understand and fix google blacklist warnings

Sucuri Webinar Transcript
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS.
Alycia Mitchell - Sucuri Digital Marketing Manager
1
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
Alycia MItchell:
Thanks very much, Val, for that introduction and thanks everyone for joining today. I
come from Victoria, BC, which is on a small island on the west coast of Canada. We are
a globally distributed company and Sucuri so all of us work from home. If any of you
remember my webinar last time on Removing Spam from Google Analytics, you might
remember my black lab, Moonshine, I like to show off my animals. I’ve actually gained
two more in my animal family here and you guys keep me company and keep me sane
when I’m home all day working. They’re actually here right now and they might make
an appearance at some point. It’s also a good idea to start slides with cute animal
photos. Now, we can just jump right in to the content.
First of all, we’re going to talk over a few different sections here. For anybody unfamiliar
with the Google blacklist, we’re going to talk about what it is, what it looks like, what
some of the different warning messages are, and why they happen. Then, we’re going
to talk about why your site’s blacklisted. If you wake up to that red warning one day,
what is the steps you’re going to take to find out how your website was hacked, what
it’s hacked with and what you’re going to need to know to clean it up, which we’ll talk
about in the last section, including how to request a review from Google to get that
warning taken down.
For anybody not familiar with the Google blacklist, you might have recognized the
page, a big red warning if you ever click a link in Google search and it takes you to a
website that they suspect is hacked or is malicious, it’s going to warn you first. That big
red page there, you can see there’s a button at the bottom, back to safety, which most
people click. I know I do. Very few people actually click the details link to find out more
or to proceed to the site if it’s been flagged and blacklisted in this way.
We actually put a little poll on Twitter before the webinar to find out what people
thought about how much traffic is actually lost if your website’s blacklisted. About
50% of people got it right, 95% of your traffic will not proceed if they get one of those
red warning pages. I mean, it is pretty stark, the giant red warning telling you it’s
dangerous so you really don’t want to proceed so it can be huge, especially if you’re
running a website where you make sales and you’re losing customers and losing any
business. Obviously, huge amount of traffic. Only about 5% of people, perhaps even
less, proceed through to the website once it’s been blacklisted.
2
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
Here’s another version. This is what it looks like in Firefox if your website’s been
blacklisted. They do have their own blacklist and there are lots of blacklisting authorities
out there aside from Google. A lot of them do use the Google Safe Browsing API as
part of their list. Google logo actually is the largest one and they blacklist about 10,000
websites every single day so that’s 10,000 website owners waking up every morning
and finding that their site has this warning, and then having to deal with it.
There are other ones as well. For example, Safari has their own list and this is what
it looks like. Most website owners, like I said, don’t actually find out their website’s
been hacked until Google blacklists it or maybe a customer mentions the blacklist
to them. What you can do, though, to make sure that you get the jump on Google, if
your website is ever hacked, is to have some kind of monitoring and alerting system
checking your core file integrity, checking to make sure that any changes to your
system are authorized. We do offer something like that here at Sucuri, we offer both
service side and remote scanning for a whole picture. We do have alerting and a
specific blacklist alerting system as well that checks the top ten and lets you know as
soon as we detect that it’s been blacklisted and, of course, before that if we detect a
hack.
There’s two major kinds of blacklists, at least how I see them. There’s website malware
warnings where Google’s detecting that there is a malicious trafficking sent to your
site from a hacked site. That could be because your site’s now hosting hacked content
that the attackers are sending to your site, basically abusing your server resources
or if your website’s actually redirecting to other malicious websites, if it has drive-by
downloads, web spam or any other indicators compromise that Google found when
it’s been scanning through the internet, looking at websites to find out if there’s any
security issues.
The reason that Google does this is because it wants to protect its users. If
Google users are using search, clicking links in Google Search, and then going
to a website where their computers are getting hacked or personal information
is getting stolen, people might start to think that Google’s not the best search
engine to use. Google definitely doesn’t want its users to be infected with
viruses, and rootkits, and ransomware, and that kind of thing. It has a vested
interest in making sure. It’s the same with many other blacklisting authorities.
