Web60 Features
WordPress Security for Small Business: What Managed Hosting Handles While You Run Yours

Most business owners think about WordPress security the way most people think about plumbing. You assume it works until something floods.
I review our platform's security logs every Monday morning. The pattern has not changed in three years: automated scanners probing WordPress login pages, brute-force attempts against xmlrpc.php, and vulnerability exploits targeting plugins within hours of public disclosure. This is not occasional. It is constant, and it targets every WordPress site on the internet regardless of size.
Patchstack's State of WordPress Security report, published in February 2026, documented 11,334 new vulnerabilities across the WordPress ecosystem in 2025 alone [1]. That is a 42% increase on the previous year. If you run a business website on WordPress, and roughly 43% of the world's internet does, this is your operating environment. The question is not whether threats exist. It is who handles them.
This article breaks down what managed WordPress hosting actually does for your site's security, what it does not do, and where the line sits between what your host should handle and what stays your responsibility.
The Vulnerability Landscape: 11,334 and Counting
The Patchstack figures deserve a closer look. Of those 11,334 vulnerabilities discovered in 2025:
- 91% sat in plugins, 9% in themes, and just 6 in WordPress core itself
- Roughly 4,100 (about 36%) were serious enough to require active protection rules
- Nearly 2,000 carried a high severity rating, making them candidates for automated mass-scale attacks
- 46% were unpatched at the point of public disclosure
The exploitation timeline is what should concern any site owner. For heavily targeted flaws, the median time from public disclosure to mass exploitation was around five hours. Half of all high-impact vulnerabilities were being actively exploited within 24 hours of disclosure [1].
That is not a window most business owners can monitor. You are running your business. You are not watching CVE feeds at half six in the morning. And here is the uncomfortable part: nearly half of those vulnerabilities had no patch available when they went public. The vulnerability was known, scanners were looking for it, and the fix was still being written.
This is the environment. Not a theoretical risk assessment. A daily operational reality for every WordPress site on the internet.
What Server-Level Security Actually Does
Most WordPress security advice focuses on plugins. Install a firewall plugin. Add a login limiter. Run a malware scanner from your dashboard.
That approach has a fundamental problem. It runs inside the application it is trying to protect. If WordPress itself is compromised, or if the attack targets the server rather than the application, a WordPress-based security plugin may not be in a position to detect or stop the intrusion.
Server-level security operates underneath WordPress. It protects the server before a request ever reaches your site.
Intrusion Prevention
Fail2ban monitors server logs for suspicious patterns: repeated failed login attempts, brute-force attacks against wp-login.php or xmlrpc.php, automated credential stuffing. When it detects an attack pattern, it blocks the offending IP address at the firewall level. The attacker does not get a "wrong password" message. They get nothing. The connection is refused before it reaches WordPress.
For the business owner, that means your login page is not being hammered by automated bots while your legitimate customers are trying to reach your site. Brute-force attacks consume server resources even when they fail. Blocking them at the firewall keeps your site responsive for the people who actually matter.
Automatic Malware Scanning
Automatic scanning checks your files against known malicious signatures on a regular schedule. If something changes that should not have changed, the system flags it. This is not a plugin running a scan when you remember to click the button. It runs whether you are paying attention or not.
The alternative is discovering you have been compromised when a customer emails to say your site redirected them somewhere suspicious. By that point, the damage to trust is already done.
Server-Level Hardening
This covers the configuration details that most site owners never see: file permissions, directory access restrictions, PHP configuration, disabled functions that attackers commonly exploit. These are not settings you configure from the WordPress dashboard. They are decisions made at the server level by whoever manages your hosting environment.
Web60's enterprise-grade infrastructure runs all three of these by default, on every site, with no configuration required from the site owner. Nginx, fail2ban, and automatic malware scanning come as standard, not as premium add-ons.
Consider the alternative. A site owner on basic shared hosting, the kind that costs a few euro a month, is responsible for all of this themselves. If they do not know what fail2ban is, it is not running. If they have not hardened their PHP configuration, it is whatever the default was when the server was provisioned. That is not a criticism of the site owner. It is a structural problem with cheap hosting that calls itself "WordPress hosting" without managing anything beyond the installation.

SSL Certificates: The Baseline You Cannot Skip
Every business website needs an SSL certificate. Full stop.
