{"id":16479,"date":"2017-05-11T15:18:17","date_gmt":"2017-05-11T15:18:17","guid":{"rendered":"https:\/\/www.heartinternet.uk\/blog\/?p=16479"},"modified":"2017-05-11T15:18:17","modified_gmt":"2017-05-11T15:18:17","slug":"hackers-can-harm-websites-security-seo-ways-keep-safe","status":"publish","type":"post","link":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/","title":{"rendered":"How hackers can harm your website&#8217;s SEO (and ways to keep safe)"},"content":{"rendered":"<p>Think your website is secure?<\/p>\n<p>Google has been cracking down on security, and the numbers aren\u2019t pretty:<\/p>\n<ul>\n<li>32% increase in the number of hacked sites in 2016 compared to 2015<\/li>\n<li>61% of webmasters who were hacked didn\u2019t even know about it because their sites weren\u2019t verified in Google\u2019s Search Console.<\/li>\n<\/ul>\n<p>And if this isn\u2019t worrisome enough, consider these stats from Symantec\u2019s 2016 Internet Security Threat report:<\/p>\n<ul>\n<li>More than 75% of legitimate sites have unpatched vulnerabilities<\/li>\n<li>15% of legitimate sites have vulnerabilities deemed \u201ccritical\u201d, which means a cybercriminal can attack those sites with minimum effort<\/li>\n<li>1 in 3,172 websites were found with malware in 2015, almost triple to 2014.<\/li>\n<\/ul>\n<p>So any webmaster who fails to secure their website should be aware that hackers will take any vulnerability as an open invitation to gain access and manipulate a site.<\/p>\n<p>Now, would it surprise you to know that the number one reason why websites get hacked is not to steal customer data?<\/p>\n<p>Believe it or not, SEO spam is one of the main reasons why hackers target vulnerable websites. Why? Because they can just hijack a vulnerable site and redirect visitors to malicious sites, causing you to lose customers.<\/p>\n<p>While losing customers at the time of the hacking is painful, the long-term impact is even worse.<\/p>\n<p>Imagine a potential customer runs a search for your site on Google and what they see is this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-16489\" src=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/SEO-snippet.png\" alt=\"\" width=\"549\" height=\"131\" \/><\/p>\n<p>If that happens, this can not only affect your reputation but also your SEO efforts because:<\/p>\n<ul>\n<li>Google can penalise your website as an \u201cattacked\u201d site or site hosting malware. When that happens, that costs you money because your rankings will drop, which means your site traffic and sales will drop as well. Also, Google will continue to show the above message in search for 30 days for repeat offenders.<\/li>\n<li>Customers will lose trust in your site. If your website security is compromised, people will no longer feel safe on your site, knowing that all activity and confidential data they share with you may no longer be as secure as they thought. Regaining that trust is not easy.<\/li>\n<\/ul>\n<p>So, no matter how much work you put into optimising your site for users and search engines, if security is not a priority all that hard work will be gone in an instant the moment a hacker gets into your site and compromises everything.<\/p>\n<h3>How hackers get in<\/h3>\n<p>To protect your site and prevent cybercriminals from attacking it, you must first understand how they act.<\/p>\n<p>So, how do hackers get into a site?<\/p>\n<p>The three most commons ways are through:<br \/>\n1. Access control<br \/>\n2. Software vulnerabilities<br \/>\n3. Third-party services<\/p>\n<p><strong>1. Access Control<\/strong><\/p>\n<p>Access control doesn\u2019t just refer to how you log into your website but into other areas as well such as:<br \/>\n\u2022 Hosting panel<br \/>\n\u2022 Server (i.e., FTP, SFTP, SSH)<br \/>\n\u2022 Your computer<br \/>\n\u2022 Your social media networks<\/p>\n<p>It\u2019s like that host that holds a guest list at the door, taking responsibility for checking who is allowed entry, but leaves their post to enjoy the party. Why even bother if anyone can stroll straight through?<\/p>\n<p>With this type of attack, hackers usually attempt to guess the possible username and password combinations in an effort to log in as the users.<\/p>\n<p>There are also more complex social engineering attempts phishing pages designed to capture a users\u2019 log in information, or some form of Cross-Site Scripting (XSS) or Cross Site Request Forgery (CSRF) attack where the hackers tries to intercept the user credentials via their own browser.<\/p>\n<p>And, of course, there\u2019s also the well-known Man in the Middle (MITM) attack where the hackers intercepts your username and password while working via insecure networks and your credentials are transferred between one point to another via plain text.<\/p>\n<p><strong>2. Software vulnerabilities<\/strong><\/p>\n<p>Most site owners, no matter how skilled, are unable to address today\u2019s software vulnerabilities. That\u2019s because most of us use things as they are designed. That includes web servers, infrastructure, even your browser. So, anywhere there\u2019s a system, there\u2019s a potential software vulnerability that attackers can exploit.