb\":{\"@id\":\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wpengine.com\/case-studies\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Insights On The Website Security Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wpengine.com\/case-studies\/#website\",\"url\":\"https:\/\/wpengine.com\/case-studies\/\",\"name\":\"WP Engine\",\"description\":\"Managed Hosting for WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wpengine.com\/case-studies\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/efbffe89340325e7f387c74a7f3cff5f\",\"name\":\"Jack Riewe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/babbe8944f95176b4849865d57f74c4f587450adfdd95485cc256c27b3ce83af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/babbe8944f95176b4849865d57f74c4f587450adfdd95485cc256c27b3ce83af?s=96&d=mm&r=g\",\"caption\":\"Jack Riewe\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Insights On The Website Security Threat Landscape | WP Engine Blog","description":"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri's Tony Perez...","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"5 Insights On The Website Security Threat Landscape | WP Engine Blog","og_description":"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri's Tony Perez...","og_url":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/","og_site_name":"WP Engine","article_publisher":"https:\/\/www.facebook.com\/wpengine","article_published_time":"2016-11-15T21:28:35+00:00","article_modified_time":"2023-04-09T21:57:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-facebook.png","type":"image\/png"}],"author":"Jack Riewe","twitter_card":"summary_large_image","twitter_image":"https:\/\/wpengine.com\/case-studies\/wp-content\/uploads\/2016\/11\/website-security-twitter.png","twitter_creator":"@wpengine","twitter_site":"@wpengine","twitter_misc":{"Written by":"Jack Riewe","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/","url":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/","name":"5 Insights On The Website Security Threat Landscape | WP Engine Blog","isPartOf":{"@id":"https:\/\/wpengine.com\/case-studies\/#website"},"datePublished":"2016-11-15T21:28:35+00:00","dateModified":"2023-04-09T21:57:31+00:00","author":{"@id":"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/efbffe89340325e7f387c74a7f3cff5f"},"description":"To harden the security of your site, read about five insightful website security tips from a recent webinar with Sucuri's Tony Perez...","breadcrumb":{"@id":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wpengine.com\/case-studies\/5-insights-website-security-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wpengine.com\/case-studies\/"},{"@type":"ListItem","position":2,"name":"5 Insights On The Website Security Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/wpengine.com\/case-studies\/#website","url":"https:\/\/wpengine.com\/case-studies\/","name":"WP Engine","description":"Managed Hosting for WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wpengine.com\/case-studies\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/efbffe89340325e7f387c74a7f3cff5f","name":"Jack Riewe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wpengine.com\/case-studies\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/babbe8944f95176b4849865d57f74c4f587450adfdd95485cc256c27b3ce83af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/babbe8944f95176b4849865d57f74c4f587450adfdd95485cc256c27b3ce83af?s=96&d=mm&r=g","caption":"Jack Riewe"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/posts\/21139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/users\/146"}],"replies":[{"embeddable":true,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/comments?post=21139"}],"version-history":[{"count":0,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/posts\/21139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/media\/21150"}],"wp:attachment":[{"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/media?parent=21139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/categories?post=21139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpengine.com\/case-studies\/wp-json\/wp\/v2\/tags?post=21139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}