{"id":2550,"date":"2013-04-24T18:53:07","date_gmt":"2013-04-24T23:53:07","guid":{"rendered":"https:\/\/wpengine.com\/?p=2550"},"modified":"2023-04-09T17:44:58","modified_gmt":"2023-04-09T22:44:58","slug":"how-tony-perez-of-sucuri-sets-up-his-own-security","status":"publish","type":"post","link":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/","title":{"rendered":"How Tony Perez of Sucuri Sets Up His Own Security"},"content":{"rendered":"<p><em><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2557\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2013\/04\/tony-perez.jpeg\" alt=\"Tony Perez\" width=\"256\" height=\"256\" \/>This is a guest post by <a href=\"http:\/\/twitter.com\/perezbox\" target=\"_blank\" rel=\"noopener noreferrer\">Tony Perez<\/a>, the COO at <a href=\"http:\/\/sucuri.net\" target=\"_blank\" rel=\"noopener noreferrer\">Sucuri Sucuri<\/a>, the provider of choice of WordPress information security, and <a href=\"https:\/\/wpengine.com\/support\/wp-engines-security-environment\/\" target=\"_blank\" rel=\"noopener noreferrer\">WP Engine partner<\/a>. Tony specializes in malware detection, incident handling, and log analysis. He&#8217;s also passionate about Martial Arts, The Military, and Weapons, always welcomes a good MMA fight, and is likely to talk your ear off about website security over a pint.<\/em><\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>Holy smokes, what a month right? WP Engine asked me to contribute a post in April for their Website Security month, I was ecstatic to be invited and intended to write this weeks ago, then, as if on queue, the month blew up with issues. It seems like there has been an issue every week, from <a href=\"http:\/\/blog.sucuri.net\/2013\/04\/the-wordpress-brute-force-attack-timeline.html\">global brute force attacks<\/a>, <a href=\"http:\/\/blog.sucuri.net\/2013\/04\/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html\">to vulnerabilities in some of the most prominent plugins<\/a>, to exploiting our trust by leveraging popular plugins to do bad things via their core files.<\/p>\n<p>I know it feels a bit overwhelming and probably makes most of you feel as if you&#8217;re better off unplugging the CAT 5e\/6 cable from your machine and disabling the WiFi card, or maybe disabling your website altogether. I urge you to not do any of those things. While the internet may be a bit scary and growing in complexity, staying secure often revolves around two things:<\/p>\n<ul>\n<li>Access Control<\/li>\n<li>Software Vulnerabilities<\/li>\n<\/ul>\n<p>This is good. These are two things that you can definitely control to a large extent. I&#8217;ll cover how to control these from the perspective of an end-user.<\/p>\n<h3>A Pragmatic Approach to Website Security<\/h3>\n<p>One of the things I am often asked is, &#8220;What do you do, Tony?,&#8221; and &#8220;What does <a href=\"http:\/\/sucuri.net\" target=\"_blank\" rel=\"noopener noreferrer\">Sucuri Security<\/a>\u00a0do?&#8221; to protect ourselves. As a company, we have to eat our own dog food, and we follow the same security processes we recommend to our customers. If you want to know our secrets, read on. In this post I&#8217;m going to walk you through the things I do across my personal sites, and the things Sucuri does across our company properties.<\/p>\n<h5>A Little Background<\/h5>\n<p>I am one of three owners of a three year-old website security company called Sucuri. We&#8217;re based out of Southern California, with resources distributed around the world, offering 24&#215;5 operations during the week and 16&#215;2 operations on weekends. Our predominent focus so far has been detection, alerting, and remediation of website malware. With the rise in remediation we started focusing on the preventive suite about 12 months ago and have recently released the product, <a href=\"https:\/\/sucuri.net\/\" target=\"_blank\" rel=\"noopener\">CloudProxy<\/a>.<\/p>\n<p>The luxury we have comes from the volume of attacks we get to see. We not only get to monitor our own properties, both personal and professional, but we also get to keep tabs on each of our client sites. We put in an extraordinary effort to track and monitor so we can get ahead of the attacks altogether, and that&#8217;s where this post will become most valuable, I hope. Here&#8217;s some of the numbers we&#8217;re seeing right now across all our sites. Our plugin web application firewall (WAF) is currently blocking about 1 million attacks across its network. CloudProxy is still in beta, so it&#8217;s hard to provide much tangible data.