There’s also deceptive content warnings, which is different from actually website
malware and redirects and that kind of thing. These usually refer to phishing and if
3
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
you’re not familiar with phishing, what it means is anytime that an attacker sets up
a fake page in order to trick you into entering bank details, passwords, credentials,
credit card information, that’s known as phishing and it’s basically forging pages. It
could host those pages on your site, they could also be infecting ad networks. We
see this with [malvertising 00:12:34] where, if you have AdSense ads on your site and
you have some of those partner networks activated, sometimes those can funnel bad
traffic through your site.
We write about this on the blog actually quite a bit. There’s new ones as well for
potentially unwanted downloads, so software that’s kind of graywear or scammy and
that kind of thing, they started to warn about that as well. Basically, anything that’s
trying to fake that it’s something it’s not, will be flagged as deceptive content here.
Here’s a couple of those. This is, again in Safari, what it looks like. We’ve got one here
for Chrome and this is one for Firefox for that unwanted software I mentioned and the
new one here for Chrome as well. There’s another one, actually, that’s not technically,
I guess, a blacklist, but it does appear in Google Search and these are warnings next
to your search engine results. These can appear in conjunction with the blacklist, but
sometimes you can actually see these before you get blacklisted. It could be, in the
case of malicious script in iFrame that have been injected into your site. We’ll see
these warnings for the same kind of stuff.
SEO spam and pharma spam, which is a big deal, especially for ... Pardon me ... A
good deal, especially for pharmaceutical advertising. It’s very difficult to advertise
pharmaceutical sites so hackers will inject spam keywords links into hacked sites in
order to try and [rent 00:13:55] their pharmaceutical sites, which is why you might
end up with a website with tons of pages that have Viagra references and that kind of
stuff. It’s no good, so if you see these in a search when you’re looking at your site, you
definitely want to check and see if there’s any of these other security notifications in
the Google Transparency page and Google Search Console, which I’ll be showing you
in a minute.
There are a lot of different blacklist messages and they do change over time depending
on the authority and the browser and such, that you’re using. Here’s just a list of the
most popular ones that we see. Like I said, a lot of them refer to dangerous malware
on the site. Some are for deceptive warnings, some have been reported as unsafe and
that there’s also those ones for unwanted software, potentially unwanted programs
as well.
4
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
As I mentioned before, there’s other blacklisting authorities out there. In fact, our
teams are going to find over 100 that we can remove from. Most of these are antivirus
companies and search engines, as well as, browsers, again, wanting to protect their
customers, their users. We actually detect the top 10 blacklists so if you use SiteCheck
or if you use our monitoring services, we have the top 10 there. The little screenshot
you’re seeing on the bottom is actually from our quarterly hacked trend report. This is
something we’ve been putting out over the last year and this screenshot is from our
most recent one that shows the percentage of sites that were blacklisted by particular
these top three here.
This is, again, out of the sites that were actually blacklisted, which is what 15% of the
sites that we cleaned up. The numbers here will never be 100% because, honestly,
if you can get blacklisted by one of them, chances are the rest of them will follow
because, again, they do share information, API’s and that kind of thing. If you’ve been
blacklisted by Google, chances are, you’re also blacklisted by a couple others as well.
It’s less important to check and see if you’re just seeing the warning page from Google,
there may be other systems as well that have flagged your site that you want to get
off those lists, too.
Now that we know a little bit about how blacklisting works, and how the blacklisting
authorities, why they do it and what kind of warnings you’re going to see. Let’s talk
about why your site’s blacklisted. The first place that you want to go is the Google
Transparency Report. Now, if you’re one of the people who click the details link, you
will be taken to that right away for your site. You can also just go to Google.com/
transparencyreport/safebrowsing, and from there, click on site status, and put in your
website URL. You guys can do this at any time and from there, click the magnifying
glass icon, and review the site safety details and testing details.
This is what the page looks like so it will let you know if it’s dangerous, partially
dangerous, or not dangerous. Then, there’ll be the site safety details and testing
details at the bottom there. What those are is some more clues to help you along the
path of cleaning up your site. They could reference dangerous URL’s and intermediary
domains that are being used or injected on your site, so things that you might want to
look for in your source code or searching through your files.
