Keeping Websites Secure and Updated
Keeping Websites Secure and Updated: The Complete Protection Guide for African Businesses
Every business website in Kenya and across Africa that is accessible on the internet is being actively probed for vulnerabilities right now. Not by humans who have specifically targeted the business, but by automated tools that continuously scan millions of websites simultaneously, looking for known vulnerabilities in outdated software that they can exploit. The website does not need to be large, high-profile, or commercially important to attract this attention. It simply needs to be online and running software that has not been kept current.
Keeping websites secure and updated is therefore not an optional technical refinement for businesses that have the time and budget to invest in it. It is the foundational protection that every business website requires to continue serving its commercial purpose without interruption, without compromising its visitors, and without the catastrophic costs of security incidents that could have been prevented.
This guide gives you the complete practical understanding of what keeping websites secure and updated involves, why each component matters commercially, and how to implement a security and update programme that genuinely protects the business’s digital asset without requiring technical expertise to understand or manage.
The Commercial Stakes of Website Security in the African Market
Understanding the commercial case for keeping websites secure and updated requires understanding the specific commercial stakes of website security failures for businesses in Kenya and across Africa.
For most Kenyan business websites, the primary commercial function is customer acquisition: attracting potential customers through organic search, converting them through effective design and trust architecture, and initiating the commercial relationships that generate revenue. A security compromise that takes the website offline, infects it with malware, or causes Google to flag it as dangerous interrupts every element of this commercial function simultaneously.
The period during which a compromised website is inaccessible or flagged as dangerous is a period during which the website generates zero commercial value from what may be the business’s most important customer acquisition channel. For a business that receives fifty qualified enquiries per month from its website, a two-week security incident that takes the website offline represents approximately twenty-five lost commercial opportunities, each of which had a measurable commercial value. These are not speculative losses. They are the direct commercial consequence of a security incident that adequate security maintenance would have prevented.
The reputational dimension adds to the commercial cost. A potential customer who encounters a browser security warning when trying to access a business website does not typically persist to investigate whether the warning is a false positive. They navigate away and consider an alternative provider. The impression this creates about the business, even if it is never articulated as a specific concern, is one of technical incompetence or unreliability that works against the business in any future encounter.
For e-commerce businesses and businesses that handle customer data through their websites, the Kenya Data Protection Act adds a regulatory dimension to the commercial security stakes. A security breach that results in the exposure of customer personal data creates compliance obligations and potential liability that compound the direct commercial cost of the incident. The combination of commercial losses, remediation costs, and regulatory exposure makes the business case for adequate security investment one of the strongest available in any category of business risk management.
The Software Update Foundation: Why Updates Are Security
The most fundamental component of keeping websites secure and updated is the consistent and timely application of software updates, specifically updates to the WordPress core installation, the active theme, and all installed plugins. As we established in our guide on risks of ignoring website updates, these updates exist primarily to address security vulnerabilities that have been discovered in existing software versions.
The security update mechanism works as follows. A security researcher or a malicious actor discovers a vulnerability in a specific version of a WordPress plugin, for example. The vulnerability may allow unauthorised access to the website’s database, enable the upload of malicious files, or permit remote code execution. The discovery is reported to the plugin developer, who releases an updated version that closes the vulnerability. The update is published, and users of the plugin receive notification that an update is available.
At this point, the vulnerability is effectively public knowledge: anyone who investigates the changelog of the update can determine what specific vulnerability was addressed in the previous version. This public knowledge is what makes the period between update release and update installation commercially dangerous. Automated tools that scan for websites running the vulnerable version of the plugin can identify and attempt to exploit the vulnerability from the moment it becomes public, which is the moment the update is released.
For businesses whose websites have pending plugin updates, each outstanding update represents a specific, publicly documented vulnerability that automated scanners are actively attempting to exploit. The accumulation of uninstalled updates over weeks or months represents an accumulating exposure to multiple specific vulnerabilities, each of which is an active risk rather than a theoretical one.