<\/p>\n<p>Our personal properties alone see somewhere in the neighborhood of 150,000 attacks a month. This doesn&#8217;t include server-level attacks, only attacks against our websites. This includes malformed post requests, malicious URL&#8217;s, brute force attacks, etc.. The attacks range from automation to targeted attacks. We&#8217;re continually working to combat attacks on our own sites. After all, every self-respecting hacker wants to deface a web security company, right?<\/p>\n<p>Our approach is very simple. We employ the InfoSec concept of Defense in Depth. Defense in Depth is a fancy way of saying &#8220;layer your defenses.&#8221; You don&#8217;t want to put all your eggs in one basket, you want to employ various controls, sometimes 1 or 2 for every area you&#8217;re looking to address. The idea is that through overlapping layers of security you greatly improve your protection and reduce your overall risk.<\/p>\n<p>Simple, right? Let me show you how we go about this.<\/p>\n<h3>Applying a Layered Defense<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2556\" src=\"https:\/\/wpengine.com\/wp-content\/uploads\/2013\/04\/Screen-Shot-2013-04-24-at-5.00.42-PM-580x248.png\" alt=\"Layered Defense\" width=\"580\" height=\"248\" \/><\/p>\n<p>When we start putting up our layered defense, we focus on the two areas I identified earlier, access and vulnerabilities. I won&#8217;t get into server level defenses so \u00a0Austin doesn&#8217;t kill me for writing 5000 words, so let&#8217;s focus strictly on your website.<\/p>\n<h4>Access<\/h4>\n<p>Many folks undervalue the importance of managing site access. There seems to be a prevailing belief that technology is making web-based brute force attacks technologically impossible. This is false. Last week with the massive bot-net attacks, we saw the reality that when you don&#8217;t limit site access, it&#8217;s easy to gain control of your site. Even in last year&#8217;s compromise of <a href=\"http:\/\/blog.sucuri.net\/2012\/10\/is-wordpress-com-spam-campaign-due-to-compromise.html\">WordPress.comm which saw some 50,000 website owners hacked and serving SPAM posts<\/a>\u00a0illustrated that.\u00a0Fortunately, there are a number of things you can do to protect your access controls.<\/p>\n<h4>I do the following:<\/h4>\n<ul>\n<li>Whitelist IPs (instead of blacklisting them)<\/li>\n<li>Apply Two-Factor \/ Multi-Factor Authentication<\/li>\n<\/ul>\n<p>I greatly prefer the whitelist approach over the blacklist as it&#8217;s much easier to maintain. Now, I know most folks are going to say it&#8217;s impossible to only whitelist my own IPs because the travel all the time or have a team distributed around the world. Right\u2026 Everything is possible. The question I like to ask in response is, <em>&#8220;what is the impact of a compromise?&#8221;<\/em> Does the\u00a0colosal\u00a0risk outweigh the small pain of whitelisting IPs and adding controls to accommodate a global workforce?<\/p>\n<p>Matt Cutts put together a really nice, applicable, <a href=\"http:\/\/www.mattcutts.com\/blog\/three-tips-to-protect-your-wordpress-installation\/\">writeup on the subject<\/a> that I&#8217;d encourage you to read if you&#8217;re looking to do this yourself via your own .htaccess files. The other way, if you&#8217;re a client of ours, is to look at our CloudProxy solution. We built this feature in at the proxy level to avoid you having to do any configurations on your own.<\/p>\n<p>You can also do what I do, purchase a cheap VPS which I use solely for SSH tunneling when on the road. This allows me to whitelist the VPS server IP and allows me to go about my business. If you have a small dev team, you can do the same thing and funnel everyone through your VPS. You can also look at getting a VPN service that you use when on the road. That gives you a static IP to employ. The awesome part about this is you&#8217;d require someone to first know your IP, and then spoof it in order to brute force. Most opportunistic attackers won&#8217;t even bother with that level of security and move onto the next site that doesn&#8217;t have that level of security.<\/p>\n<p>I also employ a second layer defense by introducing either Basic Access Authentication, configured via your .htaccess file, or enabling <a href=\"https:\/\/www.duosecurity.com\/\">Duo Security Two Factor Authentication plugin<\/a>. This sends me a code which I have to then have to approve in order to gain access to my administrator pages. If you&#8217;re interested in better understanding the concepts around Two-Factor security I encourage you to read Ipstenu&#8217;s <a href=\"http:\/\/halfelf.org\/2013\/two-factor-authentication\/\">most recent post on the subject<\/a>.\u00a0It was very thorough, and very readable for all users.