WordPress Security Guide 2026
WordPress powers 43% of all websites, making it the #1 target for hackers. Most WordPress hacks exploit outdated plugins, weak passwords, and missing security basics. This guide covers everything you need to secure your site. Updated March 2026.
1. Keep WordPress Core Updated
WordPress releases security patches regularly. Running an outdated version is the single biggest risk factor. Enable automatic updates for minor releases (security patches) at minimum. Major version updates should be tested on a staging site first, then applied within a week. As of 2026, any site running WordPress 5.x or below is critically vulnerable. Check your version at Dashboard → Updates.
2. Plugin Vulnerabilities — The #1 Attack Vector
Over 90% of WordPress vulnerabilities come from plugins, not WordPress core. Here is how to manage plugin risk:
- Audit your plugins monthly: Remove any plugin you are not actively using. Deactivated plugins are still a risk if their files exist on the server.
- Check plugin reputation before installing: Look for active development (updated within 3 months), high install count (50K+), and good ratings. Check trust scores at nerq.ai/wordpress-plugins.
- Never use nulled (pirated) plugins: They almost always contain backdoors and malware.
- Enable auto-updates for plugins: Go to Plugins → click "Enable auto-updates" for each plugin.
- Subscribe to vulnerability feeds: WPScan and Patchstack publish WordPress vulnerability databases. Monitor them for plugins you use.
3. Strong Passwords and User Management
- Use a password manager to generate unique, random passwords for every WordPress account
- Never use "admin" as a username — it is the first username brute-force bots try
- Enable two-factor authentication (2FA) for all admin and editor accounts
- Limit login attempts — install a plugin like Limit Login Attempts Reloaded to block brute force
- Audit user accounts quarterly: Remove inactive users, especially those with admin or editor roles
- Use strong passwords for FTP, database, and hosting panel — not just WordPress itself
4. Security Plugins
A security plugin adds firewall rules, malware scanning, and login protection. Recommended options:
- Wordfence — Firewall + malware scanner. Free tier is solid. Blocks malicious IPs in real-time.
- Sucuri Security — Cloud-based WAF (Web Application Firewall). Particularly good for DDoS protection.
- iThemes Security — User-friendly. Good for non-technical site owners. Enforces strong passwords and 2FA.
- Patchstack — Focused on virtual patching for plugin vulnerabilities. Auto-patches known vulns before plugin authors release fixes.
5. Backup Strategy
If your site is hacked, a clean backup is your insurance policy. Follow the 3-2-1 rule:
- 3 copies of your data (live site + 2 backups)
- 2 different storage types (e.g., local + cloud)
- 1 offsite backup (not on the same server as your site)
- Use UpdraftPlus or BlogVault for automated daily backups to cloud storage (Google Drive, S3, Dropbox)
- Test your backups quarterly by restoring to a staging site
- Keep at least 30 days of backup history so you can restore from before a compromise
6. Server-Level Hardening
- Disable file editing in WordPress: add
define('DISALLOW_FILE_EDIT', true);to wp-config.php - Protect wp-config.php: move it one directory above web root or restrict access via .htaccess
- Disable XML-RPC if not needed: it is a common brute-force target
- Set correct file permissions: directories 755, files 644, wp-config.php 440
- Use HTTPS everywhere: install a free SSL certificate via Let's Encrypt
- Hide your WordPress version number from source code
Check WordPress plugin trust scores at nerq.ai/wordpress-plugins.
Related Guides
Updated March 2026. Source: Nerq independent analysis.