Contents
Chapter 1 Introduction to CMS Security and Operations
Educating Your Employees and End Users
Training on Information Security Policies
Providing a Standard Protocol for Threat Reporting
Looking at Your Site Through the Eyes of a Hacker
Steps to Gaining Access to Your Site
Using Google Hacking Tools (Dorks)
Using NMAP for Nefarious Means
Indiscriminate Browsing or Instant Messaging
Vendors or External Clients/Customers as the Threat
Enforcing a Password Complexity and Change Policy
How Will You Respond to an Incident?
Where Are Your Backup Tapes, Disks, and USBs?
Chapter 2 Choosing the Right Hosting Company
Selecting the Right Hosting Option
Get CMS Security Handbook: The Comprehensive Guide for WordPress®, Joomla!®, Drupal™, and Plone® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.