{"id":13114,"date":"2016-11-07T09:35:06","date_gmt":"2016-11-07T14:35:06","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=13114"},"modified":"2018-07-20T13:56:13","modified_gmt":"2018-07-20T18:56:13","slug":"how-secure-is-your-website-free-website-security-checklist","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/","title":{"rendered":"How Secure Is Your Website? A Website Security Checklist"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13157\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\" alt=\"Website security checklist\" width=\"1200\" height=\"628\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png 1200w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist-300x157.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist-768x402.png 768w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist-1024x536.png 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.wired.com\/2016\/10\/internet-outage-ddos-dns-dyn\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">recent DDOS scare<\/span><\/a><span style=\"font-weight: 400;\"> that affected a large number of websites brought to light how important it is to put whatever precautions we can into place to keep our websites secure. Anyone that owns a website right now should be thinking about security, but for those for whom your website is your business, you need to treat it as a priority.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s doubly true if you accept payment through your website. Whenever someone provides you with their credit card information, they\u2019re putting trust in you and your brand. If a hacker gets access to that information because you didn\u2019t take the necessary steps to make your website secure, then you betray that trust. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security is complicated stuff and you may not be able to ward off every threat   hackers are often savvy and always working to outsmart every new security update. Nonetheless, you can vastly reduce the risk of having your website be the next to be victimized by taking a few key precautions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>1. Keep all your software up to date.<\/h2>\n<p><span style=\"font-weight: 400;\">The first step is one of the easiest, but one that makes a big difference. A lot of software updates are designed specifically to reduce security vulnerabilities. Software designers and cyber security experts are in a constant battle with hackers to thwart every new effort they come up with.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of those software updates you seem to get constant reminders for are part of that battle. Even if it feels like an annoyance, don\u2019t dilly-dally on completing those updates. Regularly check for updates to your plug-ins, your CMS, your ecommerce software, and any other software related to how your website runs. Taking this simple step will immediately reduce your vulnerability.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>2. Use secure passwords and update frequently.<\/h2>\n<p><a href=\"https:\/\/www.skyhighnetworks.com\/cloud-security-blog\/you-wont-believe-the-20-most-popular-cloud-service-passwords\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">A surprising number of people<\/span><\/a><span style=\"font-weight: 400;\"> still use basic passwords like 'password'\u009d or '123456.'\u009d \u00a0Don\u2019t be one of those people. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure the password you use to access your website has a mix of numbers, letters, and special characters. Also avoid using something an acquaintance could guess at in your password   your kid\u2019s name or year of birth is too easy for someone to figure out. Get creative, make sure you use something different for your website than you use for your other logins, and make sure anyone else in the company that has access to the website does the same.<\/span><\/p>\n<p>And then do it all over again in six months. Set a reminder on your calendar so you remember to update your password with some frequency.<\/p>\n<p>With HostGator&#8217;s <a href=\"https:\/\/www.hostgator.com\/passwords\">Password Generator tool<\/a>, simply\u00a0click\u00a0and drag Snappy&#8217;s head to generate a new password. Creating a secure password has never been so fun!<\/p>\n<p><a href=\"https:\/\/www.hostgator.com\/passwords\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-13118\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-02-at-4.40.38-PM.png\" alt=\"Password Generator\" width=\"813\" height=\"496\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-02-at-4.40.38-PM.png 813w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-02-at-4.40.38-PM-300x183.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-02-at-4.40.38-PM-768x469.png 768w\" sizes=\"(max-width: 813px) 100vw, 813px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>3. Backup regularly.<\/h2>\n<p><span style=\"font-weight: 400;\">In the case that anything does happen, you don\u2019t want to be stuck building your website over again from scratch. Make sure you back it up regularly, just like you do your own computer (you do backup your computer regularly, right?).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you use HostGator for your web hosting, then setting up automatic backups for your website is as easy as <\/span><a href=\"https:\/\/www.hostgator.com\/codeguard\"><span style=\"font-weight: 400;\">adding CodeGuard to your subscription<\/span><\/a><span style=\"font-weight: 400;\">. It not only makes backing up completely effortless since everything is automated, but restoring your site if the need ever arises is a simple process as well.