Hardening your WordPress Installation

wppI have been using various forms of WordPress as my main blogging and website platform for several years now and am generally quite fond of it. It has taken me a while to feel comfortable with tweaking it, mainly because the defaults just do so much of the job that I don’t really need to be a WP expert.

Earlier this month I moved my main strominator.com blog from being hosted on WordPress.com to my own domain. It went surprisingly well, with just a few hiccups: my database file was nearing the limit of 8 MB which meant I had to split it up to get the entries imported. And it took about a day to reconstruct my full database of categories and labels.

Why bother moving it over? There are several alternatives to the free hosting on WP.com. GoDaddy offers WP hosting packages where they will even automatically update the WP software for you at the same price that they host a minimal server. I don’t recommend this option: WP updates happen frequently and many plug-ins stop working with the newer versions.

Another reason not to use GoDaddy hosting: its uptime isn’t what it could be. I use the service from Anturis to keep track of downtime, and it is quick and free to set this up

Speaking of plug-ins, that is the main reason for moving your blog to your own domain. You have full control over what you can install and how to fine-tune the site’s features. And while it is great to be able to add plug-ins, you need to realize that this also increases your attack surface area pretty substantially. The WP plug-in directory site currently lists 29,000 different ones. Some of them have been downloaded by millions of users and are quite useful, such as Akismet for blocking spam or Jetpack, which adds a number of features.

So like many other things in tech, freedom comes at a price of being more proactive about securing your servers. So before you consider a move to your own domain and be more motivated about securing your WP site, read this article by David Brumbaugh about WP as a secure apps platform over on Dice.

He suggests a number of things to do, including using the “Better WP Security” plug-in to get started. I downloaded this plug-in and found it amazingly comprehensive, and interesting in how many places that I had to tweak and adjust to make sure that my directories weren’t browsable, my defaults weren’t obvious, and other nips and tucks here and there. The screen shot above shows just the main dashboard display of “to-do” items to fix.

Security stories of the week

In my role as curator of the Dice Security Talent community, here are some of my favorite stories of the past week, including some follow-ups from the Target credit card breech that are worth looking at. And this story in the NY Times about what happened behind the scenes is also worth a closer read.

Favorite security stories of the week

My top security stories of the past week, as part of my efforts to curate the Dice Security Talent Community portal:

The forgotten desktops of Windows XP

XP Install screen

The intertubes have been filled with the stories about the coming demise of Windows XP. And I have to admit a certain fondness for the OS, after all, we have been together for 12 years and countless machines. Yes, there was Vista (briefly), and I am still getting used to Windows 7’s quirks just in time to find my way around 8.1. And I am not alone: Kaspersky claims nearly 20% of their current anti-virus customers still run XP. Time is running out, as we all know.

But what hasn’t be covered is what I call the forgotten desktop which runs XP. There are plenty of devices that aren’t actually sitting on anyone’s desk but are connected to your corporate network, and will need upgrading. When you start to look around, you can find them in some surprising places, such as point of sale terminals, ticket kiosks for trains and subway stations, medical equipment, displays at airports, bus stations and train stations, digital payphones, digital LED signage, video conference rooms, red light speed cameras, movie ticket kiosks, and supermarket self-checkout lanes (these have enough problems as is). Take a look at the collection chronicled in the Public Computer Error Board. I am sure you can think of other places XP might be lurking.

“This interconnected world can be a dangerous place when it’s built on an unsupported operating system that’s vulnerable to exploits or simple compatibility limitations,” says Justin Strong, a product marketing manger at Novell. And after all, who would know better than the folks who originally hooked up all these XP machines back in the day?

“IT departments are relieved if they’ve simply migrated their workforce off XP,” says Strong. But that’s not enough.Microsoft’s Craig Mundie at the Techonomy conference last year said, “Even one XP machine represents a major threat.” This is because XP can’t be hardened to avoid today’s threats and has many weaknesses. According to Microsoft,XP machines are six times more likely to be infected with malware than newer versions of Windows. Yikes.

I know many of you still have even Windows NT and 2000 running somewhere on your networks, and maybe even some Novell Netware too. Let’s make a clean sweep. And yes, I will miss XP, we have been through a lot.But it is time to move on.

Security stories of the week

In my work for Dice’s Security Talent Community, I track down the most interesting stories of the past week. Lots of questions in this batch:

SearchSecurity: The new breed of unified threat management tools

Unified threat management devices have traditionally been suited for small and medium-sized business networks. UTMs combine a number of essential technologies, including firewall, perimeter antimalware and antispam, VPN, Web content filtering and more, but historically have not been capable of handing the traffic load of a large enterprise network. Now, UTM vendors are integrating a host of new features in an attempt to become more competitive against other enterprise-grade security appliances.

You can watch the five minute screencast that I did for SearchSecurity here. I cover several different products, including Fortinet, Sophos, Checkpoint and Juniper.

Top security stories for the week

The latest and most interesting security stories of the past week, as culled for the portal of the Dice Security Talent Community page.

Most interesting security stories of the week

In my weekly efforts to keep up to date on the latest and greatest security stories for the Dice Security Talent Community, here they are:

FedTech magazine: Cisco’s ASA-5512-X review

dashboard betterTo better protect the enterprise network, organizations need stronger firewalls. Cisco Systems’ Adaptive Security Appliance 5512-X delivers a solid set of features to address those needs: Zero-day malware protection, application-aware software and integration with endpoint device control for end-to-end security.

You can read my review here for FedTech Magazine.

Network World: Mobile Device Manager Review

airwatch 2Mobile Device Managers (MDMs) make a lot of sense when you are trying to control whom can access your enterprise network and applications from particular phones and tablets. But to effectively evaluate these products, you should first consider what exactly are you trying to control: the apps on particular devices, the pairing of a user with his or her device, the device itself, or the collection of files on each device. Each MDM has a somewhat different perspective, and has strengths and weaknesses in terms of what it can control best.

In my review today for Network World, I looked at six different products: AirWatch (pictured above), Apperian’s EASE, BlackBerry’s Enterprise Server 10 (BES10), Divide, Fixmo, and Good Technology’s Good for Enterprise. No single MDM product won this review; all had serious flaws that would prevent them from being successfully deployed, depending on your circumstances.

The need for better mobile security is obvious: witness this story from last year about a hospital volunteer taking pictures of patient records with his phone and them selling them. Sadly, most current MDMs still wouldn’t be able to prevent something this overt.

The MDM arena is still pretty immature, akin to where the anti-virus world was decades ago. Security profiles are somewhat clunky to install and administer and some vendors don’t support vintage versions of iOS or Android. Topping this off: once you find phones that have been compromised, there is no easy way to return them back to a pristine condition, largely through the fault of the mobile OS vendors.

Expect to pay between $20 to $75 per user or per device per year, which can add up if you have a lot of phones to protect. Few vendors are transparent about their pricing (Airwatch and Blackberry are notable exceptions).

Good and BlackBerry do the best jobs of protecting your messaging infrastructure, so if that is the primary reason for picking an MDM product you should start with these two. Divide had the most appealing management console and overall simplest setup routines, and also supports licensing unlimited devices per user. And Apperian is great for corporations that have developed a large collection of their own apps and want a consistent set of security policies when deploying them.

You can see the full range of screenshots for my review in this deck.