Web60 Features
Pre-Update Snapshots: The Backup Web60 Triggers Before You Click Update

Picture this scenario. A version of it lands in my inbox most months. A Limerick accountancy firm runs a fast, simple WordPress site. Contact form, services page, a few testimonials, the office address. On a Tuesday morning before tax season, the office manager logs into WordPress and sees the familiar yellow banner: "Updates available." She clicks update. Plugins, themes, core. Done in under a minute.
The site looks fine.
It is not fine. The contact form plugin has just shipped a version that conflicts with the theme's form styling. The form displays. Customers fill it in. When they click submit, the page reloads and the form is empty. No success message. No error. No email lands in the accountant's inbox. The form is dead, and nobody knows.
Two days later, a prospect rings asking why nobody returned his email. The office manager checks the form. Tries it herself. Realises. Opens the logs and works out roughly how many enquiries have come and gone since Tuesday.
This is the moment that makes pre-update snapshots non-negotiable.
The Backup You Have Versus the Backup You Need
A lot of business owners assume that if their host runs a nightly backup, they are protected. They are partially right and mostly wrong.
A nightly backup at 02:00 captures the state of your site as it was at 02:00. If you push a plugin update at 10:30 on Tuesday and the checkout breaks, you can restore to Monday night's backup. Except now you have lost whatever happened between Monday night and the moment you restored. Customer orders, form submissions, new content, payment receipts. Gone with the restore.
In practice the owner faces a choice. Live with the broken plugin while you debug. Or roll the site back and accept the data loss. Neither is good. Both end with a bad week.
A pre-update snapshot fixes this. The hosting platform takes a separate, dedicated backup at the exact moment you trigger the update, not twelve hours earlier. If the update breaks the site, the rollback restores you to the state your site was in seconds before the update fired. No data loss. No debugging. The phone stops ringing. Anyone serious about a proper WordPress security and backup strategy treats this as the missing link between "we have backups" and "we can actually recover."
That distinction matters more than most owners realise.
What a Pre-Update Snapshot Actually Captures
A proper pre-update snapshot is not just a database dump. It is a full point-in-time copy of:
- The WordPress database, including every post, page, custom field, user record, and option row
- The plugin files in
/wp-content/plugins/at the exact version they were before the update - The active theme files
- The WordPress core files if a core update is firing
- The
.htaccessand other root configuration files
When you click restore, all of those are written back together. The site does not boot in a half-updated state. It boots in the precise state it was in the second before the update.
You can think of it as the operational equivalent of asking somebody to take a photograph of the room before you start moving the furniture. If the new arrangement looks wrong, you have the photograph to put it back exactly as it was. The lounge does not stay half-rearranged because the photograph was incomplete.

Why Plugin Updates Cause So Many Sites to Break
Plugin updates are the largest single source of WordPress site breakage. The maths is straightforward.
The official WordPress.org plugin directory now holds over 61,000 free plugins. According to Patchstack's State of WordPress Security in 2025, the WordPress ecosystem saw 7,966 new vulnerabilities disclosed in 2024 alone, which works out to roughly 22 new disclosures every day, a 34% increase year on year. Crucially, around 96% of those vulnerabilities sat in plugins rather than WordPress core itself. Plugins are where the patching happens, and plugins are where things go wrong when patches roll out.
I want to be specific about what "things go wrong" actually means in practice. Plugin update breakage usually falls into four categories:
- Hard compatibility break with the WordPress core version, where the update assumes a feature that is not yet available, or has been deprecated
- Conflict with another plugin, where two patches arrive in the same week and they collide on a shared hook or option name
- Conflict with the theme, where the new plugin version restyles or restructures a component the theme depends on
- Database migration failure, where the plugin tries to alter a table and the migration aborts midway
The Limerick firm hit category three. A theme that styled the contact form. A form plugin that quietly changed its HTML structure on update. The form rendered. The form submitted. The form just did not call the underlying function that sent the response email. Quiet failure.
Quiet failures are the worst kind. A site that throws a critical error message at least tells you something is wrong. A form that silently swallows submissions does not. By the time anyone notices, two days of leads are gone, and you have no record of who tried to get in touch.
