{"id":31874,"date":"2024-03-24T06:59:51","date_gmt":"2024-03-24T04:59:51","guid":{"rendered":"https:\/\/www.r5m.org\/?p=31874"},"modified":"2024-03-24T12:59:18","modified_gmt":"2024-03-24T10:59:18","slug":"die-top-massnahmen-zur-sicherung-eines-onlineshops-vor-hackern","status":"publish","type":"post","link":"https:\/\/www.r5m.org\/en\/die-top-massnahmen-zur-sicherung-eines-onlineshops-vor-hackern\/","title":{"rendered":"The top measures to secure an online shop from hackers"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:hsla(var(--awb-color2-h),var(--awb-color2-s),var(--awb-color2-l),calc( var(--awb-color2-a) - 10% ));\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">online shop threats<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:hsla(var(--awb-color2-h),var(--awb-color2-s),var(--awb-color2-l),calc( var(--awb-color2-a) - 10% ));\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p>Today&#039;s digital world brings you many advantages as an entrepreneur, especially if you run an online store. However, you should also be aware of the increasing risk of malicious code and unauthorized access. In this blog post, we will introduce you to the best measures to effectively protect your online store from these threats. We will focus in particular on WordPress and WooCommerce, as these platforms are widely used and therefore increasingly targeted by cyber criminals.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><ol>\n<li><strong> Change your WordPress login URL:<\/strong><\/li>\n<\/ol>\n<p>Einer der grundlegenden Schritte zur Absicherung Ihres Onlineshops ist die \u00c4nderung der URL f\u00fcr den WordPress-Login. Normalerweise lautet die URL &#8222;ihredomain.de\/wp-admin&#8220;. Indem Sie diese URL \u00e4ndern, erschweren Sie es potenziellen Angreifern, den Login-Bereich zu finden.<\/p>\n<ol start=\"2\">\n<li><strong> Avoid common usernames and email addresses:<\/strong><\/li>\n<\/ol>\n<p>Die Verwendung von Benutzernamen wie &#8222;ADMIN&#8220; oder weit verbreiteten E-Mail-Adressen wie &#8222;info@&#8230;&#8220; ist eine Einladung f\u00fcr Hacker. W\u00e4hlen Sie stattdessen einzigartige Benutzernamen und meiden Sie E-Mail-Adressen, die leicht zu erraten sind.<\/p>\n<ol start=\"3\">\n<li><strong> Implement two-factor authentication:<\/strong><\/li>\n<\/ol>\n<p>Two-factor authentication (2FA) provides an additional layer of security for your login area. Plugins like those from MiniOrange allow you to connect 2FA with Google Authenticator or Microsoft Authenticator. This means an attacker cannot gain access without access to your phone.<\/p>\n<ol start=\"4\">\n<li><strong> Use a powerful firewall:<\/strong><\/li>\n<\/ol>\n<p>The WordFence plugin offers much more than a simple firewall. It performs regular security checks and notifies you of suspicious activity via email. In addition, the plugin allows you to configure your HTACCESS file to strengthen the protection of your website.<\/p>\n<ol start=\"5\">\n<li><strong> Keep your software up to date:<\/strong><\/li>\n<\/ol>\n<p>Regular updates for WordPress, WooCommerce and all plugins used are essential. Updated software fixes security gaps and thus minimizes the risk of attacks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p>The security of your online store should be your top priority to maintain customer trust and protect sensitive data. By implementing these measures, such as changing the login URL, avoiding common usernames, implementing two-factor authentication, using a powerful firewall, and regular software updates, you can effectively protect your online store from malicious code and unauthorized access. Remember that the security of your online store is an ongoing process that requires continuous attention to keep up with the latest threats.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:hsla(var(--awb-color2-h),var(--awb-color2-s),var(--awb-color2-l),calc( var(--awb-color2-a) - 10% ));\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Our video<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:hsla(var(--awb-color2-h),var(--awb-color2-s),var(--awb-color2-l),calc( var(--awb-color2-a) - 10% ));\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p>We have produced a video in which you will find a summary on the topic of online shops and the security of your own online shop:<\/p>\n<\/div><iframe class=\"lazyload\" width=\"560\" height=\"315\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27560%27%20height%3D%27315%27%20viewBox%3D%270%200%20560%20315%27%3E%3Crect%20width%3D%27560%27%20height%3D%27315%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/www.youtube-nocookie.com\/embed\/32l50KqfRf0?si=_NXQjOE__Tw3eC2T\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>This blog post will introduce you to the best measures to effectively protect your online shop from these threats. <\/p>","protected":false},"author":1766,"featured_media":31883,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,1055,1036,1045,1046],"tags":[1145,1141,1135,1144,1138,1140,1143,1133,1134,1147,1146,1137,1142,1136,1139],"class_list":["post-31874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles","category-news","category-onlineshop","category-woocommerce","category-wordpress","tag-backend-absicherung","tag-firewall-fuer-wordpress","tag-fremder-zugriff-verhindern","tag-hacker-abwehr","tag-login-url-aendern","tag-miniorange-plugins","tag-online-store-sicherheit","tag-onlineshop-sicherheit","tag-schutz-vor-schaedlichem-code","tag-shop-cybersecurity","tag-website-datenschutz","tag-woocommerce-absicherung","tag-wordfence-konfiguration","tag-wordpress-sicherheit","tag-zwei-faktor-authentifizierung"],"_links":{"self":[{"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/posts\/31874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/users\/1766"}],"replies":[{"embeddable":true,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/comments?post=31874"}],"version-history":[{"count":0,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/posts\/31874\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/media\/31883"}],"wp:attachment":[{"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/media?parent=31874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/categories?post=31874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.r5m.org\/en\/wp-json\/wp\/v2\/tags?post=31874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}