{"id":14281,"date":"2019-02-04T15:44:04","date_gmt":"2019-02-04T14:44:04","guid":{"rendered":"https:\/\/names.co.uk\/blog\/?p=14281"},"modified":"2019-02-04T15:44:04","modified_gmt":"2019-02-04T14:44:04","slug":"5-steps-to-keeping-your-drupal-site-secure","status":"publish","type":"post","link":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/","title":{"rendered":"5 steps to keeping your Drupal site secure"},"content":{"rendered":"<p>Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying frameworks are made more secure. Drupal is known to be one of the most efficient platforms available to the industry. Its core values are based upon best practices and its testing, debugging and support network are known to be particularly proactive. All of these factors serve to minimise any Drupal security exposure and, in part, account for the platform&#8217;s stability and growth.<\/p>\n<p>Ideally, Drupal security should be handled by a suitable expert but whether you engage someone or decide to manage it yourself, the following are 5 essential steps in protecting your business.<\/p>\n<h2>Run regular security updates and platform upgrades<\/h2>\n<p>Keep Drupal updated by installing all the available security updates and patches on a regular basis. Upgrading to the latest version is usually best practice for any software application. An out-of-date version is almost invariably more vulnerable to any security breaches. An upgrade will also correct any bugs or other technical faults while providing better functionality. The latest version of Drupal can always be downloaded from <a href=\"https:\/\/www.drupal.org\/\" target=\"_blank\" rel=\"noopener\">drupal.org<\/a>.<\/p>\n<h2>Choose strong usernames and passwords<\/h2>\n<p>This is another simple measure that should be applied to all online accounts but is so often overlooked. Avoid obvious usernames and weak passwords. Brute force attack bots are constantly crawling the internet and nobody should be exposed simply as a result of the use of weak usernames and passwords.<\/p>\n<h2>Implement valid SSL Certificates and more secure HTTP headers<\/h2>\n<p>Working over a secure internet connection helps to protect sensitive data such as payment and personal information, in addition to protecting user login details. Usernames and passwords will be transported over the internet in plain text if there is no HTTPS connection \/ <a href=\"https:\/\/www.names.co.uk\/ssl\" target=\"_blank\" rel=\"noopener\">SSL Certificate<\/a> in place, creating an obvious security risk.<\/p>\n<p>By opting for HTTPS, you further protect your Drupal system and its users, ensuring that day-to-day information is transmitted securely. Following upgrades to the major browsers over the last year or so, any sites not using SSL are likely to be displayed with severe security warnings, discouraging visors from using them and making SSL all but mandatory for a professional site.<\/p>\n<h2>Take regular system backups<\/h2>\n<p>A professional hosting provider will offer sufficient data storage and backup solutions that can recover and restore any lost data, in the event of any unfortunate security breaches or technical problems. This is essential for any site which captures and uses data in any form.<\/p>\n<h2>Effective user management and reputable hosting<\/h2>\n<p>In some organisations, internal security breaches are a greater threat than external. Limiting user access and removing redundant accounts are critical steps in Drupal Security. Any temporary access should be removed as soon it is no longer required and all account privileges should be reviewed on a regular basis.<\/p>\n<p>It is also crucial to use a reputable hosting provider who can provide security measures in support of these 5 key steps. Professional hosting providers will also minimise the overall attack surface and provide protection from DDoS and other external threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying frameworks are made more secure. Drupal is known&#8230; <a class=\"more-link\" href=\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":17,"featured_media":14261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[176,1596],"tags":[],"class_list":["post-14281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips-and-tricks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 steps to keeping your Drupal site secure<\/title>\n<meta name=\"description\" content=\"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 steps to keeping your Drupal site secure\" \/>\n<meta property=\"og:description\" content=\"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"names.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/namesco\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-04T14:44:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Namesco\" \/>\n<meta name=\"twitter:site\" content=\"@Namesco\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\"},\"author\":{\"name\":\"Nathan\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"headline\":\"5 steps to keeping your Drupal site secure\",\"datePublished\":\"2019-02-04T14:44:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\"},\"wordCount\":516,\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"articleSection\":[\"Security\",\"Tips &amp; Tricks\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\",\"url\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\",\"name\":\"5 steps to keeping your Drupal site secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"datePublished\":\"2019-02-04T14:44:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\"},\"description\":\"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage\",\"url\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"contentUrl\":\"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png\",\"width\":945,\"height\":425,\"caption\":\"What is an SSL Certificate?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"names.co.uk\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.names.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.names.co.uk\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"5 steps to keeping your Drupal site secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.names.co.uk\/blog\/\",\"name\":\"names.co.uk blog\",\"description\":\"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471\",\"name\":\"Nathan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g\",\"caption\":\"Nathan\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.\",\"url\":\"https:\/\/www.names.co.uk\/blog\/author\/nathan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 steps to keeping your Drupal site secure","description":"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/","og_locale":"en_GB","og_type":"article","og_title":"5 steps to keeping your Drupal site secure","og_description":"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.","og_url":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/","og_site_name":"names.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/namesco\/","article_published_time":"2019-02-04T14:44:04+00:00","og_image":[{"width":945,"height":425,"url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","type":"image\/png"}],"author":"Nathan","twitter_card":"summary_large_image","twitter_creator":"@Namesco","twitter_site":"@Namesco","twitter_misc":{"Written by":"Nathan","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#article","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/"},"author":{"name":"Nathan","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"headline":"5 steps to keeping your Drupal site secure","datePublished":"2019-02-04T14:44:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/"},"wordCount":516,"image":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","articleSection":["Security","Tips &amp; Tricks"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/","url":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/","name":"5 steps to keeping your Drupal site secure","isPartOf":{"@id":"https:\/\/www.names.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","datePublished":"2019-02-04T14:44:04+00:00","author":{"@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471"},"description":"Security violations associated with software applications are an on-going threat in the digital world. The risk can be reduced if the underlying Security violations associated with software applications are an on-going threat. The risk can be reduced if the underlying frameworks are made more secure.","breadcrumb":{"@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#primaryimage","url":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","contentUrl":"https:\/\/www.names.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Your-online-security.png","width":945,"height":425,"caption":"What is an SSL Certificate?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.names.co.uk\/blog\/5-steps-to-keeping-your-drupal-site-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"names.co.uk","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.names.co.uk\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.names.co.uk\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"5 steps to keeping your Drupal site secure"}]},{"@type":"WebSite","@id":"https:\/\/www.names.co.uk\/blog\/#website","url":"https:\/\/www.names.co.uk\/blog\/","name":"names.co.uk blog","description":"Welcome to the names.co.uk blog where we talk about domain names, web hosting, online shops, website builders and lots of other cool web related stuff.  Stick around for offers and competition news too!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.names.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/c4a24823b87b0d365a83bb36d095d471","name":"Nathan","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.names.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b849f2ae94026a2583ec808f66065701dbebe5ca9a87e51fab1269f2853c4a71?s=96&d=mm&r=g","caption":"Nathan"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential. In his free time, he can often be found on a train travelling around the beautiful British countryside, or curled up on the sofa at home reading a good book.","url":"https:\/\/www.names.co.uk\/blog\/author\/nathan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=14281"}],"version-history":[{"count":2,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14281\/revisions"}],"predecessor-version":[{"id":14285,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/posts\/14281\/revisions\/14285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media\/14261"}],"wp:attachment":[{"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=14281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=14281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.names.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=14281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}