How to Secure WordPress WebSite Domain & Hosting Server ?

How to Secure WordPress Site?

How to Secure WordPress Site? >> Innovative Techniques of Digital Marketing to Grow & Sustain RMG Business

How to Secure WordPress Site: Hackers can steal your information and password to install malware software so they can distribute.

  • Google blacklisting more than 20,000 websites for malware and more than 50,000 for phishing each week. (Source: sucuri . net )
  • 90k website hacks everyday, 10k websites blacklisted everyday.
  • There is an attack every 39 seconds by Hackers and steal 75 records in every second (Source: Security Magazine )
  • 73% black hat hackers said traditional firewall & antivirus is irrelevant (Source: Thycotic . com)
  • Hackers make 300,000 new malwares daily. (Source: McAfee)
  • 30,000 websites are hacked every day. (Source: Forbes)
  • Shared Hosting Providers. hackers escalate their privileges on whole server, so automatically gaining access to your website
  • 170,000 times a year criminals attempt to steal domains.

WordPress Site Statistics

  • WordPress powers 35% of the internet in 2020 and 28% of eCommerce site
  • 98% of WordPress hack are related to plugins
  • 87% of websites have mid-level weaknesses. (Acunetixs Report 2019)

Check List

Security NameAtBnSpHdHl
1. WORDPRESS SECURITY.....
Set strong passwordsYYYYY
How to Backup and Restore WordPress Site with or without PluginYYYYY
Update Theme Storefront, Kuteshop, Woodmart & SahifaYYYYY
Update Plugin (Free & Pro Only)YYYYY
Remove unused theme Active/DisabledYYYYY
Remove unused theme Active/DisabledYYYYY
Remove Inactive User from WP, cPanel, FTP etc .....
Do not use Admin / Root as User NameYYYYY
New User Default Role set as SubscriberYYYYY
Set strong passwords YYYYY
Automatically log out Idle Users in WordPress.....
Change Default Login URL...Y.
Limit Login Attempt.....
Add Security Questions to WordPress Login ScreenYYYYY
Add two factor authentication for WP.....
Enable Web Application Firewall (WAF) In WP.....
Change WordPress Database wp_prefixYYYYY
Disable Directory Indexing (Robots.txt)YYYYY
Protected Access to WP Admin FOLDER.....
Scanning WordPress for Malware and VulnerabilitiesYYYYY
Configure Brute Force Protection in WordPressYYYYY
How to block spam commentsYYYYY
Fixing a Hacked WordPress SiteYYYYY
1 Click StagingYYYYY
2. HOSTING SERVER SECURITY.....
Set strong passwordsYYYYY
Add two factor authentication for hostingYYYYY
Enable Web Application Firewall (WAF) in Hosting.....
Disable SSH Access.....
Incorrect File Permissions.....
How to Edit Wp Config Php From Dashboard.....
Disable XML-RPC in WordPress.....
Prevent PHP direct execution on sensitive directories.....
WordPress Htaccess Configuration Access Control Allow Origin.....
Check & Compare All System HTML FilesYYYYY
Check & Compare All System Php FilesYYYYY
Configure Brute Force Protection in Hosting.....
Hotlink Protection (cPanel).....
3. CDN SECURITY
Set strong passwordsYYYYY
How to implement cloudflare CDN YYYYY
4. SSL SECURITY
How To Install SSL Certificate in cPanel for WordPress WebsiteYYYYY
SSL between Hosting & Cloudflare.....
5. DOMAIN SECURITY
Set strong passwordsYYYYY
Add two factor authentication for domainYYY..
Keep note for all registration informationYYYYY
Set domain expiry notificationYYYYY

Backup your Website

This is very important because when your file will be infected you may not clean all infected code, so in this situation you can restore your files

Disable File Edit

WordPress has built in code editor under Appearance menu which allows you to edit your theme and plugin files from your WordPress admin area. You should disable it. You can add code in wp-config.php files

1 // Disallow file edit
2 define( ‘DISALLOW_FILE_EDIT’, true );

Limit Login Attempt

Limit Login Attempts to protect your site from brute force attacks

  • phppot . com/wordpress/how-to-limit-login-attempts-in-wordpress/
  • stackoverflow . com/questions/25836668/wordpress-limit-login-attempts-without-plugins

Add below code to WordPress functions.php. This code contains the WordPress action & filter hook and the corresponding callback function. The callback contains code for restricting number of invalid login attempts.