5
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
It will let you know if there’s any specific redirect behavior and whether people are
being sent to your site or whether being sent to another site from your site, any
hosted malware, or unwanted apps and that kind of thing. The testing details is a little
bit of information about the timeframe of the hack. Now, this is going to be, first of
all, the scan date, which is the most recent time that Google scanned your site and
found malware, and the discovery date, which is the first time that it found malware.
It doesn’t necessarily correspond to when your site was hacked because often sites
can be hacked for a while before Google detects it, but it does give you some kind of
timeframe about how long it’s been if you’re not checking your site all the time and
this is not a new issue.
You can also scan your site with external scanners, so we have a free one, Sucuri
SiteCheck, which you can use at SiteCheck.sucuri.net. Enter your website URL and
scan with it. Then, if we detect any payloads or malware locations, they’ll show there
below and you can also check the blacklist status pad at the top and find out if any of
those 10 blacklist authorities have you listed at a potentially dangerous site. Then, that
way you’ll know which ones you need to get cleaned up.
Just a quick note about external scanners versus server side scanners. A remote
scanner actually just browses your site as if it’s a visitor, which is great because it
can spoof different user agents, such as like mobile devices, people coming from
different locations, because sometimes malware’s conditional and only shows if you’re
coming from a search engine, or it can only show if you’re coming from a mobile
device. Just checking your site yourself from a desktop browser, might not actually
work. The problem with remote scanners it doesn’t have server access and some
issues don’t present themselves in a browser, so mostly phishing, backdoors, script,
that kind of stuff you’re going to need a server side scanner and you’re going to need
to do some manual investigation in order to find out where that stuff is coming from,
but they can be super helpful still remote scanners, in getting you some information.
There’s a couple more here that I listed on the left side and there’s tons of other ones,
depending on your content management systems, that you can look into.
In addition to the Google transparency report, sign up for your free
Webmaster Tools. If you’re not verified in Google Webmaster Tools, Bing
Webmaster Tools, Yandex, Norton Safe Web, make sure you sign up for those.
6
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
They’re all free to use and, not only do they provide you with security alerts and
information about your site, a lot of them, especially those top three, can give you
some information about how your site appears in search and any issues there with
crawling your site and stuff like that. Very important stuff. Definitely highly recommend
it and you’re going to need the first one, Google Webmasters, in order to even submit
a review request.
In order to sign up for Google Search Console, all you have to do is go to Google.com/
Webmasters, click search console and then add and verify your site. This is super
easy to do if you already have Google Analytic because you can just sign in with the
same Google account and then verify your site that way. There’s also a couple other
methods, like uploading an HTML file for the root of your site. From there, you want
to check the messages and the security issues sections for any details, any messages
about your site and there might be some more information about malware locations
or files that were flagged by Google, folders or subdomains that might be where you
need to focus your attention.
Another thing you can do that’s really effective, is to check recently modified files on
your server so you can do this using SFTP or an SSH terminal. If it’s an SSH, we have
a handy little command there that will just list any files modified in the last 15 days.
If you need to look longer than 15 days, you can change that last number at the end
from a 15 to 30 if you want 30 days. If you’re using SFTP, like in an FTP client, you can
just review the last modified date, which is a column in the FTP client there and look
at all files on your server. Just note anything that has been recently modified, but that
it’s suspicious or that you’re not familiar with. Talk to your web team, and then note
those because you’re going to need to look into those files later and either remove the
injections or replace them, in order to remove the hack.
There’s another really good one, too. I’ll let you guys know where you can find all these
instructions later as well to compare core files. If you are comfortable in a terminal
window, you can just log in to your server and making your directory, in this case
we called it clean. Go into that directory and then from there, find the official CMS
version, usually on GitHub, for whatever you’re using. If you’re using a specific version
of WordPress or Joomla, you want to make sure that you’re comparing your server
files with the same version of a fresh copy so basically this command here will let you
download it. Anything in green here, you’re going to want to change. You’re going
to want to extract that compressed file of the official server files and then that last
7
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
command, number five there, is a diff [recursive 00:21:20] to compare your clean file
that you just downloaded with your public HTML or [WW var 00:21:25], wherever you
have your core CMS files located.