Without one, browsers display a "Not Secure" warning next to your URL. For a potential customer deciding whether to fill in a contact form or enter their card details, that warning ends the conversation. They leave. Google also factors SSL into search rankings, so the absence of it costs you visibility as well as trust.
The operational headache with SSL has never been obtaining the certificate. Let's Encrypt made that free years ago. The headache is renewal. Certificates expire, typically every 90 days. When they do, your site displays a security warning until someone notices and renews it manually.
On managed hosting, SSL provisioning and renewal happen automatically. Web60 provisions a free Let's Encrypt certificate for every site and renews it before expiry without any intervention from the site owner. You never see a renewal notice because there is nothing for you to do.
On unmanaged hosting, certificate expiry is one of the most common causes of those alarming browser warnings. It is rarely a security breach. It is almost always an administrative oversight. But your customers do not know the difference, and they do not wait around to find out.
Automatic Backups: Your Last Line of Defence
Security is not just about keeping attackers out. It is about recovering when something goes wrong, whether that is a hack, a failed update, or a mistake you made yourself.
A hacked site with no backup means rebuilding from scratch. Not restoring. Rebuilding. Every page, every product listing, every configuration setting. For a Waterford manufacturer with a trade catalogue site listing hundreds of products, that could mean weeks of work and lost orders, not hours and a minor inconvenience.
Web60 runs automatic nightly backups with one-click restore. It also takes pre-update safety snapshots automatically, so if a plugin update introduces a conflict, you can roll back to the state your site was in moments before the update ran. Manual on-demand backups are available any time you want to create a checkpoint before making changes yourself. The complete guide to WordPress security and backups covers backup strategy in more detail.
I learned this the hard way early in my career. I managed a backup process for six months without ever testing a restore. When we needed it, the files were incomplete. Six months of assumed protection that delivered nothing when it mattered. I verify every backup process I manage now.
What Backups Cannot Do
A backup is only as good as its last run. If you make significant changes after the nightly backup and the site encounters a problem at 11pm, you lose those changes. That is the tradeoff. Nightly backups mean your worst-case data loss is roughly 24 hours of work. The alternative, no automated backup at all, means losing everything. Know the tradeoff and plan around it. If you are making major content changes, trigger a manual backup first.
Staging Environments: Test Before You Deploy
This is where security and operational discipline overlap. The Patchstack data showed that roughly half of WordPress vulnerabilities trace back to outdated plugins [1]. The natural response is to keep plugins updated. The problem is that updates sometimes break things.
We saw this pattern recently with a popular page builder update that caused cascading failures across sites running older PHP versions. The update itself was not malicious. It was a routine version bump. But it introduced a conflict that took checkout pages offline for sites that had not tested first.
A staging environment is a complete copy of your production site where you verify changes before they touch your live business. Web60 provides one-click staging on every account. Clone your production environment, apply the update in staging, verify everything works, then push to production. If something breaks, it breaks in staging. Your customers never see it.
The Database Sync Limitation
A staging environment does not sync with production in real time. If your site takes orders or form submissions while you are testing in staging, those submissions exist in production but not in your staging copy. Before pushing staging changes to production, verify that you are not overwriting data that arrived after you created the clone. For content-heavy updates, the safest approach is to work in staging during a quiet period and push promptly.
Without staging, every plugin update is a deployment straight to production. That is performing maintenance on a live system with no safety net. Most of the time it works. When it does not, your customers find the problem before you do.

The Cost of Getting Security Wrong
The financial reality of a security incident is worth understanding, not to cause panic, but to weigh the cost of prevention against the cost of recovery.
| Scenario | Typical Cost Range | Recovery Time |
|---|---|---|
| Basic malware cleanup | EUR 250 to EUR 2,500 | 2 to 48 hours |
| Full site rebuild (no backup) | EUR 2,000 to EUR 8,000+ | 1 to 4 weeks |
| Downtime per hour (small business) | EUR 500 to EUR 5,000+ | Varies by sector |
| Managed hosting with security included | EUR 60/year (Web60) | Prevention, not recovery |
Those figures come with caveats. Recovery costs vary enormously depending on the severity of the breach, the size of the site, and whether usable backups exist. The downtime cost depends entirely on what your site does for your business. An informational brochure site costs you credibility. An eCommerce site costs you revenue with every hour it is offline.
Industry estimates from groups like the Ponemon Institute suggest small business downtime can cost several thousand euro per hour, though those figures aggregate across very different business types and should be treated as directional rather than precise [2]. What the numbers consistently show is that prevention costs a fraction of recovery.
