{"id":50228,"date":"2022-11-02T21:04:09","date_gmt":"2022-11-02T11:04:09","guid":{"rendered":"https:\/\/mardilowe.com.au\/?p=50228"},"modified":"2022-11-15T14:56:30","modified_gmt":"2022-11-15T04:56:30","slug":"common-reasons-why-wordpress-websites-are-hacked","status":"publish","type":"post","link":"https:\/\/mardilowe.com.au\/common-reasons-why-wordpress-websites-are-hacked\/","title":{"rendered":"4 common reasons why WordPress websites are hacked"},"content":{"rendered":"

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.10.7″ _module_preset=”default” background_color=”#f7f7f7″ background_image=”https:\/\/mardilowe.com.au\/wp-content\/uploads\/2020\/09\/background-1.jpg” background_enable_image=”off” custom_margin=”||||false|false” custom_padding=”150px||0px||false|false” custom_padding_tablet=”0px||40px||false|false” custom_padding_phone=”” bottom_divider_color=”#FFFFFF” bottom_divider_height=”75px” bottom_divider_flip=”vertical|horizontal” bottom_divider_height_tablet=”50px” bottom_divider_height_phone=”25px” bottom_divider_height_last_edited=”on|phone” global_module=”49840″ saved_tabs=”all” global_colors_info=”{}”][et_pb_row custom_padding_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ custom_margin_tablet=”75px||||false|false” custom_margin_phone=”50px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”75px||||false|false” custom_padding_tablet=”0px||30px||false|false” custom_padding_phone=”0px||0px||false|false” z_index_tablet=”0″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_post_title author=”off” date=”off” comments=”off” featured_image=”off” _builder_version=”4.16″ _module_preset=”default” title_font=”Chloe||||||||” title_text_align=”left” title_font_size=”50px” meta_font=”|700||on|||||” meta_text_color=”#d1b1b1″ meta_letter_spacing=”1px” background_enable_color=”off” background_enable_image=”off” title_font_size_tablet=”40px” title_font_size_phone=”30px” title_font_size_last_edited=”on|phone” global_colors_info=”{}”][\/et_pb_post_title][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ custom_padding=”60px||||false|false” custom_padding_tablet=”50px||||false|false” custom_padding_phone=”40px||||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”850px” custom_padding=”10px||0px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.18.1″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ max_width=”850px” module_alignment=”center” z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”]<\/p>\n

Having your website hacked and out of action is never going to be ideal. Website downtime not only looks terrible for your brand’s reputation but usually results in missing potential leads or loss of orders if your site is e-commerce based.<\/p>\n

On a small scale a breach in your site’s security results in the annoying cost of having a website developer remove the malware. However, depending on the size and nature of your business a cyber attack can lead to more serious implications like corrupt data, serious financial loss and liability to third parties.<\/p>\n

40% of all websites are run on WordPress- due to the platform’s popularity hackers are able to cause damage to a larger pool of websites. These peskie hackers don\u2019t discriminate either, businesses of any size who use WordPress are susceptible to a hacking incident if they aren\u2019t taking the right steps to prevent it.<\/p>\n

You might be thinking \u201cwhy would anyone want to hack my website?\u201d or \u201cwhat would a hacker gain from hacking a website like mine?\u201d First of all it’s not you, your business or your site, they are targeting the software you use. They will look for common vulnerabilities and execute hacks on a larger scale and hope this succeeds, and when it does it provides them with a way to keep repeating this method on other websites.<\/p>\n

Out of all cyber attacks, 43% are aimed at small businesses and only 14% of these businesses are prepared. While you may never experience a cyberattack yourself (and sometimes you may never even know you have been attacked!) it is a good idea to understand why hackings occur and how to prevent it from happening to you.<\/p>\n

Here are 4 common reasons why your WordPress website could are hacked:<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.1″ _module_preset=”e8e4ab21-43f6-4421-b910-49655cdf4ed1″ global_colors_info=”{}”]<\/p>\n

1. Financial gain<\/h2>\n

This is a pretty obvious one, hackers will hold your website ransom by either shutting you out or blocking your website from being active until you pay them a fee. This fee could range from a few hundred dollars to well into the thousands depending on the size of your organisation.<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.1″ _module_preset=”e8e4ab21-43f6-4421-b910-49655cdf4ed1″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”]<\/p>\n

2. Steal sensitive data<\/h2>\n

This is probably the most serious threat to your business, especially if you store confidential customer data such as payment or contact details. You are liable when it comes to protecting your customer’s precious data and if this data is leaked it not only a major headache but potentially result in legal consequences.<\/p>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.1″ _module_preset=”e8e4ab21-43f6-4421-b910-49655cdf4ed1″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”]<\/p>\n

3. SEO spam<\/h2>\n

A practice where the hacker will introduce spam content to your website and this can appear in many different forms such as;<\/p>\n