The really quick and dirty way is to just get huge lists of all the differences between the
core files and yours and for certain sites, you want to be aware that if you download
an unpatched version of Magento and it’s noticing the differences because your site is
patched, that kind of stuff, but it will give you some indication of what the differences
are, and there’s other ways to do this as well. You can get tools if you’re doing it via
SFTP, but this is a nice, fast way to do it.
Once you have some information on the domains that are being used for redirects
or the locations of malware or any recently modified files you want to go through
and actually fix your site, depending on how severe the hack is, this could be a really
simple process, like replacing a few files, or it could be you need to completely rebuild
your site. One thing I want to recommend to everybody is to check out our new guide
at Sucuri.net/guides. We have two already for ... One for WordPress and one for
Joomla, specifically, how to clean those sites. We also have one that corresponds with
this webinar so how to remove the Google blacklist and there’s some instructions
there as well, specific to any platform. I definitely recommend that you go through
there because the instructions, especially for cleaning your database, for removing
backdoors, and cleaning files up, those are going to be a lot more thorough in the
guide, but I’m going to give you a little overview of what you’ll find in the guides here.
Number one, back up first. Even though your site is hacked, you want to make sure
that you have copies of everything the way it is, just in case you need to restore it
and then get a professional to clean it up. Also, if you have an e-commerce site, if
you take payments on your site, if there’s a potential that somebody was infected
and had their credit card stolen or if you had a credit card swiper on your site and
that caused somebody’s identity to be stolen, there could be legal implications so
you might actually have evidence here on your server. That’s why you want to back
up your server files, your database, any customized files, especially your database
configuration file, any files that you’ve modified, and then log files, of course, to go
back if you need to look at what happened and do some forensic analysis.
8
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
Again, if anything in this next section is uncomfortable, I highly recommend you get
a professional. We do have a malware removal service, which comes with protection
and detection for the whole year. Our team is really fast and making the cleanups
happen and requesting your reviews with Google.
First thing you want to do before you can request a review, is you need to completely
remove the hacked website content. Google isn’t going to allow you to submit multiple
reviews if you’re continually just submitting a hacked website for review. You want
to make sure that it’s totally clean first so number one, don’t overwrite in database
configuration files or custom files. At least make sure you have them backed up.
Restore using fresh copies of your CMS files and extensions using the exact same
version. This is a really handy way to do it and, again, instead of just overwriting files or
overwriting a folder, you want to actually delete it because if there are any added files,
simply overwriting them isn’t going to take care of them.
You want to be careful what you overwrite. For example, in WordPress, you want to be
careful with WP content folder. You have some uploads there, you have plugins and
stuff like that. You maybe want to rebuild those plugins as well. The best way to do
it is to delete first and rebuild if you can do that, but take care that you look for your
particular platform, what things you might not want to overwrite, or if you can isolate
those specific parts that you need to fix. Do that.
You can also restore from a backup, but you want to make sure that that backup is
clean, too. We see, unfortunately, a lot of people storing their backups on the same
server as their site in a [dot 00:24:56] old folder or something like that and it’s a really
bad practice because how often do you patch your backups? The backups are publicly
accessible, a hacker can find them, and that might actually be how your site got hacked
in the first place is through those old backups on your server. Find a secure location
for your backup and we’ll talk about that a little more later. If you do restore from the
backup, keep in mind that that backup is still vulnerable and you need to make sure
that it’s secure so you don’t get reinfected.
You also want to remove the hacked content from your database so you can log in
with PHP Admin or download a tool, like Adminer, and put that on your file system
so you can get into your database and search for any spam. You also want to search
everything for backdoors as well. Again, I would want to refer you to the guide so that
you can find ... It’s a list of common PHP functions that are used maliciously. Those
functions also are used legitimately by some plugins, so you just want to make sure
9
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
that you consult a professional if you need additional help, but those guides are made
so that you can do it yourself if you’re comfortable.