Recovery Mode and Why It Is Not Enough
WordPress has shipped its own safety net since version 5.2. Recovery Mode catches fatal PHP errors that originate in plugins or themes, sends an email to the site admin with a recovery link, and disables the offending code so you can log back in to fix it.
Recovery Mode is genuinely useful. It is also limited in three ways that matter.
First, it only fires on fatal PHP errors. A silent failure like the contact form scenario above triggers nothing. The site looks healthy from WordPress's point of view because nothing has thrown an exception. Recovery Mode is asleep.
Second, Recovery Mode catches the error, but it does not roll the change back. You are still sitting in the broken-update state, you just have a way to log in and start debugging. That is not the same as restoring the site to the state it was in before the update fired.
Third, Recovery Mode depends on PHP execution reaching the point where WordPress's error handler can take over. Some breaks happen earlier than that, for example a corrupted file that prevents WordPress from booting at all, and Recovery Mode never gets a look in. This is the failure mode I see most often when WordPress auto-updates fire without proper guardrails.
A pre-update snapshot does not care about any of that. It is a state captured at a point in time. You restore it, the site comes back. The mechanism is independent of whatever broke, because it lives one layer below WordPress itself.
How Web60 Implements Pre-Update Snapshots
Web60 sites run on a managed WordPress stack, Nginx, PHP-FPM, Redis object caching, FastCGI page caching, with a backup layer that operates underneath WordPress at the platform level rather than as a plugin running inside WordPress. That distinction matters. If the plugin layer breaks, a plugin-based backup tool can break with it. A platform-level snapshot keeps working regardless of what WordPress is doing above it.
When you trigger a plugin, theme, or core update from inside the Web60 dashboard, the platform automatically:
- Captures a pre-update snapshot of the full site state, files plus database, to a backup volume separate from the live filesystem
- Runs the update
- Records the snapshot in the dashboard with a timestamp, so you can roll back with one click if needed
The same applies when you restore from any backup. Web60 takes a pre-restore snapshot first, so if the restore itself produces an unexpected result you can step back to where you were before you clicked restore. The nightly backup runs independently of all this, every night, with one-click restore. You can also trigger a manual on-demand backup any time you are about to make a change you are not certain about, for example before pasting in a custom CSS block or installing an unfamiliar plugin.
Four backup layers, in other words. Nightly automated. Pre-update automatic. Pre-restore automatic. Manual on-demand. Each layer covers a different failure mode the others cannot.
In practice for the Limerick firm scenario, that would have meant the office manager could click one button, see the contact form working again within minutes, and lose nothing in between. The two days of dropped enquiries become a non-event.

Where Pre-Update Snapshots Are Genuinely Overkill
I want to be honest about the limits of this argument. If you are running a static brochure site that nobody updates more than twice a year, that has no database-driven forms, no e-commerce, no logged-in customers, then nightly backups are probably enough for you. The window between backup and breakage is small because you barely touch the site, and the data lost in a restore is essentially none.
Similarly, if you are running an enterprise-tier setup, fifty WooCommerce stores, dedicated DevOps team, custom CI/CD pipelines pushing changes through staging before they touch production, you have already solved this problem at a layer above the host. Enterprise managed hosts that handle that workload genuinely suit those operations. But that is not most Irish businesses. Most are running a single WordPress site that takes leads, takes payments, and matters to the people who own it. For that profile, pre-update snapshots stop being a nice-to-have and start being the thing that keeps the business running on a Wednesday morning.
What This Does Not Solve
Pre-update snapshots protect you against the update itself going wrong. They do not protect you against the next update being needed two hours later because the first one fixed a security vulnerability. If you roll back a plugin to dodge a breakage, you are also rolling back any security patches that came with it. The right next step is usually to test the update in a staging environment, isolate the conflict, fix it, and then redeploy. The snapshot buys you time. It does not buy you a free pass on staying current.