The commercial protection of timely update installation is therefore not preventive in the general sense of reducing some abstract future risk. It is protective in the immediate and specific sense of closing specific known vulnerabilities that are being actively targeted from the moment they become public.
A practical update schedule for Kenyan business websites should include weekly checking for available updates with immediate installation of any security-critical updates, monthly comprehensive update cycles for all pending updates that include backup creation before updates are applied and post-update functionality verification, and prompt attention to any urgent security notifications from the WordPress security community or from the developers of specific plugins the website uses.
Password Security: The Access Control Foundation
Keeping websites secure and updated requires strong password security as the access control foundation that prevents unauthorised access to the website’s administrative systems, even when all other security measures are in place.
Weak passwords are among the most exploited attack vectors for WordPress websites. Automated brute force attacks that systematically try common passwords and password combinations against WordPress login pages are a continuous background threat for any publicly accessible WordPress installation. A website with a strong update and security maintenance programme but weak administrative passwords is vulnerable to the specific attack vector that password security addresses.
Strong password security for a business website involves several specific practices. Administrative user accounts for the WordPress dashboard should use long, complex passwords that combine uppercase and lowercase letters, numbers, and special characters. These passwords should be unique to the website and not reused from other accounts or services. Password managers facilitate the use of genuinely strong, unique passwords without requiring memorisation.
The default WordPress admin username should be changed from the predictable admin to something specific to the business, because brute force attacks often specifically target the admin username. Using a specific, non-obvious administrative username eliminates the credential-guessing advantage that the predictable default provides.
Two-factor authentication for WordPress administrative access adds a second layer of protection beyond the username and password combination. With two-factor authentication enabled, even a correctly guessed password is insufficient to gain access without the second factor, typically a time-limited code from an authenticator app on the administrator’s smartphone. For business websites where administrative access is particularly commercially sensitive, two-factor authentication is one of the highest-impact security improvements available.
Limiting login attempts prevents brute force attacks from progressing beyond a defined number of incorrect attempts. Security plugins that implement login attempt limiting will lock out IP addresses that make multiple incorrect login attempts within a defined time period, which disrupts the automated brute force tools that depend on being able to make thousands of attempts.
SSL Certificates: The Encryption Foundation
A fundamental element of keeping websites secure and updated that directly affects both visitor trust and Google search rankings is the SSL certificate that provides encrypted communication between the website’s server and visitors’ browsers.
A website with a properly installed and current SSL certificate communicates over HTTPS, which is indicated to visitors by the padlock icon in the browser address bar. The encryption this provides protects any data that visitors submit through the website, including contact form submissions, login credentials, and payment information, from interception during transmission.
Without an SSL certificate, modern browsers display a security warning that labels the website as not secure. For potential customers evaluating whether to trust the business with their contact information or payment details, this security warning is a significant deterrent that directly reduces conversion rates. Google also treats the presence of HTTPS as a minor ranking signal, meaning that HTTPS websites have a small but real ranking advantage over equivalent HTTP websites.
For most business websites in Kenya, SSL certificates are provided by the hosting provider as part of the hosting package or at very low additional cost. Let’s Encrypt, a free certificate authority that is supported by most quality hosting providers, provides SSL certificates at no charge. The primary maintenance requirement for SSL certificates is ensuring they are renewed before expiration, typically annually or every ninety days for Let’s Encrypt certificates, and that any renewal process is automated or actively managed to prevent certificate expiration that would cause browsers to display security errors to visitors.
For e-commerce websites that process payments directly, an extended validation SSL certificate that provides the highest level of certificate validation is worth considering as an additional trust signal for the specific commercial context of financial transaction processing.
Web Application Firewall: The Active Defence Layer
Beyond the passive defence of keeping software updated and access secured, keeping websites secure and updated benefits from an active defence layer in the form of a web application firewall that monitors incoming traffic and blocks requests that match known attack patterns.
