{"id":237,"date":"2019-03-20T14:01:03","date_gmt":"2019-03-20T12:01:03","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=237"},"modified":"2020-05-31T01:38:06","modified_gmt":"2020-05-30T23:38:06","slug":"tips-to-protect-your-website-from-hackers","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/","title":{"rendered":"Tips To Protect Your Website From Hackers"},"content":{"rendered":"<p style=\"text-align: justify;\">There are many reasons for you to protect your website from hackers. If you have an eCommerce website then you would probably have already faced a hacking attempt. Hackers target even simple websites and you would not even guess the reason. You definitely need\u00a0website security.<\/p>\n<p style=\"text-align: justify;\">Hackers hack websites to:<\/p>\n<ul style=\"text-align: justify;\">\n<li>deface your website<\/li>\n<li>knock your website offline<\/li>\n<li>steal data from your website &#8211; user databases, financial records and other proprietary information. Malicious software could capture credit card details in real-time.<\/li>\n<li>hold your website to ransom (ransomware attack)<\/li>\n<li>use your server to relay webmail spam<\/li>\n<li>use your server to serve illegal files<\/li>\n<li>use your server as part of a botnet for distributed denial-of-service (DDoS) attacks<\/li>\n<li>use your server to mine for Bitcoins<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The repercussions of your website getting hacked are quite severe. The malware on your website could steal the data, and hackers could sell it on the dark web or use it for malicious activities. The malware needed to compromise websites is also available as attack-for-hire services. This allows even those users without significant Internet skills to attack and cripple or compromise your website.<\/p>\n<div style=\"text-align: justify;\">\n<h2>10 Security Steps to Protect Your Website From Hackers<\/h2>\n<div>\n<div>\n<ul>\n<li>Updated Software<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Protection Against Cross-Site Scripting (XSS) Attacks<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>SQL injection attacks<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Double Validation of Form Data<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>File Upload Policy<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Use a Hosting Provider<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Firewall<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Separate Database Server<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Ensure Https Security<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div>\n<div>\n<ul>\n<li>Password Policy<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\"><strong>Updated Software<\/strong>\u00a0&#8211; You must always keep the operating system software, other application software (such as a content management system), the antimalware solution and the\u00a0website security\u00a0solution updated with the latest patches and definitions. Your hosting provider must also keep their software updated \u2013 however that control is not in your hands. You must choose a hosting provider who maintains a reputation for providing effective security.<\/p>\n<p style=\"text-align: justify;\"><strong>Protection Against Cross-Site Scripting (XSS) Attacks<\/strong>\u00a0&#8211; Hackers can inject malicious JavaScript into your pages, and change the content, and when users access your webpages their credentials and login cookie details would get stolen. You must not allow any injection of active JavaScript content into your webpages, so as to ensure\u00a0website security.<\/p>\n<p style=\"text-align: justify;\"><strong>SQL injection attacks<\/strong>\u00a0&#8211; you must always use parameterized queries and avoid standard Transact SQL as this would allow hackers to insert rogue code.<\/p>\n<p style=\"text-align: justify;\"><strong>Double Validation of Form Data<\/strong>\u00a0&#8211; it is advisable to perform both browser and server-side validation. The two-level validation process would help block insertion of malicious scripts through data accepting form fields.<\/p>\n<p style=\"text-align: justify;\"><strong>File Upload Policy<\/strong>\u00a0&#8211; based on your business requirement you may need to allow users\/ website visitors to upload files or images to your webserver. Hackers could upload malicious content to compromise your website. The image, in reality, could be malware (double extension attacks). You must allow upload of files only with extreme caution. You must remove executable permissions for the file so that it cannot be executed, in order to ensure\u00a0website security.<\/p>\n<p style=\"text-align: justify;\"><strong>Use a Hosting Provider<\/strong>\u00a0&#8211; Hosting your website with a hosting provider frees you from much of the\u00a0website security\u00a0risk burden, as they would take care of the\u00a0website security\u00a0for the webserver.<\/p>\n<p style=\"text-align: justify;\"><strong>Firewall<\/strong>\u00a0&#8211; When you maintain your own webserver you must employ a robust firewall and restrict outside access only to the ports &#8211; 80 and 443.<\/p>\n<p style=\"text-align: justify;\"><strong>Separate Database Server<\/strong>\u00a0&#8211; If you can afford, then it would be advisable to maintain separate database server and webservers, as it offers better security to the data.<\/p>\n<p style=\"text-align: justify;\"><strong>Ensure Https Security<\/strong>\u00a0&#8211; Always use Https for your entire website. This would ensure that users do not communicate with fraudulent servers.<\/p>\n<p style=\"text-align: justify;\"><strong>Password Policy<\/strong>\u00a0&#8211; Implement rigorous password policies and ensure that they are followed. Educate all users on the importance of strong passwords. Follow recommended password length of more than 8 characters with a mix of upper and lower case alphabets, numerals and special characters. Do not use dictionary words. The longer the password, the stronger is the\u00a0website security.<\/p>\n<p style=\"text-align: justify;\">If you need to store passwords for user authentication, ensure that you always store them in encrypted form. Use a hashing algorithm, and also salt the hash to make it more secure.