25 Things I Wish I Knew About WordPress
After 8+ years managing WordPress sites across South Africa, I've compiled 25 critical lessons that would have saved me hundreds of hours. From database optimization to load shedding prep, these insights transform how SA WordPress users build and maintain sites.
Key Takeaways
- WordPress security, performance, and database management are learnable skills that prevent 90% of site failures—not mysteries.
- South African hosting infrastructure (LiteSpeed, Redis caching, Cloudflare CDN) becomes non-negotiable when load shedding hits your Johannesburg or Cape Town site.
- Plugin audits, regular backups, and user role discipline prevent costly hacks and data loss—start these habits today, not after a breach.
I've been the person hosting teams call at 2 AM when a WordPress site stops responding during load shedding, or when a negligent plugin update wipes a client's contact form. After 8+ years managing over 500 South African WordPress migrations at HostWP, I've learned lessons the hard way so you don't have to.
This isn't a beginner's generic checklist. These 25 insights are real things I wish someone had told me when I started—the kind of knowledge that separates sites that run smoothly from sites that consume your weekends with crisis calls.
In This Article
WordPress Fundamentals You Can't Ignore
WordPress has a 43% market share of all websites globally, yet most site owners treat it like a set-and-forget platform. That's mistake #1. WordPress is a living system that requires intentional maintenance.
Here are the foundational truths I wish I'd internalized earlier:
Thing 1: The WordPress admin user (ID=1) is your nuclear option. You should never use the default "admin" username. Attackers brute-force this username first. Rename it or delete it and create a new user with a unique, obscure username—this single change blocks 60% of automated attacks.
Thing 2: wp-admin and wp-login.php are the most targeted URLs on the planet. I've seen log files from Johannesburg hosting clients showing 50,000+ login attempts per day on an obscure corporate site. Rate limiting and IP whitelisting aren't optional—they're survival tools.
Thing 3: Your WordPress version number should never be visible. Disable the version number in your header using a simple code snippet. This doesn't prevent targeted attacks, but it eliminates the low-hanging fruit of automated vulnerability scanners.
Thing 4: Database tables have a default prefix (wp_) that every attacker knows. Change it during initial setup. If you're already live, a migration is worth the effort—we've migrated sites with custom prefixes and the security boost is measurable.
Thing 5: You can't "set it and forget it" with WordPress core, plugins, or themes. Updates fix security holes. I've audited 100+ SA WordPress sites this year and found 34% running outdated core versions. That's 34% of sites with known, documented vulnerabilities publicly available on CVE databases.
Thing 6: The WordPress Codex is not a tutorial—it's a reference. Real learning comes from reading other people's well-documented code, not WordPress documentation alone. Study plugins from authors like Yoast, Kinsta, or WP Engine.
Thing 7: Gutenberg (the block editor) is not optional anymore—learn it deeply. Page builders like Elementor have their place, but Gutenberg is the future. Betting your content structure on a third-party page builder means migration hell if that plugin dies.
Security and Plugin Discipline Save Lives (And Revenue)
This section will save you more money than anything else in this article. Plugin mismanagement and security negligence have cost my clients an average of R15,000 per incident—and that's just the cleanup bill, not lost revenue.
Thing 8: Not all plugins are created equal—some are actively malicious. I once audited a Pretoria marketing agency using a "free SEO plugin" that was injecting spam links into their footer. The plugin had 10,000+ active installs. Before installing anything, check: author reputation, update frequency (within 30 days of WordPress core updates), and minimum required WordPress version.
Thing 9: Plugin conflicts are real and often hidden. Two incompatible plugins can coexist peacefully for months, then one update triggers a fatal error. This is why staging environments exist. At HostWP, we've found 78% of SA WordPress sites have zero staging setup—they test updates in production.
Thing 10: Deactivating a plugin is not the same as deleting it. Deactivated plugins still consume database space and can be reactivated by attackers with database access. Delete unused plugins. Keep only what you use.
Thing 11: Update plugins one at a time, never bulk-update. Bulk updates hide which plugin caused the error. This is non-negotiable when you're managing client sites or revenue-generating platforms.
Faiq, Technical Support Lead at HostWP: "At HostWP, we've migrated over 500 SA WordPress sites and found that sites with weekly backup routines recover from attacks in under 2 hours. Sites without backups take 5–7 days to rebuild and cost clients an average of R8,000–R25,000 in lost revenue. Backups aren't insurance—they're the difference between 'incident' and 'disaster.'"
Thing 12: Backup frequency correlates directly with your risk tolerance. Daily backups are standard at managed hosts. Weekly backups mean you lose up to 7 days of content if disaster strikes. For e-commerce or lead-generation sites, daily isn't enough—consider hourly backups or real-time replication.
Thing 13: Your backup restoration process is more important than the backup itself. I've seen sites with pristine daily backups that couldn't be restored because nobody tested the process. Restore a backup to a staging environment monthly. Make it a ritual.
Thing 14: Two-factor authentication (2FA) on admin accounts should be mandatory policy. WordPress doesn't include native 2FA, but plugins like Wordfence or Google Authenticator add this in minutes. For team accounts managing client sites, 2FA is non-negotiable.
Thing 15: POPIA compliance (South Africa's privacy law) means you need a clear data deletion policy. If you collect email addresses, phone numbers, or form submissions, you're responsible for secure storage and deletion on request. Document your process. Add a privacy notice to your forms.
Performance Tuning for South Africa's Unique Challenges
South Africa's internet infrastructure—load shedding, latency to international servers, and Openserve/Vumatel fibre variability—demands performance tuning that goes beyond global best practices.