function check_attempted_login( $user, $username, $password ) {
    if ( get_transient( 'attempted_login' ) ) {
        $datas = get_transient( 'attempted_login' );

        if ( $datas['tried'] >= 3 ) {
            $until = get_option( '_transient_timeout_' . 'attempted_login' );
            $time = time_to_go( $until );

            return new WP_Error( 'too_many_tried',  sprintf( __( '<strong>ERROR</strong>: You have reached authentication limit, you will be able to try again in %1$s.' ) , $time ) );
        }
    }

    return $user;
}
add_filter( 'authenticate', 'check_attempted_login', 30, 3 ); 
function login_failed( $username ) {
    if ( get_transient( 'attempted_login' ) ) {
        $datas = get_transient( 'attempted_login' );
        $datas['tried']++;

        if ( $datas['tried'] <= 3 )
            set_transient( 'attempted_login', $datas , 300 );
    } else {
        $datas = array(
            'tried'     => 1
        );
        set_transient( 'attempted_login', $datas , 300 );
    }
}
add_action( 'wp_login_failed', 'login_failed', 10, 1 ); 

function time_to_go($timestamp)
{

    // converting the mysql timestamp to php time
    $periods = array(
        "second",
        "minute",
        "hour",
        "day",
        "week",
        "month",
        "year"
    );
    $lengths = array(
        "60",
        "60",
        "24",
        "7",
        "4.35",
        "12"
    );
    $current_timestamp = time();
    $difference = abs($current_timestamp - $timestamp);
    for ($i = 0; $difference >= $lengths[$i] && $i < count($lengths) - 1; $i ++) {
        $difference /= $lengths[$i];
    }
    $difference = round($difference);
    if (isset($difference)) {
        if ($difference != 1)
            $periods[$i] .= "s";
            $output = "$difference $periods[$i]";
            return $output;
    }
}

Add two factor authentication

Source: wpbeginner . com/wordpress-security/#whysecurity

Do not use Admin / Root as User Name

Change Default Admin username if any. If not you are not able to delete user, make him subscriber.

Change WordPress Database wp_ Prefix

We can change it tow ways. One is Plugin Installation and custom SQL mode.

We can change it both custom more or with SQL command. The steps given below –

Step 1 – Change all table prefix in wp-config.php. Edit below prefix from File Manager

$table_prefix = ‘wp_’;

Change as

$table_prefix = ‘wprmg_’;

Now Save the file

Step 2 – Change all table prefix in database

Click on database name > Select all table start with wp_ ; > Click With selected to open drop down > With selected > Type in wp_ in the From-field, and type wprmg_ in To-field, wprmg_ > Click Continue for change

Step 3 – Replace all references into the old prefix

WordPress still contain to the old table prefix. To all changing the prefix, you need to replace these with new prefix.

Now go to SQL command in phpmyadmin and copy and paste the following commands

update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_capabilities' where meta_key = 'OLDPREFIX_capabilities';
update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_user_level' where meta_key = 'OLDPREFIX_user_level';
update NEWPREFIX_usermeta set meta_key = 'NEWPREFIX_autosave_draft_ids' where meta_key = 'OLDPREFIX_autosave_draft_ids';
update NEWPREFIX_options set option_name = 'NEWPREFIX_user_roles' where option_name = 'OLDPREFIX_user_roles';

Replace OLDPREFIX and NEWPREFIX, with your own old and new prefix. Like in the example below, where we replace wp_ with david_:

update david_usermeta set meta_key = 'david_capabilities' where meta_key = 'wp_capabilities';
update david_usermeta set meta_key = 'david_user_level' where meta_key = 'wp_user_level';
update david_usermeta set meta_key = 'david_autosave_draft_ids' where meta_key = 'wp_autosave_draft_ids';
update david_options set option_name = 'david_user_roles' where option_name = 'wp_user_roles';

Click on Go to run the commands and complete the change.

Change Default Login URL Without Plugin

Process 1: WordPress default URL: /wp-login.php or /wp-admin

  • At first go to public_html
  • Then take backup wp-login.php file
  • Then rename wp-login.php into any namen like mashiur.php
  • Then open file mashiur.php in any editor like notepad++
  • Then Replace all wp-login.php into mashiur.php (Generally 12 file will replace)
  • Finally it is done. Now go to your new URL and login

Process 2: Add the following code to your .htaccess file to change the name of your login URL:
01 RewriteRule ^mynewlogin$ http://www.yoursite.com/wp-login.php [NC,L]

Process 3: Plugin Installation

Prevent PHP direct execution on sensitive directories

Directories such as “wp-content” and “wp-includes” are generally not intended to be accessed by any user, consider hardening them via Sucuri Security -> Settings -> Hardening.