A web application firewall sits between the internet and the website, examining every request before it reaches the website’s server. Requests that match patterns associated with known attack types, including SQL injection attempts, cross-site scripting attacks, malicious file upload attempts, and brute force login attacks, are blocked before they can interact with the website’s software. This active blocking provides protection even for vulnerabilities that have not yet been addressed by software updates, since the attack pattern is blocked regardless of whether the specific vulnerability it targets has been patched.
For Kenyan business websites, the most accessible web application firewall is the one provided by Cloudflare, which offers free-tier WAF protection as part of its broader content delivery and security service. Cloudflare sits between the website and internet visitors, which means its WAF protection is available at no additional infrastructure cost beyond the DNS configuration change required to route traffic through Cloudflare’s network.
Premium WAF solutions like Sucuri and Wordfence Premium offer more comprehensive protection with more frequently updated rule sets, dedicated security monitoring, and response support in the event of a security incident. For businesses whose websites are high-traffic or commercially critical, the additional investment in premium WAF protection may be commercially justified by the enhanced protection it provides.
Backup Systems: The Recovery Foundation
Every discussion of keeping websites secure and updated must include a serious treatment of backup systems, because no security programme is complete without the recovery capability that backups provide. Security measures reduce the probability of incidents but cannot reduce it to zero. When incidents do occur despite adequate security measures, the availability of current, verified, off-server backups determines whether the business recovers quickly at minimal cost or faces catastrophic data loss with severe commercial consequences.
The most important principle of an effective backup system is the three-two-one rule: maintain three copies of the data, on two different types of storage, with one copy stored off-site. For website backups, this means the website data exists in its live state on the hosting server, a backup exists on a different storage medium such as a backup storage service, and at least one copy exists in an entirely separate location such as cloud storage, that is not connected to the hosting server and would not be affected by a compromise of that server.
The frequency of backups should reflect the rate at which the website’s content changes. A website with daily new content requires daily backups to minimise the content loss from any given incident. A website whose content changes weekly requires weekly backups at minimum, with more frequent backups for particularly commercially important content additions.
Backup verification is as important as backup creation. A backup that exists but cannot be successfully restored provides false security rather than genuine protection. Periodic restoration tests that verify a backup can actually be restored to a functional website state confirm that the backup system is genuinely protective rather than merely generating files whose usability has never been confirmed.
Many quality WordPress hosting providers include automated backup creation and off-server backup storage as part of their hosting packages. Backup plugins like UpdraftPlus and BlogVault provide additional control over backup frequency, storage location, and restoration capability. For businesses whose websites are commercially critical customer acquisition assets, redundant backup systems that use multiple storage locations provide the most robust recovery capability.
Security Monitoring: The Ongoing Detection Layer
Keeping websites secure and updated is not only about preventing security incidents but also about detecting them quickly when they do occur, because the commercial damage of a security incident is directly proportional to the time between the incident occurring and its detection and resolution.
Security monitoring tools continuously scan the website for indicators of compromise: changes to core files that might indicate unauthorised code injection, new files in unexpected locations that might represent malware installations, suspicious database queries that might indicate SQL injection exploitation, and changes to administrative user accounts that might indicate unauthorised access.
The most accessible security monitoring tool for WordPress websites is Wordfence, which provides both a web application firewall and malware scanning functionality. The free version of Wordfence includes scheduled malware scanning and email alerts when security issues are detected. The premium version provides real-time rule updates and a more comprehensive threat detection capability.
Google Search Console provides a specific type of security monitoring through its Security Issues report, which notifies website owners when Google detects security problems during its crawling of the website. Monitoring Search Console regularly and responding promptly to any security notifications ensures that Google-detected security issues are addressed before they affect search rankings or trigger browser security warnings for visitors.
Uptime monitoring, while not strictly a security tool, complements security monitoring by alerting the website owner when the website becomes inaccessible. A sudden unexpected downtime event can indicate a security incident that has taken the website offline, making uptime monitoring an early warning signal that warrants security investigation in addition to technical support engagement.
