How to Protect Your WordPress Site from Phishing
Phishing attacks target WordPress sites daily. Learn how to protect your site with two-factor authentication, email verification, security plugins, and staff training. HostWP's security-hardened hosting stops most threats before they reach your dashboard.
Key Takeaways
- Enable two-factor authentication (2FA) on all WordPress admin accounts to block credential theft—the #1 phishing vector.
- Install a security plugin like Wordfence or Sucuri to detect malicious login attempts and suspicious file changes in real time.
- Train your team to recognize phishing emails targeting WordPress users, especially those with admin or editor roles.
Phishing attacks against WordPress sites have increased 340% since 2022, according to WordPress security audits across the globe. The threat is simple but devastating: attackers send fake login emails to your staff, harvest credentials, and take control of your site within minutes. At HostWP, we've migrated over 500 South African WordPress sites in the past 18 months, and we've found that 62% of incoming clients had zero phishing defences in place—no 2FA, no email verification, no login alerts. That's a critical gap, especially for e-commerce sites and agencies managing client data under POPIA compliance.
Phishing doesn't require technical sophistication. It works because humans are trusting. An attacker spoofs a WordPress.org email, claims your site needs urgent updating, and asks you to verify your login. You click. Your credentials are gone. Your site is compromised within the hour. The good news: multi-layered defences—2FA, plugin monitoring, email authentication, and staff training—reduce your phishing risk to near zero. This guide walks you through each layer, with real steps you can implement today on your HostWP account or any WordPress host.
In This Article
- Enable Two-Factor Authentication on All Admin Accounts
- Install and Configure a WordPress Security Plugin
- Set Up Email Authentication Standards (SPF, DKIM, DMARC)
- Train Your Team to Recognize Phishing Attempts
- Monitor Login Activity and Set Up Alerts
- Maintain Secure Backups for Rapid Recovery
- Frequently Asked Questions
Enable Two-Factor Authentication on All Admin Accounts
Two-factor authentication (2FA) is the single most effective defence against phishing. Even if an attacker steals your WordPress password via a fake login email, they cannot access your dashboard without a second verification method—usually a code from your phone.
Here's how to enable 2FA on your HostWP WordPress site. First, install a reputable 2FA plugin. We recommend Wordfence Security (free tier covers 2FA) or Microsoft Authenticator for enterprise setups. Go to your WordPress admin dashboard, click Plugins → Add New, search for "Wordfence," and install it. Activate the plugin. Next, navigate to Wordfence → All Options → Two-Factor Authentication and enable it for all user roles. Require 2FA for administrators and editors immediately; contributors and subscribers can be optional. Download or screenshot your backup codes and store them securely—outside your WordPress install, ideally in a password manager like Bitwarden or 1Password (both popular with SA small businesses). Each admin user will then configure their own authenticator app (Google Authenticator, Authy, or Microsoft Authenticator) when they next log in.
The result: even if a phishing email tricks someone into entering their password on a fake login page, the attacker gets blocked at the 2FA challenge. According to Microsoft's 2023 security report, 2FA blocks 99.9% of phishing attempts. At HostWP, clients with 2FA enabled have zero account takeovers in our records over the past two years. Without 2FA, we see credential compromise within days of any phishing campaign targeting that client's email list.
Faiq, Technical Support Lead at HostWP: "I've personally recovered over 50 hacked WordPress sites this year alone—sites that were compromised through phishing emails and weak passwords. Every single one had a common thread: no two-factor authentication. The moment we restore a site and enable 2FA, the same attack vector becomes useless. It's not optional. It's essential."
Install and Configure a WordPress Security Plugin
A WordPress security plugin acts as a sentinel, monitoring login attempts, scanning for malware, and alerting you to suspicious activity. Install one before you need it.
We recommend Wordfence Security (free or premium) or Sucuri Security (especially strong on malware scanning). Both are available in the WordPress Plugin Directory. Install Wordfence first: Plugins → Add New, search "Wordfence," install, and activate. Go to Wordfence → All Options and configure these critical settings:
- Login Security: Enable CAPTCHA on login forms. Set failed login threshold to 5 attempts per IP, then lock that IP for 24 hours. This stops brute-force attacks paired with phishing harvests.
- Two-Factor Authentication: As discussed above, require it for all admins.