Disable SSH Access

By default it may open. 99% hacker try to login with SSH console. So must disable it

Configure Brute Force Protection

You can protect from WordPress Plugin, cPanel, WHM, VPS, even form dedicated server control panel

Jetpack Security :

User Free feature of Jetpack plugin to protect brute force attack

cPhulk Brute Force Protection Configure

Disable XML-RPC in WordPress

domain.com/xmlrpc.php
XML-RPC file is required to jetpack to work. Without the xmlrpc, Jetpack will not work.

1 Click Staging

Safely test changes to your website before you roll them out to visitors without breaking your site. Staging gives you confidence to test changes before you publish without worry. It creates a copy of your site in a “sandbox” environment where you can experiment & preview changes without it affecting . When you’re ready, push your changes to your live site with a simple click!

  • You’ll see a link and login information abccom.stage.site
  • When you go here, you’ll be asked for user name / password. Its provided on the same staging tab
  • The staging site should be a replication of your live site.You can then login to the staging wp-admin and make the changes there
  • Remember, your changes in the staging will not affect the live site.If you like the changes you made on the staging site and want to push to the live site, you can request that on the staging tab

Security Plugin List

(A) Jetpack – WP Security, Backup, Speed, & Growth

(B) Wordfence Security – Firewall & Malware Scan

(C) All In One WP Security & Firewall

(D) Defender Security – Malware Scanner, Login Security & Firewall

(E) Cerber Security, Anti-spam & Malware Scan

(F) Security & Malware scan by CleanTalk

(G) WP Hide & Security Enhancer

(H) NinjaFirewall (WP Edition) – Advanced Security

(I) Shield Security: Powerful All-In-One Protection

(J) Security Ninja – Secure Firewall & Secure Malware Scanner

(K) MalCare Security – Free Malware Scanner, Protection & Security for WordPress

(L) BulletProof Security

(M) Sucuri Security – Auditing, Malware Scanner and Security Hardening

(N) Titan Anti-spam & Security

(O) WP Activity Log

(P) Anti-Malware Security and Brute-Force Firewall

(Q) Hide My WP Ghost – Security Plugin

Free Features

  1. Block spam comments
  2. Brute force attacks to hack password
  3. Brute force attacks to identify account name
  4. Two-factor authentication (2FA)
  5. CAPTCHA stops bots from logging in
  6. Google reCAPTCHA for against spammers.
  7. Limit Login attempt
  8. Custom Login URL
  9. WordPress.com powered login & 2FA for extra protection
  10. Back up your site automatically and restore
  11. Set a maximum password age and force users to choose a new password
  12. Security Protection for WordPress login form
  13. Security Protection for WordPress backend
  14. Uptime / downtime monitoring
  15. Checks core files, themes and plugins for malware
  16. Activity log and Alert to admin for file editing
  17. Repair files that have changed by overwriting them with a pristine, original version.
  18. Checks your content safety by scanning file contents, posts and comments for dangerous URLs and suspicious content
  19. Block logins for administrators using known compromised passwords.
  20. Firewall identifies & blocks malicious traffic
  21. Blocks requests that include malicious code & content.
  22. Temporary Privilege Access permissoin

Login masking – change the location of WordPress’s default login area
Login lockout – failed login attempts lockout
404 Detection – automated block of bot IPs
Geolocation IP lockout – block users based on location and country (IP blocking)
WordPress Security Firewall – block or whitelist IPs
Disable trackbacks and pingbacks – spam prevention
Change default database prefix – they won’t find this
Disable file editor – if they get in, they won’t get far
Prevent PHP execution – because it’s daaaangerous
Permit or restrict access by White IP Access list and Black IP Access List with a single IP, IP range or subnet.
Cerber anti-spam engine for protecting contact and registration forms.
Protects wp-login.php, wp-signup.php and wp-register.php from attacks.
Hides wp-admin (dashboard) if a visitor isn’t logged in.
Immediately blocks an intruder IP when attempting to log in with non-existent or prohibited username.
Restrict user registration or login with a username matching REGEX patterns.
Block access to XML-RPC (block access to XML-RPC including Pingbacks and Trackbacks).