<\/p>\n<p>Ok, but it doesn&#8217;t stop there. The two layers I discussed above strictly focus on getting into wp-admin. There is another dual layer that we focus on to address the &#8220;Oh Crap,&#8221; moment that ensues if a hacker manages to bypass those controls.<\/p>\n<ul>\n<li>Least Privileged<\/li>\n<li>Passwords<\/li>\n<\/ul>\n<p>The principles of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\">least privileged is simple<\/a>.\u00a0Apply only the necessary roles to each user and nothing more. Not every user needs to be an admin or editor. Just the other day a client had 15 admins, and swore she needed all 15 to have those privileges. We went on to ask why and what they did, turns out all they did was contribute articles. None of them needed to change settings or add users.<\/p>\n<p>Out of the box, WordPress comes with a variety of\u00a0<a href=\"http:\/\/codex.wordpress.org\/Roles_and_Capabilities\">key roles and capabilities<\/a>, learn them, apply them, and leverage them where possible.<\/p>\n<h4>Passwords<\/h4>\n<p>Who isn&#8217;t tired of hearing about the importance of passwords? Yeah, that makes two of us, I assure you of that. The importance of passwords is not sinking in to most of the owners of the close to <a href=\"http:\/\/royal.pingdom.com\/2013\/01\/16\/internet-2012-in-numbers\/\" target=\"_blank\" rel=\"noopener noreferrer\">634 million websites<\/a> on the internet (as of December 2012). We have to continue to convey the importance of strong passwords to everyone.<\/p>\n<p>Mark Jaquith recently posted his preferred approach to passwords on Twitter. I like it, so I&#8217;m going to steal it:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/photomatt?ref_src=twsrc%5Etfw\">@photomatt<\/a> Right on. My password advice: C.L.U.E. \u2014 Complex, Long, Unique, Esoteric. No one will just \u201cguess\u201d a good password.<\/p>\n<p>&mdash; Mark Jaquith (@markjaquith) <a href=\"https:\/\/twitter.com\/markjaquith\/status\/322861794597171200?ref_src=twsrc%5Etfw\">April 13, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I don&#8217;t have room to get into the various issues with today&#8217;s passwords but <a href=\"http:\/\/blog.sucuri.net\/2012\/08\/the-password-dilemma-unique-and-complex-is-the-key.html\">I did write a post about it a while back<\/a>. The key to remember is that you&#8217;re not as unique as you think you are. Attackers know that e = 3 and a = @ or 4. There are even tools designed to check all variation of characters, so you&#8217;re not fooling anyone.<\/p>\n<p>To generate complex, random passwords, I use the generators out of <a href=\"https:\/\/agilebits.com\/onepassword\">1Password<\/a> and <a href=\"https:\/\/lastpass.com\/\">LastPass<\/a>, depending on my mood. My personal passwords are often close to 50 characters.<\/p>\n<p>In terms of plugins,\u00a0<a href=\"http:\/\/wordpress.org\/extend\/plugins\/login-security-solution\/\" target=\"_blank\" rel=\"noopener noreferrer\">Login Security Solution<\/a> is one I really like to use to enforce my password policy.\u00a0Not only is the developer well-known in the PHP coding community, but I&#8217;ve looked at his code, and love how secure it is. The plugin offers a number of features, including throttling access, enforcing password policies, and giving you actions in the event that you are compromised.<\/p>\n<h5>Vulnerabilities<\/h5>\n<p>Vulnerabilities are a bit harder for most people to grasp. <em>Why would someone build something with vulnerabilities in the first place?<\/em> The audacity, right?<\/p>\n<p>The reality is it happens to the best of us &#8211; Facebook has them, Microsoft has them, Apple has them. If it happens to these companies with their billions of dollars in the bank, it&#8217;s unrealistic to think it won&#8217;t happen to everyone else.<\/p>\n<p>What&#8217;s my guidance? Learn to live with them, but also learn what to do to protect against them.<\/p>\n<h4>Our approach includes:<\/h4>\n<ul>\n<li>Web Application Firewall<\/li>\n<li>Staying Current &#8211; Updating<\/li>\n<\/ul>\n<p>The beautiful thing about most of the vulnerabilities plaguing WordPress installs is that they come from themes and plugins. To address this, there&#8217;s been a massive increase in a number of things known as Web Application Firewalls (WAF). If you look through the repository you&#8217;re likely to get engulfed by WAF products. I haven&#8217;t tested them all, so it&#8217;s hard to provide any really good guidance on which ones to employ.<\/p>\n<p>In the past, our approach was to use ModSecurity via a proxy to offload the attacks on web server resources. As of late, we&#8217;ve build a new WAF solution that&#8217;s not built on ModSecurity, and functions as a reverse-proxy for websites, \u00a0our new beta product, <a href=\"http:\/\/cloudproxy.sucuri.net\">CloudProxy<\/a>. That&#8217;s what we employ on all our properties now. The beta is only available to clients so far.