User Account Security: Managing Access Appropriately
A frequently overlooked component of keeping websites secure and updated is the management of user accounts on the website’s content management system. For most small Kenyan business websites with a single administrator and occasional contributor access, user account management is simple. For websites with multiple administrators, editors, or contributors, proper user account security is a meaningful risk management consideration.
The principle of least privilege dictates that each user account should have only the access level required for its specific function. An account used only to write blog posts does not require administrator-level access, and should be assigned the editor or contributor role rather than the administrator role. This limits the potential damage if that account is compromised: a compromised contributor account cannot install plugins or change site settings, limiting the attacker’s ability to escalate the compromise beyond the content the account can access.
Accounts for former employees, former contractors, or any other individuals who no longer have a legitimate reason to access the website should be removed promptly when their access need ends. Dormant accounts that are no longer actively used represent an unnecessary attack surface, particularly if the passwords on those accounts have not been recently changed and may have been shared or otherwise compromised.
Regular review of the website’s user account list, ensuring that every active account has a legitimate current reason to exist and is assigned appropriate access permissions, is a simple security hygiene practice that eliminates a common source of unauthorised access.
Hosting Security: The Infrastructure Foundation
The security of the hosting infrastructure on which the website runs is the foundational layer on which all other security measures depend. Keeping websites secure and updated at the hosting level involves choosing hosting providers that maintain their server infrastructure at an appropriate security standard and that provide the specific security features that business websites require.
Quality managed WordPress hosting providers maintain their server environments with current software versions, including current PHP versions and web server software, that address infrastructure-level vulnerabilities. They implement server-level security measures including firewalls, intrusion detection systems, and malware scanning that provide protection at the infrastructure level below the application level where WordPress-specific security tools operate. And they maintain separation between hosted websites so that a compromise of one website on the hosting environment does not automatically create access to other websites on the same server.
For Kenyan business websites, the hosting security consideration also has a geographic dimension. Hosting that is physically located closer to Kenyan users typically provides better loading performance due to reduced network latency, but the security standards of the hosting provider are more commercially significant than the geographic location of the servers. A quality hosting provider with servers in Europe or South Africa that maintains rigorous security standards provides better protection than a geographically closer provider whose security practices are inadequate.
When evaluating hosting providers for a Kenyan business website, the specific security-relevant questions to ask include whether server software including PHP is kept current, whether automated daily backups are included, whether malware scanning is provided, whether DDoS protection is included, and what the provider’s security incident response process involves.
Creating a Security and Update Schedule for Your Business
Keeping websites secure and updated at a level that genuinely protects commercial performance requires a specific, recurring schedule of security and update activities rather than ad hoc attention when problems become visible. The following schedule provides a practical framework for most Kenyan business websites.
Daily activities should include uptime monitoring checks if the monitoring tool does not provide automated alerts, and a quick scan of any security alert emails from monitoring tools.
Weekly activities should include checking the WordPress dashboard for available updates and installing any security-critical updates immediately, reviewing Google Search Console for any new security issues or manual actions, and verifying that automated backups have been created successfully.
Monthly activities should include a comprehensive update cycle covering all pending WordPress core, theme, and plugin updates with backup creation before each update and post-update functionality verification. They should also include a review of user account permissions to ensure all active accounts have appropriate access levels and all inactive accounts have been removed. Performance testing using Google PageSpeed Insights should be conducted to identify any performance degradation that requires attention.
Quarterly activities should include a comprehensive security scan using a tool like Wordfence or Sucuri to identify any security issues that the continuous monitoring may have missed. They should include a backup restoration test to verify that the backup system can actually restore the website to a functional state. And they should include a review of the hosting environment’s security features to ensure they remain appropriate for the website’s current commercial importance.