External Tutorial

TopicURL
cPHulk Brute Force Protection docs.cpanel.net/whm/security-center/cphulk-brute-force-protection/#blacklist-management
cPHulk Brute Force Protectionyoutube.com/watch?v=mmhXVY2eNpM
VPS Backup Setupdocs.cpanel.net/whm/backup/backup-configuration
WP Login URL Changethemesgrove.com/change-wordpress-login-url-without-plugin
WP Login URL Changeelegantthemes.com/blog/resources/how-to-obscure-your-sites-login-page-without-a-plugin
1 click stagingdreamhost.com/features/wordpress-staging
Security Development Step by Step Process

Security Development Step by Step Process

Security Development

Security Development -The security assessment carried out on 24 April 2008, clearly depicts some distinct security guard which must be mended as soon as possible. As some problem may take some time to be fixed as such a sixth monthly module is hereby being created to bridge the deficiencies and make the security…

  • By the end of May 2008, letter will be sent to the home address of all workers for Police Verification. Sufficient lighting is arranged in the loading and un-loading areas to prevent un-authorized activities.
  • Within the month of May letters will be to the home address of all staffs for Police Verification.
  • A proper system of retrieval of access control items from lefty workers. Private parking area will be separated from loading and un-loading areas by means of physical barrier if necessary.
  • Intruder detection system will have to be developed in many way where by any instruction can  be detection.
  • By the end of Jun 2008, those of who could not be verified with background checks will be completed.
  • Security personnel will be posted in all restricted areas and prevent un-authorized entry into packing areas, stores, finished goods area and loading /un-loading areas. Employee orientation on all security matters will be completed.
  • Perimeter security to be made more effective by enhancing number of security patrols.
  • ISO Bolt Seal 17762 will be introduced for all shipment purpose. Adequate security will be posted covering the entire factory premises to prevent un-lawful entry and damaged of the factory property.
  • By the end of July2008, all remaining workers pr staff whose background check couldn’t be completed will be complete.
  • Car Parking Area to be extended and made bigger.
  • Number of CCTV to be increased and all entry/exit points to be covered.
  • Background check of contractors will be verified for correctness.
  • Background Check of all remaining workers and staff will be completed.
  • Background Check of the forwarders will be conducted.
  • Port Security will be evaluated. Security personnel will be posted at all entry / exit points to verify identity and un-lawful entry into the premise.
  • CCTV will be increased to include all production floors.
  • Background check of all remaining staff and workers will be completed.
  • Flammable, toxic, dangerous chemicals will be stored in a separate and secure place of the building and all precaution will be taken for appropriate storage stop pilferage /misuse. Number of CCTV will be enhanced to include all stores.
  • New workers orientation to be reviewed to include new aspects of security.
  • Background check of all employees which could not be done will be completed.
  • Security Development- A detailed assessment will be done to review the position of security standard then. Packing and finished goods area will be segregated from the rest of the working floor by means of physical barrier and will be restricted from easy access.

More Duties

Upon closer of the factory, representative of security section, electric unit, HR personnel and working floor will be check jointly and ensure all lights, fans, electrical mains/circuits/switches switched off, water taps and doors locked and sealed.

  • Separeted  Employees Log
  • ID  Card Issue  Log
  • ID  Card Replacement  /Re-Issue Log
  • ID Card Return Log
  • Factory Opening & Closing Log
  • Short Leave /Gate Pass Log
  • Shortage/Overage Reporting Log
  • Employees Movement Log
  • Container /Covered Van Inspection Log
  • Export Register
  • Seal/Lock Usage Log
  • CCTV Monitoring Log
  • Visitor,s Vehicle Checking Log   
  • Incoming Mail / Parcel Checking  Log
  • Employee,s  Late  Entry  Log
  • Visitor,s Log
  • Vehicles  In/  Out Register
  • Key Received And Return                                                                                                                    
  • Security Patrol Duty Register

Factory Security Assessment

Factory will installed security arch or commission hand held battery operated metal detector at the entrance of building to monitor entry of un authorized materials by worker / staff and visitors.

