Improved Joomla Security

We will quickly and efficiently ensure maximum security for a website running on the Joomla CMS. For 7,000 ₽ you will receive a set of the best extensions for Joomla protection worth more than 14,000 ₽ in total, as well as their installation and professional configuration on your site.

Contents

  1. Service application form

  2. Risk area and consequences for the site

  3. What does the site protection service include?

  4. What hacker attacks will prevented?

  5. What extensions will be installed?

  6. How much does the service cost and what are the terms?

  7. Procedure for performing the service

  8. Service guarantees

Request for protection

Infected website

A site is at risk if it:

01

It is popular

Popular sites are always of increased interest to attackers.

02

Creates competition

The higher the competition, the higher the probability of running into professional hackers hired by a competitor.

03

Accepts payments

Accepting payments through the site is an additional incentive for hackers who want to profit at someone else's expense.

04

Powered by popular CMS

Joomla is a fairly secure CMS, but its popularity encourages hackers to constantly search for its weak points.

05

Has a lot of third party code

Third-party CMS extensions may have their own vulnerabilities. And if the extension is also pirated, then your site is probably already hacked.

06

Interacts with the user

The more interactive interaction a site provides with the user, the more loopholes there may be in its security.

Hacked site

Consequences of website hacking:

01

Loss of trust

Customers and search engines will lose trust in your site, which will lead to all the ensuing consequences.

02

Loss of customers

You risk losing old clients and not finding new ones, because your authority may be irrevocably undermined.

03

Loss of positions

An infected site can instantly fly out of search results, and it will be very difficult to return to its previous positions.

04

Losing money

Losing positions in search results is fraught with the loss of potential customers, and the loss of customers is an inevitable loss of profit.

05

Loss of website

Hackers can wipe your site from the server, and if regular backups were not made, the consequences may be irreversible.

06

Loss of business

If your entire business is based on a website, then hacking it could result in the loss of everything.

Stages of service execution

The service for ensuring maximum security of a Joomla site is divided into 3 stages.

Antivirus

Checking for vulnerabilities and fixing them

01

Create a backup copy of the site before doing the main work.

02

We install a licensed antivirus that will remain on your site.

03

We check the site for viruses, vulnerabilities and suspicious code.

04

We remove viruses if they are present, and eliminate identified vulnerabilities.

Website reliability

Ensuring the reliability of the site

01

Update Joomla to the latest minor version.

02

Update the necessary Joomla extensions to the latest versions.

03

We check the reliability of the extension settings and general settings of the CMS itself.

04

Disable unused and potentially dangerous third-party extensions.

Web Hacker

Strengthening website security

01

Setting up automatic backup.

02

We provide additional protection for entering the admin panel.

03

We mask the signs that the site is running on Joomla.

04

We protect your website from all types of threats and hacker attacks.

Protected website

Report and recommendations

After all of the above, you will receive a maximally secure site, a report on the work done and additional recommendations.

Types of hacker attacks

The following types of hacker attacks will be successfully prevented after performing the Joomla website protection service.

Brute force

Brute force

A brute force hacking method where hackers try to guess the administrator's login and password through endless automated attempts.

SQL injections

SQL injections

Allows hackers to gain access to passwords by exploiting security holes in databases.

Malicious User Agent

Malicious User Agent

Hackers attempt to break into a site using a browser configured to send malicious PHP code in the user agent string.

Remote File Inclusion

Remote File Inclusion

Hackers try to force vulnerable Joomla extension to load PHP code directly from their server.

Clickjacking

Clickjacking

This method is used by hackers to obtain access data to a site by deception.

XSS

XSS

This involves introducing malicious code into a web page if there is a vulnerability that allows this to be done.

What extensions will be installed?

The service includes installation of the best paid extensions for website protection:

Akeeba Backup

The best component for backing up Joomla sites.

License price:

50€

Free for you!

RS Firewall

Active and passive vulnerability scanner for Joomla sites.

License price:

50€

Free for you!

Admin Tools

Joomla component for additional security.

License price:

50€

Free for you!

How much does the service cost and what are the terms?

The total cost of the above extensions for Joomla when purchased separately is

€150

These extensions will be installed and configured for you along with all the work stages described above for

$100

The service execution time depends on the complexity and current workload, and is usually

1-3 days.

How is the service provided?

Joomla website protection

1

You submit an application.

1

2

We review your application, contact you and issue an invoice.

3

You pay the invoice and give us access to the site.

3

4

We implement the service in stages.

5

You receive a report and a site with increased security.

5

Our guarantees

Confidentiality Guarantee

Confidentiality Guarantee

Complete confidentiality is ensured during the work. Upon completion, together with the issuance of a report, we give a recommendation on changing passwords.

Quality assurance

Quality assurance

If within 90 days after the service is provided, the protected site is hacked by intruders, we will restore it and return the money.

Terms used:

Component, Extension, CMS, PHP, Backup