The other thing snapshots cannot do is replay the database forward. If a customer placed an order in the ninety seconds between your snapshot firing and your decision to roll back, that order exists in the live database before rollback and not in the snapshot afterwards. In practice this is a rare edge case for the kinds of sites we are talking about, but it is worth knowing. For higher-volume e-commerce we would always recommend testing risky updates in staging first rather than firing them straight at production. I learned that lesson early on, having trusted a vendor's claim that their patch was "low-risk" and then watched a WooCommerce checkout fall over in front of live traffic. The snapshot saved the data. It did not save anybody's afternoon. Staging would have.
What to Verify Before You Trust Any Pre-Update Backup
If your current host claims to run pre-update backups, three things are worth verifying before you rely on the claim:
- Confirm the backup runs at the point of update, not on a schedule. A backup scheduled for 02:00 is not a pre-update backup, no matter how short the window. Read the documentation.
- Confirm the snapshot retention. A snapshot retained for three days is fine if you spot the issue within three days. If your form has been quietly failing for a week, a three-day retention is no help. Web60 retains pre-update snapshots beyond the immediate update window, so they are still there if a quiet failure takes you a few days to spot.
- Confirm the rollback path. Some backup systems will let you download a snapshot but require you to restore it manually through a database tool and file uploads, if your hosting panel supports that at all. That is not a rollback. A rollback is one click that puts the site back where it was, without you having to remember what a
.sqlfile looks like.
If the host cannot answer those three questions clearly, treat the pre-update backup as marketing copy rather than a feature. The functionality you cannot verify is the functionality you will discover is missing on the worst possible Wednesday afternoon of your year.
Web60's all-inclusive managed WordPress hosting bundles the full snapshot system, nightly, pre-update, pre-restore, and manual, with one-click restore from the dashboard, on Irish sovereign infrastructure, supported by an Irish team in an Irish timezone.
What the Limerick Firm Did Next
After two days of dead form submissions and an awkward conversation with the prospect who rang in, the office manager rolled back the offending plugin, reinstated the working version of the form, and reattached the email notifications. Then she moved the site onto a host that did pre-update snapshots properly. The next plugin update that broke something, and one did, about six months later, was a one-click rollback. Total downtime: under five minutes. Lost enquiries: none.
The lesson was not that plugin updates are dangerous. They are mostly fine. The lesson was that the cost of the rare breaking update is entirely determined by what your host does in the seconds before that update fires. With a pre-update snapshot, the cost is a five-minute rollback and a note to investigate the conflict in staging. Without one, the cost is whatever happens between the break and someone noticing, multiplied by however long that takes.
Conclusion
Plugin updates will keep arriving. WordPress core updates will keep arriving. New vulnerabilities will keep being disclosed at twenty-odd a day. The right response is not to stop updating, because that path ends in a compromised site. The right response is to make sure the moment of risk is bounded.
A pre-update snapshot bounds it. Five minutes of exposure if something goes wrong, instead of two days. That is the trade you want available before you click update next time.
Sources
- Patchstack: State of WordPress Security in 2025, used for vulnerability volume, plugin share of disclosures, and year-on-year growth figures
- WordPress.org Plugin Directory, the source for the 61,000+ free plugins figure as of May 2026
- WordPress Developer Handbook: Common errors and Recovery Mode, the reference for Recovery Mode behaviour and limits since WordPress 5.2
Graeme Conkie founded SmartHost in 2020 and has spent years building hosting infrastructure for Irish businesses. He created Web60 after seeing the same problem repeatedly — Irish SMEs paying too much for hosting that underdelivers. He writes about WordPress infrastructure, server security, developer workflows, managed hosting strategy, and the real cost of hosting decisions for Irish business owners.
More by Graeme Conkie →Ready to get your business online?
Describe your business. AI builds your website in 60 seconds.
Build My Website Free →More from the blog
Automatic WordPress Malware Scanning: What It Catches, and What It Will Always Miss
Most WordPress hosts advertise malware scanning but few do it properly. Here is what a real scanner catches, what it misses, and how to tell which one you have.
A Year on Web60: What €60 Actually Bought a Small Irish Business
A composite case study of one Irish small business through twelve months on Web60. What €60 actually included, where it saved money, and what it cannot do.