  • The intrusion detection or alarm system has back-up power and is tested regularly.
  • A record is maintained of employee access to keys, cards or codes.
  • Facility utilizes card or code activated locking devices to protect controlled areas?
  • Keys / cards are returned or codes are changed when an employee leaves the company?
  • Procedures exist to immediately terminate existing physical areas when an employee terminates employment or transfers to another position?
  • Management is provided with a current list of all employee access privileges on a monthly basis?
  • All facility buildings are constructed of materials that prevent unlawful entry and are kept in good repair?
  • There is a policy that requires that all security procedures are documented?
  • The facility has a security department / personnel?
  • There is a designated security chief at the facility?
  • An appointed official is responsible for facility, employees and transport security?
  • An appointed facility official is responsible for security audits for evaluations?
  • A facility security plan is developed and is reviewed / updated semi – annually?
  • A site security assessment is conducted quarterly to identify vulnerabilities and necessary corrective actions?
  • Personnel security procedures are written and evaluated quarterly?
  • Personnel security procedures are evaluated in response to security failures?
  • Personnel security requirements apply to contracting temporary and part time employees?
  • Employment applications are required for all applicants?
  • The security will have only access to perimeter lighting switch box as well as external door alarm system. All applicants are interviewed?
  • When allowed by law, background checks are conducted on all applicants?
  • Applicant background check includes employment history, reference check and criminal records check?
  • The applicant’s examined identification includes a national ID and Birth Certificates?
  • When allowed by law, background checks are updated on all employees?
  • A permanent personnel file is maintained for each employee with the employee’s name, date of birth, and a national ID number?
  • Checks will be made on alternate days for damaged /broken identification of perimeters walls, building, doors and windows by security personnel and report to the management. The facility retains a copy of the employee’s official identification?
  • A facility issued a photo-badge is required for employee access?
  • Issue of employee identification is centralized and controlled by a specific dept. and restricted to limited authorized employees?
  • Procedures are used to retrieve an employee ID and / or deactivate access as needed?
  • Lost IDs are recorded as missing before replacement and security staff informed?
  • A specific color coded ID is required to access restricted areas
  • Security guards monitor access to facility restricted areas?
  • New employee orientation includes confirming that anytime onsite the facility requires wearing an ID badge?
  • New employee orientation includes undefined persons, breach of computer security and internal conspiracies?
  • New employees are asked to report compromised to security infrastructure such as broken locks, windows and facility structure?
  • The facility has a documented security awareness program in place for all employees to include training participation?
  • Employees are encouraged to report irregularities, suspicious activity and security violations through an incentive program?
  • Security procedures are publicized throughout the facility on posters and bulletin boards?
  • Duty roster of all security personnel will be prepared for 24 hours a day covering all entry /exit points and entire compound and approved by the management. The facility of Security Developmenthas an intrusion detection ( or alarm system?
What is Security Patrol Services for Factory

What is Security Patrol Services for Factory

Security Patrol Services

Security Patrol Services- This training is to be conducted by the security officer and if he is not able to attend the training the second in command will carry on the programme The guards shall, particularly, but not limited to, be attentive to the following during  their patrols or observations: …

  • They will observe any illegal activities, anomalies, any suspected activities or materials and performance of security personnel. Border/Fence lines, especially portions susceptible to intrusion from outside.
  • If there is any observance or discrepancies they will note down into the patrol register which is previously kept at the security post. Inside or behind buildings, structures, etc.
  • If patrol duty finds any seAuto us or major violation he immediately will inform to the management through administration.  Where doors and windows are unlocked or broken.
  • If the requirements is major in demand the may call  the law enforcement department through phone.  Materials or places that may cause fires.
  • This anti-terrorism programme must be included the following points: Leaks of water, gases, oils or fuels.
  • Security and Construction lights.
  • Any acts violating the rules.
  • Suspicious individuals.
  • The timing, frequency and routes of patrols shall vary and shall not develop into a regular pattern.
  • Fence lines shall be adequately patrolled daily to ensure that there are no breaches in any way, but where so, immediate action shall be taken to re-secure.
  • At any openings in the fence for construction purposes shall be manned at all times.
  • Areas surrounded by fencing shall be secured by guards at guard huts, and other areas shall be secured by patrolling periodically.
  • EMERGENCY
  • Fire
  • Border/Fence lines, especially portions susceptible to intrusion from outside.
  • Each and every security personnel must require participating training everyday early in the morning and evening for two hours. First one hour for physical exercise, another hour for security procedure and anti-terrorism awareness programme. Inside or behind buildings, structures, etc.
  • Where doors and windows are unlocked or broken.
  • Materials or places that may cause fires.
  • Leaks of water, gases, oils or fuels.
  • Security and Construction lights.
  • Any acts violating the rules.
  • Suspicious individuals.
  • The timing, frequency and routes of patrols shall vary and shall not develop into a regular pattern.
  • Fence lines shall be adequately patrolled daily to ensure that there are no breaches in any way, but where so, immediate action shall be taken to re-secure.
  • At any openings in the fence for construction purposes shall be manned at all times.
  • Areas surrounded by fencing shall be secured by guards at guard huts, and other areas shall be secured by patrolling periodically.
  • EMERGENCY
  • Fire
  • The following records shall be kept for duration of three months.
  • Security Patrol Log
  • Applications for I. 0 cards
  • Applications for Vehicle/Equipment permit

