Skip to content
Really Simple Security logo
  • Pricing
  • Knowledge base
  • Support
  • Pricing
  • Knowledge base
  • Support
  • > Get Pro <
  • Pricing
  • Knowledge base
  • Support
  • Account area
  • > Get Pro <
  • Pricing
  • Knowledge base
  • Support
  • Account area
Login
Log out
Get PRO
  1. Home

Recent

Passkeys: no need for Limit Login Attempts?

Configuring Really Simple Security with WP-CLI

How to Fix The “Link you followed has Expired” error on WordPress

404 Not Found errors detected on your homepage

Protecting site visitors with Security Headers

Hardening your website’s security

Login protection as essential security

Why WordPress is (in)secure

Staying ahead of vulnerabilities

Password has been found in a data breach

Preventing the use of compromised passwords

Our journey towards Really Simple Security

Categories

  • Instructions
  • Security Features
  • Security Headers
  • Hardening
  • Let's Encrypt
  • Mixed Content
  • F.A.Q
  • Troubleshooting

Most popular

Passkeys: no need for Limit Login Attempts?

Configuring Really Simple Security with WP-CLI

How to Fix The “Link you followed has Expired” error on WordPress

404 Not Found errors detected on your homepage

Protecting site visitors with Security Headers

Hardening your website’s security

Login protection as essential security

Why WordPress is (in)secure

Staying ahead of vulnerabilities

Password has been found in a data breach

Preventing the use of compromised passwords

Our journey towards Really Simple Security

Passkeys: no need for Limit Login Attempts?

Traditional logins with usernames and passwords are often targeted by brute-force attacks, phishing, and credential stuffing. That’s where Passkeys come in: a modern, phishing-resistant authentication method that has been gaining traction for its usability and strength. Really Simple Security Pro includes Passkey support to allow site administrators to enable (or enforce) passkey-based logins on WordPress, replacing the need for traditional passwords. This can be enforced per user role: for instance, you can require Passkeys for Administrator and Editor roles only.

Read more
Jarno Vos July 18, 2025

Configuring Really Simple Security with WP-CLI

Table of contents What is WP-CLI? Why would you want to use it? Prerequisites and how to install How to use WP-CLI Really Simple Security WP-CLI commands What is WP-CLI? WP-CLI is a command-line interface for WordPress. It allows you to manage your WordPress site using commands in your terminal or command prompt, making it easier to automate tasks and manage your site without needing to log into the WordPress admin dashboard. Why would you want to use it? Using

Read more
Jarno Vos March 25, 2025

How to Fix The “Link you followed has Expired” error on WordPress

When trying to upload a (large) plugin or theme to your WordPress site, you might run into the message “The link you followed has expired”. This occurs because of the max. upload file size configuration of your WordPress installation, if the file you’re uploading exceeds this limit: this error could appear. How to find the current upload limit on your WordPress site You can view what these limits are currently set to, directly within the WordPress admin interface. This information

Read more
Jarno Vos February 27, 2025

404 Not Found errors detected on your homepage

The 404 Blocking rule in Really Simple Security’s Firewall helps protect your site against malicious scanning attempts by blocking IP addresses that generate too many 404 Not Found errors while scanning your site for vulnerabilities (a detailed explanation is available here). If you see the following notice appear on the Really Simple Security Dashboard, this means that the plugin has detected 404 Not Found errors on the homepage of your site. In such cases, the plugin automatically deactivates the 404 Blocking

Read more
Leon Wimmenhoeve January 15, 2025

Protecting site visitors with Security Headers

Each time you visit a website, information is exchanged between your device and the website’s server. HTTP headers play an important role in this communication, as they provide extra information about the data that is being shared. Security Headers are types of HTTP headers that are specifically designed to improve web application security. They instruct web browsers on how to handle a site’s content, to protect website visitors against common types of malicious attacks. Protecting your website visitors from malicious

Read more
Jarno Vos September 6, 2024
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Page9 Page10 Next »

Join our mailing list - 6 Tips & Tricks in your inbox over the next days!

Plugins

  • Really Simple Security
  • Complianz
  • SimplyBook.me

© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)

Wordpress Linkedin Github

Get Started

  • Pricing
  • Knowledge Base
  • Support
  • F.A.Q
  • Account
  • Become an Affiliate

About

  • About Us
  • Privacy Statement
  • Cookie Policy
  • Terms of Use
  • Coordinated Vulnerability Disclosure

Popular articles

  • Why WordPress is (in)secure
  • Always be ahead of vulnerabilities
  • Harden your website’s security
  • Login protection as essential security
  • Protect site visitors with Security Headers
  • Enable an efficient and performant firewall
Really Simple Plugins logo
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}