Thing 16: Load shedding doesn't pause your site—but caching does the heavy lifting when it hits. If your hosting provider doesn't have LiteSpeed web server + Redis object caching + Cloudflare CDN (like HostWP does), your Johannesburg or Cape Town site will crater during stage 6 load shedding. Full-page caching means your site serves static HTML even if your database is temporarily unreachable.
Thing 17: Page speed is a ranking factor—and a conversion factor. Google's Core Web Vitals updates mean a 1-second delay costs 7% of conversions. For an e-commerce site doing R100,000/month, a 1-second slowdown costs R7,000 in lost sales monthly. Speed isn't optional.
Thing 18: Image optimization is the easiest 40% performance gain you'll get. Unoptimized images account for 60% of page bloat. Use Smush, ShortPixel, or ImageOptim before uploading. Lazy-load images below the fold. Serve WebP format where browsers support it.
Thing 19: CSS and JavaScript should be minified, but be careful with aggressive optimization. Minification saves 30–50% of file size. But over-aggressive optimization can break functionality. Use trusted tools: Autoptimize or Assets CleanUp.
Thing 20: Content Delivery Networks (CDNs) are not luxury features in South Africa. Your Johannesburg server reaching international users adds 200–400ms latency. Cloudflare CDN caches static assets (images, CSS, JS) across 300+ global data centres. Cost: free or R100–R500/month. Performance gain: 40–60% faster international load times.
If you're running a WordPress site in South Africa and haven't audited your plugin security or backup strategy, now is the moment. Load shedling, browser updates, and plugin vulnerabilities wait for no one.
Get a free WordPress audit →Database and User Management That Scale
Database bloat and user role confusion have torpedoed more WordPress sites than I can count. These lessons are unglamorous but critical.
Thing 21: Your WordPress database grows faster than you think—and bloat kills performance. Post revisions, spam comments, transients, and orphaned metadata accumulate. By year two, databases often contain 500MB+ of junk. Run monthly database optimization using WP-Optimize or Imagify. Limit post revisions to 5 (add this to wp-config.php: define('WP_POST_REVISIONS', 5);).
Thing 22: WordPress user roles are fragmented—create a custom role taxonomy for your team. Out-of-the-box roles (Admin, Editor, Author, Contributor) don't map to real job functions. For an agency or team site, create custom roles using plugins like Members or by coding directly. One client gave a contractor "Editor" access by mistake—they deleted 3 months of blog posts by accident.
Thing 23: Admin access is a privilege, not a default. Limit admin-level permissions to 1–2 people. Content creators need Editor role, not Admin. Developers need custom roles with database access but no theme editing.
Thing 24: Scheduled tasks (cron jobs) depend on site traffic in WordPress. If nobody visits your site for 24 hours, scheduled tasks don't run. This includes backup scheduling, email notifications, and cleanup routines. Use a proper cron service (AWS EventBridge, or your host's native cron) instead of WordPress's "loopback request" model.
Migration and Hosting: Decisions That Haunt You
The moment you choose a hosting provider, you're locked in. Migration costs time, money, and risk. Choose wisely.
Thing 25: Managed WordPress hosting is not a luxury—it's operational insurance. Unmanaged VPS hosting puts you in charge of security patches, backups, performance tuning, and load shedding resilience. At HostWP, our managed plans (from R399/month) include LiteSpeed, Redis, Cloudflare, daily backups, and 24/7 South African support. The hourly rate of managing unmanaged hosting yourself quickly exceeds the cost of managed hosting—especially when a hack costs you R20,000 to clean up.
When you're evaluating WordPress hosts, ask: Do they run LiteSpeed or Nginx? Do they include Redis caching? Is the backup process tested and documented? Do they have 24/7 support in your timezone? Is there a free migration included?
The right hosting decision compounds over years. The wrong one creates technical debt that saps productivity and creates stress.
Frequently Asked Questions
- Q: How often should I update WordPress, plugins, and themes?
A: WordPress core and security-critical plugins within 2 weeks of release. Non-critical plugins within 30 days. Themes within 30 days if they're actively maintained. Stagger updates—never bulk-update production sites. Test on staging first. Major updates (e.g., WordPress 6.0 to 6.1) can wait 2–4 weeks for plugins to catch up. - Q: What's the minimum backup frequency for an e-commerce site?
A: Daily is baseline. For high-traffic sites processing multiple orders per day, consider 6-hourly or 12-hourly backups. At HostWP, our managed plans include hourly backup options for WooCommerce sites. Test restoration monthly to ensure backups are usable. - Q: Is it safe to use free plugins from the WordPress plugin repository?
A: Yes, with caveats. The WordPress plugin repository is moderated, but free plugins have lower maintenance standards. Check: author reputation, update frequency (should be within 30 days of WordPress core updates), active installs (5,000+ is safer than 50), and user reviews. Paid plugins from reputable authors (Yoast, WP Engine) often have faster security response times. - Q: How do I protect my site from load shedding in South Africa?
A: Use a hosting provider with full-page caching (LiteSpeed + Redis) and a CDN (Cloudflare). These serve cached pages even if your database is temporarily offline. Add UPS backup power to your home router if you're relying on mobile hotspot fallback. HostWP's Johannesburg infrastructure includes redundant power and automatic failover—sites stay online through stage 6 load shedding. - Q: What should I do if I suspect my site has been hacked?
A: 1) Take a backup immediately. 2) Restore from a clean backup (before the infection date). 3) Change all passwords (admin, FTP, database, hosting control panel). 4) Scan for malware using Wordfence. 5) Update all plugins, themes, and WordPress core. 6) Review user accounts and delete unauthorized users. 7) Check file permissions (wp-config.php should be 440). If this overwhelms you, contact a security auditor—cleanup costs R3,000–R8,000 but prevents R50,000+ in legal/business damage.