{"id":623,"date":"2019-04-16T10:34:46","date_gmt":"2019-04-16T14:34:46","guid":{"rendered":"https:\/\/2019.asheville.wordcamp.org\/?post_type=wcb_session&#038;p=623"},"modified":"2019-06-09T14:02:56","modified_gmt":"2019-06-09T18:02:56","slug":"workshop-security-auditing-hardening","status":"publish","type":"wcb_session","link":"https:\/\/asheville.wordcamp.org\/2019\/session\/workshop-security-auditing-hardening\/","title":{"rendered":"Workshop: Security Auditing &amp; Hardening"},"content":{"rendered":"<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;You've worked hard to create your WordPress site; protect it.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">You&#8217;ve worked hard to create your WordPress site; protect it.<\/span><\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Takeaways:<\/span><\/p>\n<ul>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Brief overview of threats<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Security Checklist<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Discover \/ hide files exposing sensitive information<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Detect \/ remove vulnerable file backups that hackers can download<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Auditing users accounts<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Protect site from brute force login attacks<\/span><\/li>\n<li><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;- Brief overview of threats\\n- Security Checklist\\n- Discover \/ hide files exposing sensitive information\\n- Detect \/ remove vulnerable file backups that hackers can download\\n- Auditing users accounts\\n- Protect site from brute force login attacks\\n- How to reduce your security risks&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">How to reduce your security risks<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;ve worked hard to create your WordPress site; protect it. Takeaways: Brief overview of threats Security Checklist Discover \/ hide files exposing sensitive information Detect \/ remove vulnerable file backups that hackers can download Auditing users accounts Protect site from brute force login attacks How to reduce your security risks<\/p>\n","protected":false},"author":15332319,"featured_media":0,"template":"","meta":{"jetpack_post_was_ever_published":false,"_wcpt_session_time":1560089700,"_wcpt_session_duration":3000,"_wcpt_session_type":"session","_wcpt_session_slides":"https:\/\/sovstack\/wcavl19","_wcpt_session_video":"","_wcpt_speaker_id":[440],"footnotes":""},"session_track":[492848,174547,1254003],"session_category":[],"class_list":["post-623","wcb_session","type-wcb_session","status-publish","hentry","wcb_track-all-users","wcb_track-room-1","wcb_track-room-1-a"],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paxzwu-a3","session_date_time":{"date":"June 9, 2019","time":"10:15 am"},"session_speakers":[{"id":"440","slug":"steven-ayers","name":"Steven Ayers","link":"https:\/\/asheville.wordcamp.org\/2019\/speaker\/steven-ayers\/"}],"session_cats_rendered":null,"_links":{"self":[{"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/sessions\/623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/types\/wcb_session"}],"version-history":[{"count":1,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/sessions\/623\/revisions"}],"predecessor-version":[{"id":624,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/sessions\/623\/revisions\/624"}],"speakers":[{"embeddable":true,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/speakers\/440"}],"author":[{"embeddable":true,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wporg\/v1\/users\/sovstack"}],"wp:attachment":[{"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/media?parent=623"}],"wp:term":[{"taxonomy":"wcb_track","embeddable":true,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/session_track?post=623"},{"taxonomy":"wcb_session_category","embeddable":true,"href":"https:\/\/asheville.wordcamp.org\/2019\/wp-json\/wp\/v2\/session_category?post=623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}