<\/p>\n<p style=\"text-align: justify;\"><strong>Website Security\u00a0Tools<\/strong>\u00a0&#8211; These are absolutely necessary, as it is manually impossible to monitor and manage\u00a0<a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/tips-to-protect-your-website-from-hackers\/#\">website security<\/a>. There are numerous free as well as paid tools. Further, there is the option of using tools that you can manage, as well as, tools being offered as Security-as-a-Service (SaaS) models.<\/p>\n<p style=\"text-align: justify;\">The Comodo cWatch Web is a Managed Security Service (MSS) operating in a Security-as-a-Service (SaaS) model. It is a fully managed complete web security solution that includes a managed web application firewall, DDoS protection, bot protection, SIEM threat detection, caching real content delivery network, daily malware &amp; vulnerability scan and website acceleration. Additionally, it offers free instant malware removal, website hack repair, full blacklist removal and vulnerability removal through its 24\/7 cyber security operation center.<\/p>\n<p style=\"text-align: justify;\">The Comodo cWatch Web contains unique sophisticated web security features that are not available in other\u00a0website security tools.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many reasons for you to protect your website from hackers. If you have an eCommerce website then you would probably have already faced a hacking attempt. Hackers target even simple websites and you would not even guess the reason. You definitely need\u00a0website security. Hackers hack websites to: deface your website knock your website offline steal data from your website &#8211; user databases, financial records and other proprietary information. Malicious software could capture credit card details in real-time. hold your website to ransom (ransomware attack) use your server to relay webmail spam use your server to serve illegal files\u2026<\/p>\n","protected":false},"author":3,"featured_media":238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tips To Protect Your Website From Hackers - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tips To Protect Your Website From Hackers - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"There are many reasons for you to protect your website from hackers. If you have an eCommerce website then you would probably have already faced a hacking attempt. Hackers target even simple websites and you would not even guess the reason. You definitely need\u00a0website security. Hackers hack websites to: deface your website knock your website offline steal data from your website &#8211; user databases, financial records and other proprietary information. Malicious software could capture credit card details in real-time. hold your website to ransom (ransomware attack) use your server to relay webmail spam use your server to serve illegal files\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-20T12:01:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:38:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"634\" \/>\n\t<meta property=\"og:image:height\" content=\"423\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"Tips To Protect Your Website From Hackers\",\"datePublished\":\"2019-03-20T12:01:03+00:00\",\"dateModified\":\"2020-05-30T23:38:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/\"},\"wordCount\":821,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/4497651D00000578-0-image-a-32_1506092528889.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/\",\"name\":\"Tips To Protect Your Website From Hackers - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/4497651D00000578-0-image-a-32_1506092528889.jpg\",\"datePublished\":\"2019-03-20T12:01:03+00:00\",\"dateModified\":\"2020-05-30T23:38:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/4497651D00000578-0-image-a-32_1506092528889.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/4497651D00000578-0-image-a-32_1506092528889.jpg\",\"width\":634,\"height\":423},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/tips-to-protect-your-website-from-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips To Protect Your Website From Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips To Protect Your Website From Hackers - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Tips To Protect Your Website From Hackers - MozDomains Blog","og_description":"There are many reasons for you to protect your website from hackers. If you have an eCommerce website then you would probably have already faced a hacking attempt. Hackers target even simple websites and you would not even guess the reason. You definitely need\u00a0website security. Hackers hack websites to: deface your website knock your website offline steal data from your website &#8211; user databases, financial records and other proprietary information. Malicious software could capture credit card details in real-time. hold your website to ransom (ransomware attack) use your server to relay webmail spam use your server to serve illegal files\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-20T12:01:03+00:00","article_modified_time":"2020-05-30T23:38:06+00:00","og_image":[{"width":634,"height":423,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"Tips To Protect Your Website From Hackers","datePublished":"2019-03-20T12:01:03+00:00","dateModified":"2020-05-30T23:38:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/"},"wordCount":821,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/","name":"Tips To Protect Your Website From Hackers - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg","datePublished":"2019-03-20T12:01:03+00:00","dateModified":"2020-05-30T23:38:06+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/4497651D00000578-0-image-a-32_1506092528889.jpg","width":634,"height":423},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/tips-to-protect-your-website-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Tips To Protect Your Website From Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/238"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}