{"id":5871,"date":"2022-01-13T23:52:42","date_gmt":"2022-01-14T04:52:42","guid":{"rendered":"https:\/\/www.filerepairtools.com\/tips\/?p=5871"},"modified":"2022-01-13T23:52:42","modified_gmt":"2022-01-14T04:52:42","slug":"security-checks-to-undertake-when-building-website","status":"publish","type":"post","link":"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/","title":{"rendered":"What Security Checks and Measures You Need to Undertake When Building a Website?"},"content":{"rendered":"\n<p>When you\u2019re creating a website, it\u2019s important to take security into consideration. This means implementing measures to protect your site from hacking and other cyberattacks. In this article, we will discuss some of the precautions you need to take when building a website.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#1_%E2%80%93_Web_Hosting\" >1 &#8211; Web Hosting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#2_%E2%80%93_Frames\" >2 &#8211; Frames<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#3_%E2%80%93_Java\" >3 &#8211; Java<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#4_%E2%80%93_Image_Files\" >4 &#8211; Image Files<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#5_%E2%80%93_E-Commerce_Sites\" >5 &#8211; E-Commerce Sites<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/filerepairtools.com\/tips\/security-checks-to-undertake-when-building-website\/#6_%E2%80%93_Security_Checklists\" >6 &#8211; Security Checklists<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2022\/01\/secure-website.jpg\"><img decoding=\"async\" src=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2022\/01\/secure-website.jpg\" alt=\"\" class=\"wp-image-5872\"\/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_%E2%80%93_Web_Hosting\"><\/span>1 &#8211; Web Hosting<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Choosing a reliable web host is important as your site will be hosted on their servers. When you buy web hosting, go for a reputable and trusted company. This will save you trouble down the road because if your website gets hacked, it will be the web hosting company that is responsible for cleaning up the hack. By reading information available at <a href=\"https:\/\/www.jolt.co.uk\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.jolt.co.uk\/\" rel=\"noreferrer noopener\">Jolt<\/a>, you can clearly see that it is important that a cloud server delivers reliability and a \u201csuite of tools to help you succeed online\u201d. If you\u2019re just starting out, you can use free web hosting services such as Blogger or WordPress.com, but these can be limiting in terms of design and functionality, so you\u2019ll need to upgrade in order to get a more appealing and functional website. It may also be worth choosing a more expensive hosting package as they often have more invested in cyber security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_%E2%80%93_Frames\"><\/span>2 &#8211; Frames<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Using frames on your site can potentially leave you open to cross-site scripting attacks. These occur if someone manages to exploit the hyperlink within the frames, causing it to redirect to an external site that is not under your control. This allows hackers access to edit and change areas of your website. If you decide that you must use frames, make sure that they are programmed so that any hyperlinks within them go to an internal frame or window that is not editable by the user.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_%E2%80%93_Java\"><\/span>3 &#8211; Java<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Java scripts can help improve the usability on your site, but if hackers manage to exploit the coding there are plenty of ways they can cause damage. This could include erasing files, defacing your website, or even stealing your passwords. To keep java scripts safe and out of sight, consider hosting them on a server other than the one you use for web hosting. Another option is to encrypt the coding so it\u2019s unreadable by humans which would reduce its value to anyone trying to access it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_%E2%80%93_Image_Files\"><\/span>4 &#8211; Image Files<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It\u2019s recommended not to store images on your server. This is due to the fact that image files can be considerably larger, leading to a slow loading time and an increased risk of hackers finding and exploiting any vulnerabilities within them. If you really need to upload images directly onto your site, make sure they\u2019re not linked from anywhere else as this would allow anyone who has found it to gain access to everything on your server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_%E2%80%93_E-Commerce_Sites\"><\/span>5 &#8211; E-Commerce Sites<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you have an e-commerce site selling products online, you need to ensure your website is secure so as not to ensure as many cyberattacks as possible are prevented. This means using SSL certificates which encrypt users\u2019 data when making payments or entering sensitive information such as credit card details into forms on the website. It also means not using weak passwords on your website, as well as storing credit card details cyclically so they can\u2019t be stolen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_%E2%80%93_Security_Checklists\"><\/span>6 &#8211; Security Checklists<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Checklists are a great way to keep track of everything you need to do when designing and creating a website. This means if anything is missed out your web developer won\u2019t accidentally implement the glitch into the final site design. These checklists should include things such as: don\u2019t use hosting companies with poor ratings, check for cross-site scripting vulnerabilities, check all java scripts have been encrypted, and regularly backup and test your site in case something goes wrong so you can fix it quickly before it causes any damage.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2022\/01\/website-security.jpg\"><img decoding=\"async\" src=\"https:\/\/www.filerepairtools.com\/tips\/wp-content\/uploads\/2022\/01\/website-security.jpg\" alt=\"\" class=\"wp-image-5873\"\/><\/a><\/figure>\n\n\n\n<p>Building a website with the appropriate security measures in place is important for both protecting your site and creating an enjoyable user experience. For example, frames should be programmed so that any hyperlinks within them go to an internal frame or window that is not editable by the user. If you use java scripts, there are plenty of ways hackers can exploit them so make sure their coding is well-hidden and out of sight. It&#8217;s also worth noting that image files can often slow down web pages due to their size &#8211; it may be preferable to upload images directly onto your server rather than store them on it if possible.&nbsp; If you&#8217;re running an e-commerce site selling products online, you need to ensure your website is secure so as many cyberattacks as possible are repelled.&nbsp;<\/p>\n\n\n\n<p>This means having a secure connection between your site&#8217;s server and the user&#8217;s browser, encrypted passwords stored on databases, and customers&#8217; credit card details cyclically so they can&#8217;t be stolen. Checklists are a great way to keep track of everything you need to do when designing and creating a website.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you\u2019re creating a website, it\u2019s important to take security into consideration. This means implementing measures to protect your site from hacking and other cyberattacks. In this article, we will discuss some of the precautions you need to take when building a website. 1 &#8211; Web Hosting Choosing a reliable web host is important as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-5871","post","type-post","status-publish","format-standard","hentry","category-how-to"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts\/5871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/comments?post=5871"}],"version-history":[{"count":0,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/posts\/5871\/revisions"}],"wp:attachment":[{"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/media?parent=5871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/categories?post=5871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/filerepairtools.com\/tips\/wp-json\/wp\/v2\/tags?post=5871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}