Use unique, strong passwords for all admin accounts — CMS, hosting control panel, and database.
Website Security & Backup
Most sites are compromised not by sophisticated hackers but by automated bots exploiting predictable gaps — outdated plugins, reused passwords, and backups that have never been tested. This checklist covers every defensive layer, from access control through verified disaster recovery. For more background and examples, see the guidance below; for built-in tools and options, use the quick tools guide.
Checklist Items
0 done•17 left•3 of 4 sections collapsed
Enable two-factor authentication (2FA) on every admin account.
Implement login attempt limiting and, for WordPress, relocate or protect the admin login URL.
Apply the principle of least privilege — assign each user only the permissions they actually need.
Audit and remove unused admin accounts, API keys, and third-party service integrations.
🚨 What Actually Happens After Your Site Is Compromised
The visible damage — a defaced homepage or an unexpected visitor redirect — is rarely the full story. The cascade of consequences following a successful compromise can persist for months after the malware itself is cleaned, hitting rankings, deliverability, and customer trust simultaneously.
⚠️ Google Safe Browsing blacklist
When Google's crawlers detect malware distribution or phishing content on a domain, it is added to the Safe Browsing database. Chrome, Firefox, and Safari then display a full-screen "Deceptive site ahead" interstitial to every visitor. Organic traffic typically drops 90%+ within days. Removal requires submitting a manual review in Google Search Console after cleaning the site — a process taking 1–4 weeks with no guaranteed timeline, even when the site is fully remediated.
⚠️ Hosting suspension and IP reputation damage
Hosting providers automatically suspend accounts detected distributing malware or sending spam — usually without advance notice, and often at 3am when no one is watching. Beyond the site going offline, the server's IP address may be listed on email reputation blacklists (Spamhaus, Barracuda), disrupting outbound email deliverability for every site sharing that IP. IP reputation recovery is measured in weeks to months, independent of whether the malware has been removed.
🔍 How to Evaluate a Plugin Before You Install It
Installing a WordPress plugin is effectively granting that code full execution access to your database and file system. The plugin repository surfaces several signals that help you filter out risky options — most site owners simply do not check them.
Check the last updated date
A plugin untouched for 12+ months likely hasn't been reviewed against current WordPress versions or recent PHP releases. The repository displays a banner when a plugin has not been tested with the last three major WordPress versions — treat that warning as a stop sign, not a suggestion.
Review the support forum before installing
Active install counts signal popularity; support forum behavior signals reliability. A developer who consistently responds within a few days is far more likely to release security patches promptly when a CVE is discovered. Scan the most recent threads before installing — patterns of unresolved critical bugs are a clear warning sign.
Search the WPScan vulnerability database
WPScan (wpscan.com/plugins) maintains a searchable record of known WordPress plugin vulnerabilities with CVE details and patch timelines. A plugin with a history of slowly patched or unresolved CVEs is a liability regardless of its star rating or install count. This takes 30 seconds and is worth doing for every new plugin.
Prefer commercially supported plugins for high-stakes functions
For payment processing, membership gating, or complex form handling — where a vulnerability has the greatest real-world impact — commercially supported plugins (WooCommerce, Gravity Forms, MemberPress) with dedicated security teams and structured release processes are worth the cost over free alternatives maintained by solo developers with no SLA.
💰 Shared Hosting vs. Managed WordPress — What the Price Difference Actually Buys
Your hosting environment determines which security responsibilities are handled at the infrastructure level and which fall entirely to you. The practical difference is significant.
Shared Hosting (~$3–12/month)
You own: plugin and theme updates, backup configuration, WAF setup, SSL installation, file permission management, and security plugin selection. The host manages physical hardware, server OS patching, and network infrastructure — nothing at the application layer is touched.
⚠️ This checklist is most critical for shared hosting users. Account isolation quality varies significantly between providers; a compromised neighbor on the same physical server can occasionally affect shared resources.
Managed WordPress (~$25–100+/month)
Hosts like WP Engine, Kinsta, and Flywheel handle server-level WAF and DDoS protection, automatic daily backups with one-click restore, WordPress core auto-updates, staging environments, and malware cleanup guarantees — Kinsta and WP Engine will remediate infections at no additional cost if a compromise occurs.
✅ You still own plugin selection, user permissions, and application-level credentials. But for a business-critical site, the monthly managed hosting cost is typically less than a single hour of emergency developer billing during an incident.
📝 When Personal Data Is Exposed: Legal Obligations Most Site Owners Miss
If your site collects any personal data from visitors in the EU — contact form submissions, newsletter signups, customer accounts — a breach that exposes that data triggers GDPR notification requirements, regardless of where your business is physically located.
72-hour notification window: Under GDPR Article 33, you must notify your relevant supervisory authority within 72 hours of becoming aware of a personal data breach. The clock starts at the moment of discovery, not when the breach first occurred — and "becoming aware" has been interpreted broadly by regulators.
Direct user notification threshold: When a breach is likely to result in high risk to affected individuals — exposed passwords, financial information, health data — you must notify those users directly and individually, typically via email. A generic site-wide announcement or banner does not satisfy this requirement.
Internal breach log (mandatory regardless): Even breaches that fall below the formal notification threshold must be documented internally — what occurred, what categories of data were involved, the estimated number of affected individuals, and the remediation steps taken. This log must be made available to your supervisory authority on request at any time.
💡 Add a data breach response section to your disaster recovery plan before you need it. Who drafts the notification, what it says, and who approves it should be decided during calm, not during an active incident.
🧮 The 3-2-1 Backup Rule Applied to Websites
The 3-2-1 rule — 3 copies of data, on 2 different storage media, with 1 copy in a logically separate location — is the standard framework in enterprise data protection. Here is what each number means for a website specifically.
3
Copies
Live site + a recent backup + a significantly older backup — giving you a copy that predates any potential silent compromise that began weeks ago
2
Storage Types
Primary cloud storage + a second independent provider or physical copy — not two folders within the same cloud account, which shares identical credential risk
1
Offsite Copy
At least one copy is logically isolated — your hosting credentials must not be able to delete it, and a full account compromise should not be able to reach it
The nuance that matters most in practice: the second backup destination must use entirely separate credentials — a different email address and password from your hosting account. If both the hosting account and the backup destination share credentials, a single compromised login loses everything simultaneously. This is the most common backup architecture mistake for self-managed WordPress sites.
Master This Checklist Quickly
Every important button and option for this pre-made checklist, shown in a glance-friendly format.
Start Here
- 1
Click any item row to mark it complete.
- 2
Use the note row under each item for quick notes.
- 3
Use the tool row for undo, redo, reset, and check all.
- 4
Use Save Progress when you want to continue later.
Checklist Row Tools
Top Action Buttons
Share
Open all sharing and export options in one menu.
Add & Ask
Open one menu for apps and AI guidance.
Copy and customize
Create a new editable checklist pre-filled with your chosen content.
Save Progress
Adds this checklist to My Checklists and keeps your progress in this browser.
Most Natural Usage
Track over time
Check items -> Add notes where needed -> Save Progress
Send or export
Open Share -> Choose format -> Continue
Make your own version
Copy and customize -> Open create page -> Edit freely
Checklistify
Free Printable Checklists
Website Security & Backup
Most sites are compromised not by sophisticated hackers but by automated bots exploiting predictable gaps — outdated plugins, reused passwords, and backups that have never been tested. This checklist covers every defensive layer, from access control through verified disaster recovery.
Access Control — The First Line of Defense
Software and Server Hardening
Backup and Recovery
Monitoring and Visibility
Additional Notes
Use this space for follow-ups, reminders, and key references.