<\/p>\n<p>The two most common ways for hackers to exploit software vulnerability is through:<\/p>\n<ul>\n<li>Uniform Resource Locator (URL) or<\/li>\n<li>POST Headers<\/li>\n<\/ul>\n<p>With these two methods, a hacker can run a number of attacks, such as: Remote Code Execution (RCE), Remote \/ Local File Inclusion (R\/LFI), and SQL Injection (SQLi) attacks. Of course, there are many other, but these are the most common ones that are affecting today\u2019s websites.<\/p>\n<p>So, if a hacker can get into your software they can probe your SQL database for vulnerabilities, install malicious HTML code, and make changes to your website.<\/p>\n<p><strong>3. Third-party services<\/strong><\/p>\n<p>Third-party integrations and services are extremely popular and widely-used, especially in CMSs like WordPress, Joomla! And Drupal.<\/p>\n<p>Now, the problem with third-party services is that they\u2019re beyond a site owner\u2019s control. When you integrate third-party providers you usually assume that they\u2019re safe, but that may not always be the case.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11830\" src=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/worldbackupday-laptop.jpg\" alt=\"Someone sitting with a laptop on their lap\" width=\"600\" height=\"300\" \/><\/p>\n<h3>Ways to prevent an attack<\/h3>\n<p>But enough of this scare fest. There are things you can do to protect your website against these attacks.<\/p>\n<p>Here\u2019s a roundup of the easiest steps to take:<\/p>\n<p><strong>1. Make sure your passwords are secure<\/strong><\/p>\n<p>This one seems obvious, but it\u2019s extremely important.<\/p>\n<p>It may be tempting to use a password you know will always be easy for you to remember, and to use it for almost everything \u2013 from gaining access to your website to logging into your social media accounts. You can and have to do better than that if you want to keep your site secure.<\/p>\n<p>So come up with a strong, secure password. Make it long and use a combination of special characters, numbers, and letters. And definitely steer clear of easy-to-guess keywords like your birthday or your dog\u2019s name. If a hacker is trying to gain access to your site, you can be sure they\u2019ll have no trouble finding this information about you so don\u2019t make their job easier.<br \/>\nIf you\u2019re working with a team, have them do the same. It only takes one weak password to make your entire website vulnerable.<\/p>\n<p><strong>2. Toughen up access control<\/strong><\/p>\n<p>Apart from enforcing passwords, you should also limit the number of login attempts within a certain name, even with password resets. Also, avoid sending login information via email, in case a hacker gains access to the email account.<\/p>\n<p><strong>3. Keep everything up-to-date<\/strong><\/p>\n<p>Delaying an update can expose you to an attack so if there\u2019s one simple thing you can do to protect your website that\u2019s to make sure that every piece of software you run is up-to-date.<\/p>\n<p>Why is this important? Because many of the tools and plugins we use are open-source, which means the code is easily available to everyone. This includes malicious hackers who can scan the code looking for security loopholes and weaknesses that allow them to take control of your site.<\/p>\n<p>So make sure you always have the latest versions of your platform and scripts to minimise the risk of an attack.<\/p>\n<p>At the same time, you should clean out your website of any old, unused plugins because these are like sitting ducks for hackers. They\u2019ll not hesitate to use them as a gateway to gain access to your site and wreak havoc on it.<\/p>\n<p><strong>4. Use SSL<\/strong><\/p>\n<p>For both SEO reasons and user security reasons, set your site up over HTTPS with an SSL certificate. An encrypted SSL protocol will prevent any transfer of users\u2019 personal information between your site and database from being read in transit and accessed without the proper authority.<\/p>\n<p>The cost to you is minimal, but the extra level of encryption it offers to your customers goes a long way to making your website more trustworthy and secure.<\/p>\n<p><strong>5. Use parameterized queries<\/strong><\/p>\n<p>One of the most common ways for hackers to attack a site is through SQL injections. SQL injections can occur when you have a web form or URL parameter that allows outside users to supply information. So if you leave the parameter of the field open, a hacker can insert code into them to gain access into your database.<\/p>\n<p>There are steps you can take to protect your website from SQL injection hacks, and one of the most important and easiest to implement is the use of parameterized queries. These types of queries ensure that your code has parameters that are specific enough so hackers can\u2019t get in. This guide explains how and why to use parameterized queries to avoid SQL injection attacks.