FREE WHITE PAPER

Securing The Web Perimeter: How Unpatched WordPress Installs Can Increase the Risk of Security Breaches

The Equifax and Yahoo breaches have highlighted just how vulnerable enterprises are to cyber attacks that aim to exfiltrate data by exploiting web application vulnerabilities. Content Management Systems (CMS) are among the most popular platforms on the world wide web - over 30% of the websites in the Alexa top 1 million use WordPress.

Exploits of WordPress have soared in recent times. Securing a combination of legacy environments and newer stacks, keeping up with the latest security patches, and reducing response times to zero-day vulnerabilities all remain challenges for organizations using WordPress.

This white paper outlines some common causes of WordPress vulnerabilities and offers guidelines on securing WordPress installations.

The Cloudflare Difference

Inbuilt Intelligence for faster rule updates

Protect web applications by applying Cloudflare's range of battle-tested rule sets and by utilizing intelligence gathered from a network of 16 million Internet properties.

Full customization

Build fully customizable and granular rules based upon multiple request attributes such as user-agent, path, country, query string, IP address, and more, to stop emerging and sophisticated threats.

Security without sacrificing performance

Prevent downtime and unavailability with Cloudflare’s global Anycast network consisting of 180 data centers spanning 80 countries, and offering a scalable infrastructure backbone.

Trusted By

Over 16,000,000 Internet properties