Also, in addition to backing up, you want to test everything so if you make a change
trying to clean something up, test as often as possible when making changes so
you know what actually broke your site, if that does happen. That is a danger any
time that you do clean up your site, which is why, again, we recommend that you get
professionals to help with this step. Just to make sure that it’s 100% and that your site
doesn’t go down and you have more headaches than you went in with.
Once your site is verified clean, before you request a review, I actually recommend
that you make sure that it’s always secure so that you don’t get reinfected right away.
Update all of your website software, so obviously, CMS version is super important.
Plugins and themes as well, but also server software, such as cPanel and Apache. You
may want to chat with your host about whether they have newer versions of that for
you that are more secure.
As well, confirm all user accounts. We’ve seen more and more that, in addition to
backdoors injected into files on your site, we also see that they’re creating malicious
admin users so make sure that you verify all user accounts on your CMS, and not
only that, but your FTP, SFTP, SSH, PHP admin panel, cPanel and your database
configuration password. Update all of that stuff because it’s been compromised now
and it’s possible that those could be used to get back into your site and reinfect it. You
also want to make sure that all users update their passwords.
In addition, any users that are logging in to your backend, or using your FTP, you want
to make sure that they scan their computer for viruses. Website malware has been
known to come from computer malware so if somebody’s using a text editor in the
backend of WordPress, or using an FTP client, malware can jump from a system into
your website so definitely want to make sure that that wasn’t the point of entry either.
Once you’re fairly certain that your site is completely clean, then you can go ahead
and request that review with Google. In a previous slide, I mentioned how to sign
up for Google Search Console, so now that you’re validated, you can go in, go to the
Security Issues tab, and review the issues that are listed there. Once you can confirm
that all of those have been dealt with, you can click the box at the bottom that says,
“I have fixed these issues,” and click the button and request a review. There will be a
little box that pops up here, a little text box where you can put in some information
10
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
and I recommend putting in as much detail as possible about what was cleaned and
what steps you took to make sure the infection is gone. Then, from there, it will send
the review to Google.
There’s also manual actions as well under Search Appearance, so you can go there
and see if anything has been flagged by Google because of spam. These ones do
take a bit longer to review, but it’s the same process, you review the issues and then
click the button and request your review. Let them know what was cleaned. Once
you’ve checked both these sections and you’ve requested the review, there’s just a
waiting period. Most often, it takes a day or two for the Google blacklist, depending
on how busy they are and what’s going on in the space. Some of these can take up to
two weeks, especially for manual actions where they need manual review. Those are
usually, again, related to spam.
Google is also now limiting repeat offenders, so this just happened in the last year.
Definitely don’t try to trick Google. We’ve heard of some people who have actually
deleted everything on their server and tried to submit an empty site for review in order
to bypass the automatic algorithm that checks the site. That won’t work and it will just
anger them, so don’t do that. Make sure your site’s absolutely clean and for repeat
offenders, they’re actually ... This is for people who are actually mostly hosting really
bad sites or getting reinfected quite a bit, they’re going to limit you to one submission
every 30 days, which is terrifying because that means your site is blacklisted for 30
days. That wouldn’t be a good thing, so do make sure that you take care to remove all
the malware and that you’re 100% sure that it is cleaned up.
Note that when you have a plan with Sucuri, we do submit all the blacklist reviews
on your behalf from our own account. We have our Google accounts, and we submit
and verify tons of sites with Google and then remove it. They’re familiar with us and
we do see them lifted within about 10 hours when we submit blacklist reviews. Again,
depending on their workload and that sort of thing.
Now that you know how to remove everything and how to submit a review, the real
question everybody has, our little bonus slide here, is how to prevent this from
happening in the first place. The first and best thing you can do is not only keep your
website up to date, but harden your website using official best practices. Look at the
security docs for your CMS, find out what the file folder permissions should be and
make sure you make those changes. Set some custom htaccess files to limit PHP
execution or limit uploads and that kind of thing and check the security configurations.
11
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
Make sure you have some plugins and some tools that are doing some monitoring
and alerting for you. Make sure to set those configurations as well. We recommend
things like two factor authentication, firewalls, all that stuff is stuff you should be
looking into for tools to secure your website and to make sure that you look at those
configurations.
