← Back to Blog | Hosting

Website Security Guide for Mumbai Businesses
12-Point Checklist to Protect Your Site

📅 May 2026  ·  🕐 7 min read  ·  By Susania Team

Key Takeaway

Most Mumbai business websites are hacked through entirely preventable vulnerabilities — outdated plugins, weak passwords, no firewall, and missing backups. This 12-point security checklist eliminates the risks that account for 90% of all website compromises.

Why Website Security is a Business Priority — Not Just an IT Concern

In 2024, over 30,000 websites were hacked globally every day. India saw a 35% rise in cyber attacks on small and medium businesses, with Mumbai being one of the most targeted cities due to the density of active commercial websites. A hacked website doesn't just cause technical inconvenience — it can result in customer data theft, financial loss, complete Google deindexing, and irreparable reputational damage.

Most Mumbai business websites are hacked not through sophisticated attacks but through preventable vulnerabilities: outdated software, weak passwords, no SSL, unprotected login pages, and missing security headers. This guide gives you the complete security checklist to protect your Mumbai business website.

The 12-Point Website Security Checklist

1
SSL Certificate (HTTPS)

Every business website must run on HTTPS. Google marks HTTP sites as "Not Secure" in Chrome — killing visitor trust instantly. Free SSL is available through Let's Encrypt or included with most hosting plans. If your site still shows HTTP, fix this today.

2
Update Everything — Always

60% of WordPress hacks exploit outdated plugins or themes. Enable automatic updates for WordPress core, all plugins, and your theme. Check for updates weekly. Every update notification is a security patch waiting to be applied.

3
Use a Web Application Firewall (WAF)

A WAF sits between your website and the internet, blocking malicious traffic before it reaches your server. Cloudflare's free plan includes a basic WAF. For WordPress sites, Wordfence provides a free plugin-based WAF that blocks known attack patterns in real time.

4
Strong Password Policy + 2FA

Use a 20+ character password generated by a password manager (Bitwarden, 1Password) for your hosting, cPanel, WordPress admin, and domain registrar. Enable two-factor authentication (2FA) on every service. Brute force attacks automatically try common passwords — a strong unique password makes them pointless.

5
Change Default Login URLs

Every WordPress site's admin login is at /wp-admin by default. Bots scan millions of sites daily for this URL. Change it to a custom URL (like /company-login) using a security plugin. This alone stops the vast majority of automated brute force attacks before they begin.

6
Daily Automated Backups

A recent backup is your ultimate recovery tool after any attack. Configure automated daily backups stored in a separate location (Google Drive, Amazon S3) — never only on the same server as your website. Test your backup restoration process at least once every 3 months. An untested backup is not a backup.

7
Security Headers in .htaccess

Add HTTP security headers to block clickjacking, MIME-type sniffing, and information leakage: X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Content-Security-Policy. These can be set in your .htaccess file and take effect immediately. Tools like SecurityHeaders.com grade your current header configuration for free.

8
Limit Login Attempts

By default, WordPress allows unlimited login attempts — making brute force attacks possible. Install a plugin like "Limit Login Attempts Reloaded" to block an IP after 3–5 failed attempts for 24 hours. This stops automated credential stuffing attacks completely.

9
File Permission Hardening

Correct file permissions prevent attackers who gain server access from modifying your files. Recommended permissions: directories at 755, files at 644, wp-config.php at 600. Your hosting control panel or a security plugin can check and correct these in minutes.

10
Disable XML-RPC if Not Needed

WordPress's XML-RPC interface is a common attack vector for DDoS amplification attacks. Unless you use the WordPress mobile app or Jetpack's remote publishing, disable XML-RPC using a plugin or .htaccess rule. Most Mumbai business websites never need it.

11
Monitor Uptime and Malware Scans

Set up free uptime monitoring at UptimeRobot.com — get an SMS or email alert within 5 minutes of your site going down. Schedule weekly automated malware scans using Sucuri SiteCheck (free) or a security plugin. Early detection means faster recovery and less damage.

12
Delete Unused Themes and Plugins

Deactivated plugins and themes are still on your server and still exploitable if they contain vulnerabilities. Delete every theme and plugin you are not actively using. The fewer plugins you run, the smaller your attack surface.

Immediately: (1) Take the site offline by setting it to maintenance mode or unpublishing via hosting panel, (2) change all passwords — cPanel, WordPress admin, FTP, email, (3) restore from your most recent clean backup, (4) run a full malware scan using Wordfence or Sucuri, (5) identify and patch the vulnerability that was exploited, (6) submit for a Google review if the site was flagged as dangerous in Search Console. Contact Susania for emergency website recovery support.

Share this article

Need a Security Audit for Your Mumbai Business Website?

Susania audits and hardens website security for Mumbai businesses — SSL, firewalls, backups, and ongoing monitoring. Get a free security check today.

Is Your Mumbai Business Website Secure?

Susania audits and hardens website security — SSL, WAF, backups, and ongoing monitoring. Don't wait for a hack.

View Hosting & Security Services