The end of 2021 and the beginning of 2022 saw some big security vulnerabilities in the open-source space, including log4j – something that prompted people all over the world to consider: what should we do about open-source software, contributors, and…
Quick Quiz: What Type of WordPress Hosting do you need – Managed vs unmanaged hosting? 1. Are you more of a (a) Do-it-yourself (DIY) type or b) Plug-and-play kind of person? 2. Do you usually (a) go with the flow…
We’re thrilled to announce the public availability of WordPress Toolkit 4.1. Due to the large amount of changes under the hood, we needed more time to ensure everything works. However, good things come to those who wait because here it…
Different files and directories in Linux-based file system use permissions to indicate who and what can read, write, modify and access them. WordPress file permissions matter because it might want access to write to files in your wp-content directory. Permission…
Older versions of WordPress make all posts vulnerable to cross-site scripting. But the cross-site scripting vulnerability in WordPress is a thing of the past now since the release of v5.1.1. The WordPress team have introduced several fixes in this new…
Your needs come first so rest assured that we’re constantly evolving Plesk to bring you more value. Hence, the release of WordPress Toolkit 3.5, introducing an assortment of new security measures, a reimagined installation experience and more. Read on for…
With so many websites relying on WordPress it’s no surprise that millions of website owners are out looking for the best ways to secure their WordPress sites. The widespread prevalence of WordPress also makes it a target for hackers, with…
We all know that WordPress has historically been very vulnerable to hacks of all sorts. So most good web hosts will practice good WordPress security measures to avoid falling victim to hacking. However, it can be hard to keep track…