After recovering hundreds of hacked WordPress sites, we see the same security mistakes over and over. Here are the most common — and how to fix each one right now.
Mistake 1: Using "admin" as Your Username
Every brute force bot on the internet tries "admin" first. If that's your administrator username, you've handed attackers half the puzzle.
Fix: Create a new admin user with a unique username. Log in with the new account and delete the old "admin" user (reassigning content to the new account).
Mistake 2: Weak or Reused Passwords
"Password123" or a password reused from another account is an open door. Credential stuffing attacks use leaked passwords from other breaches — attackers have lists of billions of real-world passwords.
Fix: Use a password manager. Generate a unique, 20+ character random password for your WordPress admin. Enforce this for all admin-level users.
Mistake 3: No Two-Factor Authentication
Even a strong password can be compromised via phishing or credential theft. 2FA means a stolen password alone isn't enough to break in.
Fix: Install a 2FA plugin (like WP 2FA or Google Authenticator) and enforce it for all administrator and editor accounts.
Mistake 4: Ignoring Plugin Updates
Every unpatched plugin is a potential entry point. Attackers run automated scans looking for sites running known-vulnerable plugin versions — often within hours of a CVE being published.
Fix: Update plugins regularly. For critical security updates, apply immediately. For other updates, test in a staging environment first, then deploy to live.
Mistake 5: Leaving Inactive Plugins & Themes Installed
Deactivated plugins still run code that can be exploited. Many users install plugins to test them, then deactivate — but not delete. Each one is a liability.
Fix: Delete any plugin or theme you're not actively using. There's no benefit to keeping them, only risk.
Mistake 6: No Backups (or Backups Stored on the Same Server)
When attackers compromise a server, they often corrupt or delete local backups. If your only backup is on the same server as your site, it's not a backup — it's a false sense of security.
Fix: Use a backup solution that stores copies offsite (Amazon S3, Google Drive, Dropbox). Run daily backups. Test restores quarterly.
Mistake 7: No Security Monitoring
Most hacked sites are infected for weeks or months before the owner notices. By then, the damage — blacklisting, SEO loss, customer exposure — is extensive.
Fix: Implement real-time malware scanning and file change monitoring. Automated alerts mean you know within minutes if something suspicious happens.
Related resources
Continue with the pages buyers usually visit next after reading this topic.