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>4. Invest in a malware detector.<\/h2>\n<p><span style=\"font-weight: 400;\">Malware\u2019s extremely common, and <\/span><a href=\"http:\/\/www.makeuseof.com\/tag\/websites-likely-infect-malware\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">not just on the website\u2019s you\u2019d expect<\/span><\/a><span style=\"font-weight: 400;\">. Hackers have an interest in infecting any website that people are likely to visit. That means your website could be felled by malware, or (arguably) worse, it could be the means by which <\/span><a href=\"https:\/\/consumerist.com\/2016\/07\/20\/big-bunch-of-legitimate-business-websites-hijacked-to-deliver-you-bad-malware\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">malware infects your customers\u2019 computers<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your best move to avoid both scenarios is a <\/span><a href=\"https:\/\/www.hostgator.com\/sitelock\"><span style=\"font-weight: 400;\">strong malware detector<\/span><\/a><span style=\"font-weight: 400;\">. Anti-malware programs can spot malware fast and help you get rid of it before it has the chance to do much damage. They\u2019re relatively inexpensive when you consider the risks malware poses, and they&#8217;re not all that difficult to implement. Your web hosting platform might even offer one (like <a href=\"https:\/\/www.hostgator.com\/sitelock\">HostGator does<\/a>), which makes adding it to your web hosting plan and activating it especially easy to do.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>5. Be careful about your permissions.<\/h2>\n<p><span style=\"font-weight: 400;\">How many people have access to your website? Most businesses, even many on the smaller side, need to provide at least a couple of people with the means to access the website to make changes. Medium-sized and larger businesses will often have far more people accessing the website on a regular basis.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The more people you have in there making changes to the website, the more vulnerabilities you have. Chances are, not every person using your website needs the same level of access. By using your permissions wisely, you can limit the potential damage a thoughtless or malicious act by one of your employees or contractors can have.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>6. Set up SSL.<\/h2>\n<p><span style=\"font-weight: 400;\">If you have an ecommerce websites, purchasing an <\/span><a href=\"https:\/\/www.hostgator.com\/ssl-certificates\"><span style=\"font-weight: 400;\">SSL certificate<\/span><\/a><span style=\"font-weight: 400;\"> is not optional. Your customers need to know that your website is secure before they hand over sensitive information. An SSL certificate is the way you provide them that security. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">An SSL certificate isn\u2019t terribly expensive and ensures your websites shows a green HTTPS in the browser bar, which is what consumers look for to see that a website can be trusted. It adds an extra level of protection to ensure the details customers share with you are properly encrypted and can\u2019t be easily snatched up by cyber thieves.<\/span><\/p>\n<p><a href=\"https:\/\/www.hostgator.com\/ssl-certificates\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9267 size-full\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2014\/12\/comodo-social-banner-1.png\" alt=\"HostGator SSL Certificate\" width=\"600\" height=\"315\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2014\/12\/comodo-social-banner-1.png 600w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2014\/12\/comodo-social-banner-1-300x158.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>7. Use AVS and CVV.<\/h2>\n<p><span style=\"font-weight: 400;\">When you add an address verification system (AVS) and credit card verification value (CVV) field for all credit card checkouts, fraud attempts are far less likely to slip through. You have a chance to check the information a customer provides against the information their credit card company knows so people that have stolen credit card numbers alone won\u2019t get past your confirmation process. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>8. Reduce XSS vulnerabilities.<\/h2>\n<p><span style=\"font-weight: 400;\">This step gets really technical and you may want to consult with your webmaster or a cyber security consultant rather than try to handle this one on your own. <\/span><a href=\"https:\/\/paragonie.com\/blog\/2015\/06\/preventing-xss-vulnerabilities-in-php-everything-you-need-know\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">XSS (cross site scripting) vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> are weaknesses in the code you write that allow hackers to add code to your website that infects your visitors\u2019 devices. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To reduce XSS vulnerabilities, you need to validate and sanitize your data as described at the link above. You may also be able to insert <\/span><span style=\"font-weight: 400;\">this string<\/span><span style=\"font-weight: 400;\"> onto your webpages to reduce your vulnerability:<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">echo htmlentities($string, ENT_QUOTES | ENT_HTML5, &#8216;UTF-8&#8217;);<\/span><\/em><\/p>\n<p><span style=\"font-weight: 400;\">But that will only work for you if you\u2019re not using HTML. If you are using HTML, running your code through the <\/span><a href=\"http:\/\/htmlpurifier.