<\/p>\n<p>For those that aren&#8217;t clients, there are other solutions. I am particularly fond of <a href=\"https:\/\/www.imperva.com\/\" target=\"_blank\" rel=\"noopener\">Incapsula<\/a> over <a href=\"https:\/\/www.cloudflare.com\" target=\"_blank\" rel=\"noopener noreferrer\">CloudFlare<\/a>. My fondness comes from two independent reports that have tested their products from a security standpoint. I wr0te about them <a href=\"http:\/\/tonyonsecurity.com\/2012\/11\/13\/protecting-your-website-cloudflare-or-incapsula\/\">here<\/a>.\u00a0<a href=\"http:\/\/tonyonsecurity.com\/2013\/03\/09\/protect-your-website-vulnerabilities-with-a-waf-new-compairson-report-cloudflare-vs-incapsula-vs-modsecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">However, I am personally not a big fan of the WAF plugins<\/a> because of the limitations they face.<\/p>\n<h4>Stay up to date<\/h4>\n<p>There is no better example of the importance of staying up to date than the recent issue with <a href=\"http:\/\/blog.sucuri.net\/2013\/04\/update-wp-super-cache-and-w3tc-immediately-remote-code-execution-vulnerability-disclosed.html\">W3TC Total Cache and Super Cache<\/a>. In almost major release of WordPress there appears to be some security issue to address. Granted, most over the past year or so have been marginal. Unfortunately, that is not the same with plugins and themes. Keeping themes and plugins up to date is your first defense against software vulnerabilities, and is much easier than long, random passwords.<\/p>\n<h3>Wrapping Up<\/h3>\n<p>If you just add one of these I&#8217;ve covered layers to your security, you&#8217;ll be better off than you were before. Invest your time wisely so you don&#8217;t get overwhelmed. Do what you can. Ipstenu phrased this very eloquently in one of her recent posts about <a href=\"http:\/\/halfelf.org\/2013\/false-security\/\">False Security<\/a>:<\/p>\n<blockquote><p>Part of security is knowing where to spend your time. &#8211; <a href=\"http:\/\/twitter.com\/ipstenu\" target=\"_blank\" rel=\"noopener noreferrer\">Mika Epstein<\/a><\/p><\/blockquote>\n<p>She couldn&#8217;t be more right. It pays dividends to step back and look at your overall security posture holistically. Think through the things you are doing, asking does it all make sense? Are you really doing everything you can to protect yourself? Are the things you are doing really effective?<\/p>\n<h4>I&#8217;ll leave this with you.<\/h4>\n<blockquote><p>Complex things, break in complex ways.<\/p><\/blockquote>\n<p>The idea of security isn&#8217;t that everyone does it the same way. Instead, listen to a variety of sources, and take from each person what you like and apply it. Don&#8217;t fool yourself into thinking that because you have every security plugin and service installed and configured you&#8217;ll never be compromised. That&#8217;s liable to set you up for a very bad day. Stay frosty.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p><em>You can find more from Tony about security on <a href=\"http:\/\/blog.sucuri.net\">Sucuri&#8217;s blog<\/a>, <a href=\"http:\/\/tonyonsecurity.com\">Tony&#8217;s personal blog on security<\/a>, and on\u00a0<a href=\"http:\/\/twitter.com\/perezbox\">Twitter<\/a>. Definitely feel fre to\u00a0say &#8220;Hi!&#8221;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a guest post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner. Tony specializes in malware detection, incident handling, and log analysis. He&#8217;s also passionate about Martial Arts, The Military, and Weapons, always welcomes a good MMA fight, and is likely to<span class=\"tile__ellipses\">&hellip;<\/span><span class=\"tile__ellipses--animated\"><\/span><\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11,85],"tags":[],"class_list":["post-2550","post","type-post","status-publish","format-standard","hentry","category-guest-post","category-security-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP<\/title>\n<meta name=\"description\" content=\"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP\" \/>\n<meta property=\"og:description\" content=\"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/\" \/>\n<meta property=\"og:site_name\" content=\"WP Engine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wpengine\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-24T23:53:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-09T22:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wpengine.com\/resources\/wp-content\/uploads\/2013\/04\/tony-perez.jpeg\" \/>\n<meta