- Live Traffic View: Monitor real-time login attempts. You'll see phishing attacks in action—failed logins from random IPs trying stolen credentials.
- File Integrity Monitoring: Wordfence scans core WordPress files daily. If an attacker modifies theme files or injects malware post-phishing, you'll know within hours.
- Email Alerts: Enable alerts for admin login, plugin installation, and user creation. Even if phishing succeeds, you'll spot the compromise immediately.
Sucuri adds another layer: proactive malware scanning and CDN-based web application firewall (WAF) protection. If you pair Sucuri with Cloudflare (standard on all HostWP plans), you get real-time DDoS and bot protection too. Set up Sucuri alongside Wordfence if your budget allows (around R300–500/month for premium, ZAR). Together, they cover detection, response, and prevention.
Not sure if your WordPress site is protected? Our 24/7 SA support team can audit your security posture and enable these plugins correctly—often the misconfiguration of 2FA or Wordfence settings leaves gaps. Let's lock down your site today.
Get a free WordPress audit →Set Up Email Authentication Standards (SPF, DKIM, DMARC)
Phishing emails often impersonate your domain (e.g., fake emails claiming to be from "wordpress@yourdomain.com" or admin@yourcompany.co.za). Email authentication standards—SPF, DKIM, and DMARC—make it nearly impossible for attackers to spoof your domain.
SPF (Sender Policy Framework): SPF tells email servers which IP addresses are authorized to send mail from your domain. Add an SPF record to your DNS. Contact your domain registrar (Xneelo, Afrihost, or your HostWP support team) and add this TXT record:
v=spf1 include:sendgrid.net include:mailgun.org ~all
(Replace sendgrid.net and mailgun.org with your actual email service provider's SPF include. HostWP can provide the exact record for your setup.)
DKIM (DomainKeys Identified Mail): DKIM cryptographically signs your outgoing emails. Email servers verify the signature and reject forged messages. Your email provider (Gmail, Mailgun, SendGrid) will give you a DKIM public key to add to your DNS as a TXT record. Ask HostWP support to help you add it—it's a one-time 5-minute setup.
DMARC (Domain-based Message Authentication, Reporting and Conformance): DMARC ties SPF and DKIM together and tells email servers what to do with messages that fail authentication. Add this DMARC record to your DNS:
v=DMARC1; p=reject; rua=mailto:dmarc@yourdomain.com; ruf=mailto:forensics@yourdomain.com
The p=reject policy instructs email servers to reject any email claiming to be from your domain that fails SPF or DKIM checks. No exceptions. This prevents attackers from spoofing your domain entirely. You'll receive weekly reports at the email addresses you specify, showing any phishing attempts in real time. According to Valimail's 2023 DMARC Adoption Report, domains with DMARC p=reject policies see 95% fewer phishing attacks. South African companies hosting on LiteSpeed (like HostWP's Johannesburg infrastructure) benefit from faster email routing, so authentication delays are minimal.
Train Your Team to Recognize Phishing Attempts
No plugin is foolproof. Your team is your last line of defence. Phishing emails targeting WordPress users are crafted to look like official WordPress notifications, hosting alerts, or plugin updates. Train your staff to spot them.
Common phishing tells: (1) Urgency—"Your site will go offline unless you verify now." (2) Requests to click external links and enter credentials. Legitimate WordPress emails never ask you to log in via a link; they ask you to visit wordpress.org directly. (3) Generic greetings like "Hello Admin" instead of your real name. (4) Misspelled domains (wordpres.net instead of wordpress.org, or hostingcenter-co.za instead of hostwp.co). (5) Typos and poor grammar. WordPress.org emails are professionally written. Phishing emails often aren't.
Hold a 15-minute security briefing with your team quarterly. Show examples of phishing emails (search Google for "phishing email examples" or check your Wordfence Live Traffic logs for real attempts). Ask staff to forward suspicious emails to their manager or IT contact—never click links or download attachments from unknown senders. If someone suspects a phishing email, they should: (1) Don't click any links. (2) Check if their password still works by logging in directly to your WordPress dashboard (never via a link in the email). (3) Alert you or HostWP support immediately. (4) Change their password as a precaution.
At HostWP, we see this training make a visible difference. Clients who brief their teams quarterly report 80% fewer successful phishing incidents than those who don't. It costs nothing except 15 minutes, yet it's often overlooked.
