9. it is easy to forget that many elements in WordPress (such as unsafe themes, plug-ins and other component themes, plug-ins) may potentially damage the site. All vulnerabilities in this list can be caused by incorrectly coded topics or plug-ins, so it is important to extend the problem to the tool in use. Fortunately, the plug-ins and themes in the word press directory have been checked for quality, so there will be no problems. However, this quality assurance is incomplete. It is recommended to use wpscan’s vulnerability database and other sites to conduct a thorough self-examination before installing the tool on the site. In order to increase inner peace, WordPress also monitors the included libraries and frameworks for malicious use. In some cases, third-party tools are patched to protect users. 10. inadequate recording and monitoring of the website and data our ultimate weakness may cause harm to the website, but in fact it is not a direct malicious use. If you become a victim of one of the above vulnerabilities, if you do not monitor and record what happens on the site, you may not be able to identify it. This may lead to more malicious attacks on the site and undermine trust in the user base. This is the topic we discussed when discussing how to comply with general data protection regulations (gdpr). Finally, priority should be given to the use of high-quality security log plug-ins, such as WP security audit log. The plug-in should record almost all tasks performed on the website and become the central component of common security routines. In short, if a task looks inappropriate in the log, a thorough investigation can reveal a malicious exploit. In other words, it can be handled before the disaster occurs. Conclusion security is the most important for all webmasters. However, it may be difficult to know the areas that need the most attention. If you choose improperly, it may bring serious consequences to you and users. OWASP plans to be rescued from this front because it generates an annual report classifying the top 10 vulnerabilities that the organization needs to pay attention to. For WordPress users, you can use plug-ins such as wordfence and WP security audit logs to control many of these risks. Others (for example, not using unsafe themes and plug-ins) are entirely up to you and your conscience. Either party should continue to pay attention to the monitoring of these security risks. Do you have any questions about the top 10 security vulnerabilities and their impact on users? Please let us know in the comments section below! Recommended picture: tantetati.