Questionnaires

  • Doors, windows, or fence open or broken?
  • All gates are kept locked?
  • Any property damage noted?
  • Fire hazards observed?
  • Violations of rules?
  • Any suspicious individuals?
  • Any trespassers?
  • All materials taken out with a material pass?
  • Any Security Lights off?
  • Others? If any, specify?

Physical Security Patrol

  1. The factory is located in an industrial area and its perimeter is enclosed with proper fencing or boundary wall. Security guards will make routine patrol along the fencing to ensure there is no insurgency, breakage or illegal entry through the fence line.
  2. Cargo will be received or delivered from the designated cargo handling area and incoming cargo will be stored on the designated store area by the storekeeper and segregated as per the storage policy of the company. Similarly outbound finished goods will be delivered from the designated finished goods section following the procedures.
  3. Outside fencing and inside storage area, its doors, windows and locks will be regularly inspected by the department in charge and security personnel on a regular basis for maintaining integrity and damage.  
  4. The factory premise and factory building has one entry / exit controlled by a gate and manned by security guards all the time. This is done to ensure safety and maintain access control.
  5. Private passenger vehicles are prohibited from parking inside the factory premises. Only company vehicles will be allowed to park inside the premises. During loading and unloading no vehicles except the cover van will be allowed in the premises. Loading and unloading area is marked separately and no vehicles will be allowed to park there. Vehicle in and out register maintained by the security guard posted at the gate.
  6. The factory building is built of RCC structure. Collapsible and shutter gates are used for all entry and exits of the A building maintenance register is maintained by the management. This will ensure the integrity of the structure by periodic inspection and repair when needed. Inspections will be done on a monthly basis and dates and description of problems and details of maintenance work performed will be recorded in the register.
  7. Security officer and guards will place seals and locks on every floor after the factory is closed for the working day and will also open the locks and seals at the time of opening the working day. The floor in charge and Assistant Factory Manager will also need to accompany the security officer at the time of placing and opening the seal or lock. Any discrepancy or tampering on the seals or locks must be immediately reported to Manager Administration. A register will be maintained to this affect that will contain the information and observation during opening and closing of the locks or seals. A set of keys will be kept with the security in charge and another set will be kept with the management. If any maintenance work is carried out or if workers need to work on the floor after the normal factory working hours it must be reported to the Security Officer, Manager Administration and the concerned department in charge and time section during the usual working hours.
  8. All entrances and exits, cargo handling areas, storages areas, fence lines and parking areas inside and outside the factory is well illuminated. Security In Charge, Floor and department in charges will work with the maintenance personnel to ensure this facility.
  9. The factory has internal and external communication system. PABX system allows the office to contact with the floors aside from the P.A system. Floor In charge and Department In Charges can contact each other and the office with the walky-talkies provided to them. In case of emergency the fire alarms can be activated and calls can be placed to the concerned authorities. Security can contact the concerned authorities by dialing external numbers. A list of the numbers in cases of emergency is posted on the security and reception desk.
  10. Security Guards and Officer will alternately make routine patrols during factory open and closed hours in and around the building to ensure there are no infiltrations or unauthorized entry or break ins. If there is any sign of any unlawful entry then please report immediately to security officer or manager administration and the concerned authority.

Conclusion

Security Patrol -Factory CCTV camera at the following locations. Main gate to monitor the entry and      exit of workers and visitors Container loading area to monitor the loading and unloading of import and export trucks. Carton storage area to monitor and see that no unauthorized persons enter the area.The recordings are kept for a period of 30 days.