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">HTML purifier<\/span><\/a><span style=\"font-weight: 400;\"> is your best alternative.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>9. Reduce SQL injection vulnerabilities.<\/h2>\n<p><span style=\"font-weight: 400;\">As with step 8, this step is probably more the job of a webmaster than a business owner, so ask for help if you find the suggestions confusing. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">SQL injection vulnerabilities aren\u2019t as common as XSS vulnerabilities, but they\u2019re still cause for concern. They allow hackers to get ahold of the sensitive data stored in your database   which often includes information like your customers\u2019 credit card numbers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of the best methods for prevention here are pretty technical and you can check out the <\/span><a href=\"https:\/\/www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">SQL Injection Cheat Sheet<\/span><\/a><span style=\"font-weight: 400;\"> for more detail on what each defense means. The main five defenses against SQL injections are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using parameterized queries to help your database distinguish the difference between code and data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using stored procedures that are clearly defined within the database and provided to users, rather than letting them enter their own.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Escaping user supplied input (which is only recommended in some cases), so the database knows to recognize any information users supply as different from SQL code written by the developer.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enacting least privilege   which relates back to step 5   to make sure users only have as much permission as they need and no more.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Employ white list input validation, which allows the database to detect any unauthorized input before processing it.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If your eyes just glazed over, you\u2019re not alone. If you don\u2019t understand this stuff, it\u2019s better to bring in someone who does so it gets done right.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>10. Use a DDoS mitigation service.<\/h2>\n<p><span style=\"font-weight: 400;\">Distributed denial of service (DDoS) attacks occur when a hacker sets a large number of compromised systems to flood the bandwidth of a website all at once. The server gets overwhelmed and starts to reject all visitors. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having a <\/span><a href=\"http:\/\/support.hostgator.com\/articles\/what-security-measures-are-used-to-protect-my-server\"><span style=\"font-weight: 400;\">web hosting provider that\u2019s put protective measures into place<\/span><\/a><span style=\"font-weight: 400;\"> is the first line of defense, but with how common DDoS attacks have become, making an additional investment in a DDoS mitigation service can further reduce your risk. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Hackers are constantly working to create new methods to get around these protections. In addition to putting these ten tips into effect, take some time throughout the year to read up on new security threats and best practices. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The stakes here are high   you need your customers to trust you and your website to consistently do its job. Make sure you treat website security as the priority it should be.<\/span><\/p>\n<p style=\"text-align: center;\"><strong>Keep your site secure with regular maintenance.<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Download our free\u00a0<a href=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/HostGatorWebsiteSecurityChecklist-1.pdf\">Website Security Checklist<\/a>.<\/strong><a href=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/HostGatorWebsiteSecurityChecklist-1.pdf\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13122 aligncenter\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Screen-Shot-2016-11-02-at-4.54.27-PM.png\" alt=\"Website Security Checklist\" width=\"255\" height=\"383\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent DDOS scare that affected a large number of websites brought to light how important it is to put&#8230;<\/p>\n","protected":false},"author":166,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-13114","post","type-post","status-publish","format-standard","hentry","category-web-and-hosting-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Website Security Checklist: How Secure is Your Site? | HostGator<\/title>\n<meta name=\"description\" content=\"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure Is Your Website? A Website Security Checklist\" \/>\n<meta property=\"og:description\" content=\"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-07T14:35:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-20T18:56:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\" \/>\n<meta name=\"author\" content=\"Kristen