<\/p>\n<p><strong>6. Install security plugins, whenever possible<\/strong><\/p>\n<p>There are plugins you can use to enhance your website security and protect it against hacking attempts. If you\u2019re working with WordPress, you can use free plugins like BulletProof Security or iThemes Security. If you\u2019re using a different CMS, it might be worth investing in a website security monitoring tool that can scan your site on a daily basis for malware, viruses and vulnerabilities.<\/p>\n<p><strong>7. Hide your admin pages<\/strong><\/p>\n<p>You really don\u2019t need your admin pages to show up in search engines. One thing you can do is to add the URLs to your robots.txt file, which will prevent them from showing in the search results but only if there are no other links pointing to those URLs.<\/p>\n<p>If you want to reliably block a page from showing in the search results, you\u2019ll need to use a robots meta tag set on \u201cnoindex\u201d. This way when the search engine finds the page and sees the noindex tag, it will know not to show that page in the search results.<\/p>\n<p><strong>8. Limit file uploads<\/strong><\/p>\n<p>File uploads are a major concern because it\u2019s one of the ways hackers can gain access to your site\u2019s data. So the easiest solution is to prevent direct access to any uploaded files. Store them outside the root directory and use a script to access them whenever necessary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11001\" src=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/sysadminrecruitment-laptop.jpg\" alt=\"\" width=\"600\" height=\"200\" \/><\/p>\n<h3>What to do if your site has been compromised<\/h3>\n<p>In the event your site gets hacked, there are things you can do to fix it. Just make sure you act fast.<\/p>\n<p>Google\u2019s in-depth guide explains the steps to follow to assess the damage, identify the vulnerability and clean up your site.<\/p>\n<p>Here\u2019s an overview:<\/p>\n<p><strong>Step 1: Verify ownership of your site<\/strong><\/p>\n<p>The road to recovery starts with verifying ownership of your website in Search Console. So sign into Search Console using your Google account (or create a new one). Click add a site, enter in your site\u2019s URL, and click continue. Then choose the verification method that works for you. Once you\u2019ve clicked Verify, you\u2019ll see a screen mentioning you\u2019re the verified owner.<br \/>\nThis step is very important because with a verified website you can get notified of any security issues.<\/p>\n<p>Next, go to your Search Console account, click Manage Site, then Add or Remove Users. This allows you to check and see whether the hacker already claimed ownership of your site. If there is a user you are unaware of, delete them immediately.<\/p>\n<p><strong>Step 2: Inform your host<\/strong><\/p>\n<p>The second thing you should do is to let your host know that your site has been attacked. This allows them to take measures to ensure their other customers on the same server won\u2019t be compromised. They may also help you find out how your site was compromised and how to recover.<\/p>\n<p><strong>Step 3: Take your site offline<\/strong><\/p>\n<p>You should do this for two reasons:<\/p>\n<ul>\n<li>Prevent the hacker from causing further damage to your site<\/li>\n<li>Prevent visitors from landing on your site only to see a scary malware alert<\/li>\n<\/ul>\n<p>So stop your webserver or point your site\u2019s DNS entries to a static page on an entirely different server that uses a 503 HTTP response code. This code is a useful signal that the site is temporarily unavailable. According to Google, taking your site offline briefly is unlikely to affect your site\u2019s future rankings in the search results.<\/p>\n<p>At the same time, you should review your user accounts, especially the newest ones as one of them could be the hacker\u2019s. Look into these accounts and delete the ones that look suspicious. Also change the passwords for all site users and accounts, including logins for FTP, database access, system administrators, and content management system (CMS) accounts.<\/p>\n<p><strong>Step 4: Determine how you were hacked<\/strong><\/p>\n<p>Once verified, check the messages in your Search Console to see whether you received any information from Google regarding whether your site was used for 1) serving spammy pages, text or links, 2) phishing, 3) distributing malware. You can also go to the Security Issues tab to get more information on the type of attack on your site.<\/p>\n<p>Was your site hacked with spam? This Google video highlights spam techniques, how to investigate your site for spam, and how to find all the affected files.<\/p>\n<p><iframe loading=\"lazy\" title=\"Help for hacked sites: Assess the damage (hacked with spam)\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/lG5lOix9b9k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Was your site infected with malware? Then the hacker could be using your site to harm visitors with malware software designed to create havoc and steal information from your computer. Watch this video to learn how to investigate the malware and find out which files were affected.