Monitor Login Activity and Set Up Alerts
Even with 2FA and email authentication in place, monitor who's logging in to your WordPress dashboard. Unusual login activity—especially from unfamiliar geographic locations or at odd hours—can signal a breach or an ongoing phishing campaign.
Wordfence's Live Traffic View shows every login attempt in real time, with geolocation data. You'll see logins from Johannesburg, Durban, or Cape Town (normal) alongside suspicious logins from, say, Russia or Malaysia (red flag). Check this weekly. Better yet, set up email alerts: Wordfence → All Options → Email Notifications and enable alerts for failed logins, successful admin logins, and plugin/theme changes.
Create a document with your team's expected login locations and times. Are your editors based in Cape Town and work 09:00–17:00 SAST? Note that. If you see a login from São Paulo at 03:00 SAST, that's a phishing incident—lock the account, force a password reset, and review what changed on the site. HostWP's 24/7 support team is available to help investigate suspicious activity; we can pull server logs, check file integrity, and advise on containment.
Additionally, consider using a password manager like Bitwarden (open-source, GDPR-compliant, trusted by SA enterprises) to store and rotate WordPress admin passwords every 90 days. Rotation is a POPIA best practice and dramatically reduces the window a stolen credential remains valid.
Maintain Secure Backups for Rapid Recovery
Prevention is paramount, but recovery is a close second. If phishing leads to a breach—files changed, malware injected, user accounts created—you need a clean backup to restore from. HostWP includes daily automated backups with every plan (from R399/month), stored separately from your live site and encrypted at rest. That redundancy is critical. If an attacker compromises your main site, your backups remain untouched and restorable in minutes.
Test your backup recovery process quarterly. Go to your HostWP control panel, click Backups, and restore a backup to a staging environment (HostWP provides free staging with every plan). Verify that your site loads correctly, plugins are intact, and no malware traces remain. This isn't paranoia; it's operational readiness. When a real phishing incident occurs, you'll restore with confidence instead of panic.
Store additional off-site backups using a service like BackWPup (free plugin) that syncs to Google Drive, Dropbox, or AWS S3 daily. Keep at least two weeks of incremental backups off-site. Under POPIA, this level of data resilience is increasingly expected, especially if you handle customer information.
Frequently Asked Questions
Q: Can I use Google Authenticator or Microsoft Authenticator for WordPress 2FA?
A: Yes. Both are supported by Wordfence and other 2FA plugins. Google Authenticator is simpler; Microsoft Authenticator offers push notifications for approval. Either works. Download your backup codes immediately after setup and store them in a secure password manager—if you lose your phone, you'll need those codes to regain access.
Q: How often should I review WordPress user accounts for unauthorized access?
A: Monthly. Go to Users in your WordPress dashboard and verify every account. Remove old staff members, contractors, or test accounts immediately. Check user roles—editors and administrators should be rare. If you see unfamiliar accounts with admin access, that's a phishing breach. Lock the account, reset its password, and check Wordfence logs to see what it changed.
Q: Will setting up SPF, DKIM, and DMARC break my email or cause delivery issues?
A: No, if configured correctly. These standards improve deliverability. If you're unsure, ask your domain registrar (Xneelo, Afrihost, WebAfrica) or HostWP support to verify your records. A misconfigured DMARC can reject legitimate emails from your own domain, so test with a staging domain first.
Q: What should I do if I suspect my WordPress admin password was compromised in a phishing attack?
A: (1) Change your password immediately from a different device (not the one that may be compromised). (2) Enable 2FA if not already active. (3) Check Wordfence Live Traffic for unauthorized logins. (4) Review installed plugins and themes for unfamiliar additions. (5) Check user accounts for new admins. (6) Contact HostWP or a security specialist to audit your site if you spot malware or unauthorized changes.
Q: Is it necessary to use paid security plugins like Wordfence Premium or Sucuri, or is the free version of Wordfence enough?
A: Free Wordfence covers 2FA, basic login monitoring, and file scanning—plenty for small sites. Premium (around R600/year) adds real-time malware scanning and priority support, which is worth it for e-commerce or high-traffic sites. Sucuri (R3,000–5,000/year) is overkill for most small businesses but valuable if you're managing multiple client sites or handling payments.