This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

CloudwaysCDN — a powerful solution that offers superior performance and satisfied global audience for your business. Read More

Learn About WordPress Security With Pere Hospital

Updated on  May 5, 2016

2 Min Read
Reading Time: 2 minutes

The WP Summit is an online event that brings together the best minds of WordPress. You get the first-hand opportunity to listen to the experts sharing valuable information and discussing about the problems being faced by the WordPress websites and community. The 10-day event is currently going on, and will continue till March 25, 2015.

And, today is a big day for Cloudways. Pere Hospital, our Chief Technology Officer, is speaking at WP Summit. His recorded video interview would be made available at 4:00 PM (1600h) GMT, 5:00 PM CET (1700h) CET, and 9:00 AM (0900h) PST.

From hackers’ love to attack WordPress websites to the security measures, you get the answers to all you potential security woes in this insightful discussion.

“Website security is an asset for online businesses. It is such a treasured possession that a slight compromise on your website’s security can take your reputation at stake. And if your WordPress website is hacked, it will dent your reputation and will result in loss of trust among customers.”

He has candidly shared his opinions about why hackers love to attack websites and why it is necessary to protect your websites from hackers.

“It’s all about volume. Being the most popular content management system powering more than 25% of websites, WordPress has become the most vulnerable target for hackers,” said Pere.

“Hackers are way smarter than us, that’s why they love to attack WordPress sites through the automated backdoor,” he added.

Answering a question about Bitcoin’s vulnerability, Pere held the opinion that it is all due to the fact that Bitcoin websites have a huge amount of data, including money, database, and critical information that hackers would love to capture and use it for their own benefits.

Visit WP Summit (paid) to watch and listen to Pere’s words of wisdom about WordPress Security.

Share your opinion in the comment section. COMMENT NOW

Start Creating Web Apps on Managed Cloud Servers Now

Easy Web App Deployment for Agencies, Developers and E-Commerce Industry.

About The Author

Salman Mehdi

Salman Mehdi worked as Digital Content Producer for Cloudways. In his spare time, he reads books, blog posts, or anything that catches his fancy.

Stay Connected:

Get Our Newsletter
Be the first to get the latest updates and tutorials.


  • Peter Cralen

    Cool interview, especially part of “not to put everything in one basket”. This I learned when I started with Cloudways (DNS, hosting, emails – each on separate provider). In past I had all these in one provider and sure, he can not be so good in all of these different areas.
    Diversification was huge step forward for me.

    I like to see, that CloudWays starts to sponsor WordPress project, hope more will come in future. Thanks for that

    • Salman Mehdi

      Thanks for your comment, Peter. We are surely working towards sponsoring more such events.

  • Tevya Washburn

    When I tried to visit the site to view his presentation on security, Chrome ironically warns me that the SSL cert on that site is not safe. Anyone else seeing this?

    Maybe you could use his knowledge to help us, your clients, to have better WP security? One of my sites was bruteforce attacked earlier today. I was running the BruteProtect plugin (being merged into JetPack), which I assume blocked the login page. But it doesn’t actually block all traffic from them (from what I know) just access to wp-login.php. So it’s not enough to prevent the barrage of requests, which maxed the CPU and resulted in MySQL stopping, meaning that all the sites on that server (about 15) went offline. I really appreciate the help of one of your support people (Anas, I think) who blocked the offending IP’s in .htaccess, effectively ending the issue. However, it seems like there ought to be a better way. Perhaps one that could automatically block attacking IP’s at the .haccess, or even server level, and perhaps even for all CW clients who opt-in. Not knowing of the attack until your sites suddenly go offline, and then having to manually add the IP’s to .htaccess every time, seems overly-manual, when there should be a better, easier, and more automated way to protect sites and servers.

    • Peter Cralen

      Yes, there is problem with certificate.