Annually, the SSL certificate renewal should be verified if it is not automated, the hosting arrangement should be reviewed against current performance and security requirements, and the complete security posture of the website should be assessed against any new threats or best practices that have emerged in the past year.
At AfricanWebExperts, this security and update schedule is the foundation of every website maintenance programme we provide for businesses across Kenya and Africa. We implement and manage this schedule on behalf of our clients, providing the professional oversight and technical capability that most business owners do not have the time or expertise to provide for themselves.
Frequently Asked Questions
What is the minimum security investment a Kenyan business website should make?
The minimum commercially adequate security investment involves four specific components: timely installation of all software updates, a strong password policy with unique administrative credentials, a current SSL certificate maintained without expiration, and a regular backup system with off-server storage. These four components provide the foundational protection against the most commercially significant security risks without requiring advanced technical knowledge or substantial financial investment beyond the time required to maintain them.
How do I know if my website has already been compromised?
Several free tools can identify common indicators of compromise. Google’s Safe Browsing tool at transparencyreport.google.com allows you to check whether your specific website URL is flagged in Google’s security database. Google Search Console provides a Security Issues report that notifies you of any security problems Google has detected. Sucuri’s free SiteCheck tool at sitecheck.sucuri.net scans for malware and known security issues. If any of these tools indicate a problem, professional remediation assistance should be sought immediately.
Is it safe to update WordPress plugins without testing them first?
For most standard plugin updates, particularly security updates, the risk of the update causing problems is significantly lower than the risk of leaving the vulnerability unpatched. The most prudent approach is to create a backup before applying any updates, which ensures that if an update does cause a problem the website can be restored to its pre-update state quickly. For major version updates or updates to plugins with complex functionality, testing on a staging environment before applying to the live site is advisable if the staging environment is available.
Should I use a security plugin or rely on hosting-level security?
Both provide different types of protection that complement rather than substitute for each other. Hosting-level security protects the server infrastructure and other websites on the same server. Application-level security plugins like Wordfence protect the WordPress installation specifically from the attacks that target its specific vulnerabilities. Using both provides defence in depth, with multiple independent layers of protection that an attacker must overcome rather than a single layer whose failure leaves the website unprotected.
What should I do immediately if I discover my website has been compromised?
Take the website offline if possible to prevent continued visitor exposure to malware and to limit the continued damage of the compromise. Contact your hosting provider to notify them of the security incident and to request their assistance with the response. Contact a professional web security specialist or your web design company for remediation assistance. Do not attempt to remove malware yourself without the appropriate technical knowledge, as incomplete malware removal often leaves the website vulnerable to immediate reinfection. Once the website has been professionally cleaned, all passwords should be changed, all user accounts should be reviewed, and the specific vulnerability that was exploited should be identified and addressed before the website is returned to live status.
Security Is Not a Feature. It Is the Foundation.
Keeping websites secure and updated is the foundation on which everything else the website does commercially depends. The organic search rankings the website has built, the visitor trust it has earned, the conversion architecture it has developed, and the brand credibility it communicates can all be destroyed in hours by a security incident that adequate maintenance would have prevented.
For businesses in Kenya and across Africa whose websites are meaningful commercial assets, the investment in professional security and update maintenance is not an optional overhead for businesses that have budget to spare. It is the commercial protection that the initial web design investment requires to continue generating the returns it was designed to produce, without the interruptions, the reputation damage, and the catastrophic costs that security negligence consistently produces.
At AfricanWebExperts, keeping the websites we build secure, updated, and commercially protected is a responsibility we take seriously for every client we serve across Kenya and Africa. Our maintenance programmes are built around the security and update practices described in this guide, providing the professional oversight that transforms website security from a theoretical commitment into a consistently maintained commercial protection.
👉 Get your free quote on WhatsApp and let us assess your current website’s security posture and show you what a comprehensive security and maintenance programme looks like for your specific website.
Or visit our Contact page and one of our experts will be happy to start that conversation with you.