<\/p>\n<p><iframe loading=\"lazy\" title=\"Help for hacked sites: Assess the damage (hacked with malware)\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/Snt45fZQIiU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><strong>Step 5: Clean up<\/strong><\/p>\n<p>Here are a few things you should do to clean up your site:<\/p>\n<p>\u2022 Remove anything that was added by the hacker (i.e. content, links), then restore your latest backup. Install all software and program updates.<br \/>\n\u2022 Eliminate third party widgets you rarely use.<br \/>\n\u2022 Perform a clean installation on your server.<br \/>\n\u2022 Transfer good content from the backup file copy to the recently installed server. Only upload the files you know are clean.<\/p>\n<p><strong>Step 6: Ask Google for a review<\/strong><\/p>\n<p>Have you verified your site\u2019s ownership in Google\u2019s Search Console? Is your site clean with no trace of the hacker? Have you brought your clean site back online?<\/p>\n<p>If you answered YES to all these questions, it\u2019s time for a Google review. This is a necessary step to have the warnings associated with your website lifted as it lets Google know that you\u2019ve taken the steps to fix all the issues with your site. If Google determines your site is clean, they will approve the review and at the same time remove the \u201cthis website is not safe\u201d messages that show up in the search results.<\/p>\n<h3>In conclusion<\/h3>\n<p>Website security isn\u2019t just about keeping your site secure and making your visitors feel safe. It\u2019s also about protecting confidential user information, thus protecting your reputation and search engine rankings as well. These are things you definitely don\u2019t want to risk losing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out why hacking can hurt your SEO, and what to do to protect your website and your rankings.<\/p>\n","protected":false},"author":2,"featured_media":10919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19,29],"tags":[],"class_list":{"0":"post-16479","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-search-engine-tips","8":"category-your-website"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How hackers can harm your website&#039;s SEO (and ways to keep safe) - Heart Internet<\/title>\n<meta name=\"description\" content=\"How hackers can harm your website&#039;s SEO (and ways to keep safe) - Written by the team at Heart Internet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How hackers can harm your website&#039;s SEO (and ways to keep safe) - Heart Internet\" \/>\n<meta property=\"og:description\" content=\"How hackers can harm your website&#039;s SEO (and ways to keep safe) - Written by the team at Heart Internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"Heart Internet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/heartinternet\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-11T15:18:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1620\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eliot Chambers-Ostler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:site\" content=\"@heartinternet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eliot Chambers-Ostler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\"},\"author\":{\"name\":\"Eliot Chambers-Ostler\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\"},\"headline\":\"How hackers can harm your website&#8217;s SEO (and ways to keep safe)\",\"datePublished\":\"2017-05-11T15:18:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\"},\"wordCount\":2443,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg\",\"articleSection\":[\"Search Engine Tips\",\"Your Website\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\",\"name\":\"How hackers can harm your website's SEO (and ways to keep safe) - Heart Internet\",\"isPartOf\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg\",\"datePublished\":\"2017-05-11T15:18:17+00:00\",\"description\":\"How hackers can harm your website's SEO (and ways to keep safe) - Written by the team at Heart Internet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg\",\"width\":1620,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.heartinternet.