Hicks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/atxcopywriter\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristen Hicks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\"},\"author\":{\"name\":\"Kristen Hicks\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/9ab81f8120a12dcfbd7d2ab946dab0a5\"},\"headline\":\"How Secure Is Your Website? A Website Security Checklist\",\"datePublished\":\"2016-11-07T14:35:06+00:00\",\"dateModified\":\"2018-07-20T18:56:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\"},\"wordCount\":1524,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\",\"articleSection\":[\"Web Hosting Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\",\"name\":\"Website Security Checklist: How Secure is Your Site? | HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\",\"datePublished\":\"2016-11-07T14:35:06+00:00\",\"dateModified\":\"2018-07-20T18:56:13+00:00\",\"description\":\"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png\",\"width\":1200,\"height\":628,\"caption\":\"website safety check\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure Is Your Website? A Website Security Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/9ab81f8120a12dcfbd7d2ab946dab0a5\",\"name\":\"Kristen Hicks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/457ef8a7379a7f4f39d7810b58ef0a0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/457ef8a7379a7f4f39d7810b58ef0a0f?s=96&d=mm&r=g\",\"caption\":\"Kristen Hicks\"},\"description\":\"Kristen Hicks is an Austin-based freelance content writer and lifelong learner with an ongoing curiosity to learn new things. She uses that curiosity, combined with her experience as a freelance business owner, to write about subjects valuable to small business owners on the HostGator blog. You can find her on Twitter at @atxcopywriter.\",\"sameAs\":[\"http:\/\/austin-copywriter.com\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/atxcopywriter\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/khicks\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Website Security Checklist: How Secure is Your Site? | HostGator","description":"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/","og_locale":"en_US","og_type":"article","og_title":"How Secure Is Your Website? A Website Security Checklist","og_description":"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!","og_url":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2016-11-07T14:35:06+00:00","article_modified_time":"2018-07-20T18:56:13+00:00","og_image":[{"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png"}],"author":"Kristen Hicks","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/atxcopywriter","twitter_site":"@HostGator","twitter_misc":{"Written by":"Kristen Hicks","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/"},"author":{"name":"Kristen Hicks","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/9ab81f8120a12dcfbd7d2ab946dab0a5"},"headline":"How Secure Is Your Website? A Website Security Checklist","datePublished":"2016-11-07T14:35:06+00:00","dateModified":"2018-07-20T18:56:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/"},"wordCount":1524,"commentCount":1,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png","articleSection":["Web Hosting Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/","url":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/","name":"Website Security Checklist: How Secure is Your Site? | HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png","datePublished":"2016-11-07T14:35:06+00:00","dateModified":"2018-07-20T18:56:13+00:00","description":"Our free website security checklist covers the top 10 items you should be aware of to understand how secure your website is!","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/11\/Website-security-checklist.png","width":1200,"height":628,"caption":"website safety check"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/how-secure-is-your-website-free-website-security-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Secure Is Your Website? A Website Security Checklist"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/9ab81f8120a12dcfbd7d2ab946dab0a5","name":"Kristen Hicks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/457ef8a7379a7f4f39d7810b58ef0a0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/457ef8a7379a7f4f39d7810b58ef0a0f?s=96&d=mm&r=g","caption":"Kristen Hicks"},"description":"Kristen Hicks is an Austin-based freelance content writer and lifelong learner with an ongoing curiosity to learn new things. She uses that curiosity, combined with her experience as a freelance business owner, to write about subjects valuable to small business owners on the HostGator blog. You can find her on Twitter at @atxcopywriter.","sameAs":["http:\/\/austin-copywriter.com\/","https:\/\/x.com\/https:\/\/twitter.com\/atxcopywriter"],"url":"https:\/\/www.hostgator.com\/blog\/author\/khicks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/13114"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=13114"}],"version-history":[{"count":12,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/13114\/revisions"}],"predecessor-version":[{"id":19840,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/13114\/revisions\/19840"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=13114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=13114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=13114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}