name=\"author\" content=\"Tony Perez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wpengine\" \/>\n<meta name=\"twitter:site\" content=\"@wpengine\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tony Perez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/\",\"url\":\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/\",\"name\":\"How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP\",\"isPartOf\":{\"@id\":\"https:\/\/wpengine.com\/resources\/#website\"},\"datePublished\":\"2013-04-24T23:53:07+00:00\",\"dateModified\":\"2023-04-09T22:44:58+00:00\",\"author\":{\"@id\":\"https:\/\/wpengine.com\/resources\/#\/schema\/person\/ab464f88cabf6b7b03631d53bd8afbed\"},\"description\":\"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.\",\"breadcrumb\":{\"@id\":\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wpengine.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Tony Perez of Sucuri Sets Up His Own Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wpengine.com\/resources\/#website\",\"url\":\"https:\/\/wpengine.com\/resources\/\",\"name\":\"WP Engine\",\"description\":\"Managed Hosting for WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wpengine.com\/resources\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wpengine.com\/resources\/#\/schema\/person\/ab464f88cabf6b7b03631d53bd8afbed\",\"name\":\"Tony Perez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wpengine.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d2cf456adbacb4a28bcbd74ba68c05f99a7e694a28cc96e1a9d12977d0c43752?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d2cf456adbacb4a28bcbd74ba68c05f99a7e694a28cc96e1a9d12977d0c43752?s=96&d=mm&r=g\",\"caption\":\"Tony Perez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP","description":"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP","og_description":"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.","og_url":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/","og_site_name":"WP Engine","article_publisher":"https:\/\/www.facebook.com\/wpengine","article_published_time":"2013-04-24T23:53:07+00:00","article_modified_time":"2023-04-09T22:44:58+00:00","og_image":[{"url":"https:\/\/wpengine.com\/resources\/wp-content\/uploads\/2013\/04\/tony-perez.jpeg"}],"author":"Tony Perez","twitter_card":"summary_large_image","twitter_creator":"@wpengine","twitter_site":"@wpengine","twitter_misc":{"Written by":"Tony Perez","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/","url":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/","name":"How Tony Perez of Sucuri Sets Up His Own Security | WP Engine DXP","isPartOf":{"@id":"https:\/\/wpengine.com\/resources\/#website"},"datePublished":"2013-04-24T23:53:07+00:00","dateModified":"2023-04-09T22:44:58+00:00","author":{"@id":"https:\/\/wpengine.com\/resources\/#\/schema\/person\/ab464f88cabf6b7b03631d53bd8afbed"},"description":"Read a guest post by post by Tony Perez, the COO at Sucuri Sucuri, the provider of choice of WordPress information security, and WP Engine partner.","breadcrumb":{"@id":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wpengine.com\/resources\/how-tony-perez-of-sucuri-sets-up-his-own-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wpengine.com\/resources\/"},{"@type":"ListItem","position":2,"name":"How Tony Perez of Sucuri Sets Up His Own Security"}]},{"@type":"WebSite","@id":"https:\/\/wpengine.com\/resources\/#website","url":"https:\/\/wpengine.com\/resources\/","name":"WP Engine","description":"Managed Hosting for WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wpengine.com\/resources\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/wpengine.com\/resources\/#\/schema\/person\/ab464f88cabf6b7b03631d53bd8afbed","name":"Tony Perez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wpengine.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d2cf456adbacb4a28bcbd74ba68c05f99a7e694a28cc96e1a9d12977d0c43752?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2cf456adbacb4a28bcbd74ba68c05f99a7e694a28cc96e1a9d12977d0c43752?s=96&d=mm&r=g","caption":"Tony Perez"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/posts\/2550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/comments?post=2550"}],"version-history":[{"count":0,"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/posts\/2550\/revisions"}],"wp:attachment":[{"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/media?parent=2550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/categories?post=2550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpengine.com\/resources\/wp-json\/wp\/v2\/tags?post=2550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}