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How hackers can harm your website&#8217;s SEO (and ways to keep safe)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heartblog.victory.digital\/#website\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"name\":\"Heart Internet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heartblog.victory.digital\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/heartblog.victory.digital\/#organization\",\"name\":\"Heart Internet\",\"url\":\"https:\/\/heartblog.victory.digital\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp\",\"width\":992,\"height\":252,\"caption\":\"Heart Internet\"},\"image\":{\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/heartinternet\/\",\"https:\/\/x.com\/heartinternet\",\"https:\/\/www.linkedin.com\/company\/heart-internet-ltd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28\",\"name\":\"Eliot Chambers-Ostler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"contentUrl\":\"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg\",\"caption\":\"Eliot Chambers-Ostler\"},\"url\":\"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How hackers can harm your website's SEO (and ways to keep safe) - Heart Internet","description":"How hackers can harm your website's SEO (and ways to keep safe) - Written by the team at Heart Internet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/","og_locale":"en_GB","og_type":"article","og_title":"How hackers can harm your website's SEO (and ways to keep safe) - Heart Internet","og_description":"How hackers can harm your website's SEO (and ways to keep safe) - Written by the team at Heart Internet.","og_url":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/","og_site_name":"Heart Internet","article_publisher":"https:\/\/www.facebook.com\/heartinternet\/","article_published_time":"2017-05-11T15:18:17+00:00","og_image":[{"width":1620,"height":720,"url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg","type":"image\/jpeg"}],"author":"Eliot Chambers-Ostler","twitter_card":"summary_large_image","twitter_creator":"@heartinternet","twitter_site":"@heartinternet","twitter_misc":{"Written by":"Eliot Chambers-Ostler","Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#article","isPartOf":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/"},"author":{"name":"Eliot Chambers-Ostler","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28"},"headline":"How hackers can harm your website&#8217;s SEO (and ways to keep safe)","datePublished":"2017-05-11T15:18:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/"},"wordCount":2443,"commentCount":1,"publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg","articleSection":["Search Engine Tips","Your Website"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/","url":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/","name":"How hackers can harm your website's SEO (and ways to keep safe) - Heart Internet","isPartOf":{"@id":"https:\/\/heartblog.victory.digital\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg","datePublished":"2017-05-11T15:18:17+00:00","description":"How hackers can harm your website's SEO (and ways to keep safe) - Written by the team at Heart Internet.","breadcrumb":{"@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#primaryimage","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2015\/12\/cmssecurity-background.jpg","width":1620,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.heartinternet.uk\/blog\/hackers-can-harm-websites-security-seo-ways-keep-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.heartinternet.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How hackers can harm your website&#8217;s SEO (and ways to keep safe)"}]},{"@type":"WebSite","@id":"https:\/\/heartblog.victory.digital\/#website","url":"https:\/\/heartblog.victory.digital\/","name":"Heart Internet","description":"","publisher":{"@id":"https:\/\/heartblog.victory.digital\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heartblog.victory.digital\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/heartblog.victory.digital\/#organization","name":"Heart Internet","url":"https:\/\/heartblog.victory.digital\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/02\/HeartInternet_Logo_Colour.webp","width":992,"height":252,"caption":"Heart Internet"},"image":{"@id":"https:\/\/heartblog.victory.digital\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/heartinternet\/","https:\/\/x.com\/heartinternet","https:\/\/www.linkedin.com\/company\/heart-internet-ltd"]},{"@type":"Person","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/58ed7f27cc0f3ab6e69135742a5eee28","name":"Eliot Chambers-Ostler","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heartblog.victory.digital\/#\/schema\/person\/image\/","url":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","contentUrl":"https:\/\/www.heartinternet.uk\/blog\/wp-content\/uploads\/2025\/08\/cropped-Eliot-96x96.jpg","caption":"Eliot Chambers-Ostler"},"url":"https:\/\/www.heartinternet.uk\/blog\/author\/eliot-chambers-ostler\/"}]}},"_links":{"self":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/16479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/comments?post=16479"}],"version-history":[{"count":0,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/posts\/16479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media\/10919"}],"wp:attachment":[{"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/media?parent=16479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/categories?post=16479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.heartinternet.uk\/blog\/wp-json\/wp\/v2\/tags?post=16479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}