In Ireland specifically, a Centripetal analysis reported in late 2025 found that 37% of Irish businesses lack a disaster recovery plan entirely [3]. A Censuswide survey of 1,000 Irish employees, commissioned by Landmark Technologies in January 2026, found that four in five respondents had experienced at least one cyber incident in the past year, and more than half expected their organisation to suffer a data breach within the next 12 months [4].
The threat is not abstract. It is operational. And the businesses most exposed are the ones without server-level protection, without automated backups, and without anyone monitoring the infrastructure.
When Managed Security Is Not the Answer
Honesty matters more than a clean sales pitch.
If your organisation employs a dedicated security team, runs its own Security Operations Centre, and has custom WAF rules tailored to your specific application logic, then managing your own WordPress infrastructure gives you control that no managed hosting provider can match. Enterprise security teams with the expertise to maintain, monitor, and patch their own servers will always have more granular control than a managed platform can offer.
That describes a small fraction of businesses. If you have a full-time security engineer on staff and a dedicated monitoring budget, you probably do not need someone else managing your server. For everyone else, and that includes the vast majority of independent businesses and local firms, delegating server security to a managed host that actually manages it is the operationally sound decision.
The key phrase is "actually manages it." Not every host that calls itself managed delivers the same level of operational security. Look for specifics: what intrusion prevention runs on the server, how often backups execute, whether staging is included or charged as an extra, whether SSL renewal is genuinely automatic. The details separate marketing claims from operational reality.
The Operational Reality
WordPress security for a small business is not a product you buy once. It is an ongoing operational responsibility. Someone needs to monitor for threats, apply patches, verify backups, test updates, and respond when something goes wrong.
The question every business owner should answer is straightforward: who is doing that work? If the answer is "nobody" or "me, when I remember," that is a gap. Not a moral failing. A structural one that managed hosting exists to close.
Fail2ban runs whether you know what it is. Backups execute whether you remember to schedule them. SSL renews whether you notice the expiry date. Your job is to run your business. The hosting infrastructure's job is to keep your site secure, backed up, and available while you do.
Frequently Asked Questions
Is WordPress secure enough for a business website?
WordPress core is actively maintained and patched by a large security team. The six core vulnerabilities found in 2025 were all patched promptly. The risk sits overwhelmingly in plugins and themes, where 91% of vulnerabilities are found according to Patchstack's 2026 report. Keeping plugins updated, using reputable sources, and running on a managed host with server-level security addresses the primary attack surface.
How often should I back up my business website?
Daily automated backups are the minimum for any business site. If your site processes transactions or receives frequent form submissions, consider triggering manual backups before any significant changes. The goal is to ensure your worst-case data loss is measured in hours, not months.
Do I need a security plugin if my host provides server-level security?
Server-level security and application-level plugins serve different functions. Server-level protection (fail2ban, hardening, malware scanning) operates beneath WordPress. A well-chosen security plugin can add login monitoring and file integrity checks within WordPress. They complement each other. What you should avoid is relying solely on a plugin with no server-level protection underneath it.
What is the most common way WordPress sites get hacked?
Outdated plugins account for roughly half of all WordPress compromises, according to Patchstack's 2026 data. Weak or reused passwords account for a smaller but significant share. Automated bots scan for known vulnerabilities continuously, which is why the exploitation timeline, often under 24 hours, makes prompt patching critical.
What does managed actually mean in managed WordPress hosting?
It means your hosting provider handles server configuration, security hardening, software updates, backups, SSL certificates, and performance optimisation. You manage your content and your business. They manage the infrastructure. The distinction matters because "WordPress hosting" without "managed" often means you get a server with WordPress installed and everything else is your responsibility.
Sources
Ian oversees Web60's hosting infrastructure and operations. Responsible for the uptime, security, and performance of every site on the platform, he writes about the operational reality of keeping Irish business websites fast, secure, and online around the clock.
More by Ian O'Reilly →Ready to get your business online?
Describe your business. AI builds your website in 60 seconds.
Build My Website Free →More from the blog
That Cookie Banner on Your Website Is Costing You Customers
Cookie consent banners drive visitors away and hide your real traffic data. Cookie-free analytics gives you the full picture without the popups.
The First 7 Things to Do After Your AI Website Builder Creates Your Site
Your AI website builder created your site in 60 seconds. Here are the 7 essential things to do next to make it truly yours, no tech skills needed.