For example, with the Sucuri dashboard, it is just plug and play. You can just set it
and forget it, but if you go in there and actually look at the security configurations.
If you’re a local website running a shop in your own town and you don’t really need
traffic from people in other countries, you can limit and make sure that people from
other countries can’t even access your website, which is huge because that’s where
the majority of hacks come from is a lot of countries outside of the US and that kind
of thing.
You also want to make sure that you’re using strong passwords so long, complex,
unique passwords for every single account and you limit those permissions for your
users. There’s no reason for you to have a ton of admin users and if you’re giving
admin access to somebody, give it to them only as long as they need it. This is called
the principle of least privileged and it’s a really great way to make sure that your users
aren’t the weakest link.
Stay aware of security news. If you have a specific CMS, there’s usually a lot of mailing
lists and things [up 00:31:36] there that you can stay on top of any new extensions that
have vulnerabilities in them or any security issues that you need to be aware of. We
do have an email list at blog.sucuri.net and we post regularly on major security issues
so that’s definitely one place to start. Then, if you can, use a file integrity monitoring
service. Like I’ve mentioned before, this basically takes long, good look at your website.
Now that it’s clean, we take a little picture of it and then any changes that are made,
any new posts, any new users, any files that are upload or injected, you’re going to see
those in the log there and know usually where the hack occurred and you’ll be able to
fix it, and clean it up, and patch it before Google finds out.
One thing that is really helpful, too, if you can, because I know it can be hard for
certain platforms to stay up to date, and be hard to know what’s changing in the space
if there’s website firewalls as well and we’ll talk about those in a minute.
12
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
Shared server access is actually something that I had a question about from one of
the people who registered for the webinar and who’s hoping that I would address it
because there’s some confusion about why this can be a problem. There’s actually
no issue with having multiple website on the same server, the issue is when one FTP
account can access all of them so what you can do is limit it so that every single website
has its own FTP account. You can ask your host about how they isolate websites on
your server. If you, yourself, have one FTP account that allows you to access multiple
websites, you might want to think about tightening that up a little bit. Slightly less
convenient if you can’t edit them all [on 00:33:08] the same time, but if you take that
extra step by logging in, then you won’t have to deal with having multiple websites all
hacked because they’ve crossed contaminated. It’s really easy for one weak site to
cause the rest of the sites to get hacked.
If you can, if you have the resources, we recommend that every website owner
consider a virtual private server as well, which not only isolates your server account,
it isolates your operating system for your server by creating little virtual operating
system in a corner of the server so that’s even more isolation, which is another great
principle of website security.
Website firewalls, in addition to preventing hacks, like I mentioned with patching a
website if you’re on an old version of Joomla or an unpatched version of Magento,
it would be really difficult to stay on top of that, especially when sometimes a patch
will be released, and within seven hours, all the sites that use that particular item are
hacked. Once a firewall surrounds your site and basically patches it for you, it blocks
fresh attacks by limiting people from accessing your admin panel.
In our case, with the Sucuri firewall, we use IP whitelisting so only people on your
network or any IP’s that you’ve whitelisted are able to access your backend. You can
also mitigate DDOS attacks that are trying to take down your site and for anybody
who’s interested in website traffic, which I’m assuming most of you are because you’re
interested in preventing blacklisting, performance optimization is huge so most
website firewalls, including ours, has a content delivery network that allows you to
deliver your website faster to places around the world.
13
UNDERSTAND AND FIX GOOGLE BLACKLIST WARNINGS
TRANSCRIPTION
You can learn more about our website firewall at Sucuri.net. We also give everybody
a free HTTPS certificate, an SSL certificate with our website firewall plan, which is
another ranking factor for SCO, in addition to website speed. Not only are website
firewalls good for security, they’re actually good for your traffic and for your users as
well, to keep them protected using encrypted HTTPS and also, to speed up your site.
That’s a bit of an overview of everything that has to do with blacklisting. I wanted to
keep this webinar super quick so I could take some questions. We’ll do that now.
Thanks, everybody.
14
sucuri.net | 1.888.873.0817 | [email protected]
© 2017 Sucuri, Inc. All Rights Reserved
15