Security Guard Management System and Information

Security Guard Management System and Information

Security Guard Management Security

Security Guard Management – This security management plan shall define measures to be in place during the construction and commissioning phases of the project. The plan shall specify the minimum-security requirements applicable to the protection of employees, property and the workplace in all 8MI operations, and elsewhere in connection with the execution of the project. The plan shall apply to all premises controlled by the 8MI during the construction and commissioning phases, and all persons accessing such premises during these phases. Reporting directly to the Project Manager, he shall; …

Security Training and Threat Awareness:

  • All employees are highly encouraged to report any security related anomalies or any discrepancies or any illegal activities to your Supervisor or the Floor In Charge in person.
  • Need Security Guard Card Policy in a Private Industry
  • If your concern is not addressed then you are encouraged to report to the Security officer or Administration Manager or General Manager either through the complain or suggestion box or in person. The suggestion box is located in the ground floor in an easily accessible location. Manage, review and develop the security operation to ensure that it fulfils project requirements.(e.g. install electronic entry system as soon as possible)
  • If you prefer your identity not to be disclosed, your identity will not be revealed during the investigation process and awards will be given if specific charges can be proved.Prepare security procedures and associated documentation necessary to fulfill the purpose of this security plan.
  • Periodic audits will be performed from time to time to test the security procedures in practice and check its performance and asses the potential gap and areas of improvemen Ensure that the security resources are adequate to cover all project needs and site security operations reflect the requirements of the project.
  • Liaise with construction Partner/Subcontractor security management.
  • Ensure that appropriate Contractor and the Company staff are made aware of all security issues.
  • We pledge all our employees to maintain respect and adhere to the employer and employee confidentiality and not to disclose any information regarding the company to any outsider. We expect our employees to respect company’s privacy and sensitive information and not to disclose any information to the outsiders.Make a report without delay to the Project Manager when any security irregularities or breaches or incident have taken place.
  • Be held accountable for all undesired losses sustained on the project.
  • Ensure that this security plan and organization is established, and its derivative programme, procedures and work practices are implemented to provide adequate and continuous security coverage to maintain the peace of the project.
  • Communicate with local and governmental law enforcement bodies and security organizations in accordance with both legislative and the Company requirements.
  • The management of Auto  Garments & Textiles Ltd with the cooperation from its valued employees wants to ensure the safety and security of all employees that work here, all things that are procured and produced at the factory and all the information related to it. Evaluate the performance of the security organization and personnel.
  • Periodic training sessions will be conducted by Manager Administration, Security Officer, Production Manager, Floor Managers and Supervisors to teach and train employees about the above mentioned basic security requirements of the company. Ensure that all agreed recommendations arising from investigations into theft, sabotage; unauthorized entries etc. are closed out.

Conclusion

Security Guard Management – The plan shall not apply to the Company facilities outside the worksite, where instead, arrangements and controls as determined by the Company, shall be applicable.

The plan details the criteria according to which the duties of all concerned and/or personnel are to be carried out security controls and services.

This plan is based on the assumption that all of the security fencing and temporary gates are installed. Until such fencing and gates are installed, early site security arrangements will be separately established.

We will work together to ensure safety of man, material and information at Auto  Garments & Textiles Ltd. It shall be reviewed on an ongoing basis to reflect changes in work scope, knowledge or other relevant circumstances, so as to ensure the achievement of its objectives.

Bengal Security System in Readymade Garments Factory

Bengal Security System in Readymade Garments Factory

Bengal Security

It is our pleasure to welcome you at Bengal Security System (BESS). The BESS intends to ensure your security in all sphere of life- your office, households, industry, educational institutions, religious establishments, market places or even in leisure places to make you feel comfortable and thereby increasing productivity and efficiency. 

Security has always been an imperative part of our life. Technological revolution of modern age has pioneered the concept of electronic security systems with a widespread popularity. Protecting life and hard earned valuables is a leading concern. The BESS propagates total security in everyday reality. Think your home, office, factory or a public place where a simple gesture can open up infinity of practical possibilities for your safety. Once this is understood, you can begin to understand just how much a part we play in all this. How much research, technology, experience and support there is behind the products which, at any moment of the day, are able to satisfy large or small needs for security of life and assets.

The Bengal Electra & security System has adopted a simple approach – deliver intelligent and reliable solutions that provide peace of mind to our customers and are easy to install and maintain by System Integration partners. We provide electronic security systems that offer maximum efficiency and optimal simplicity.

Strength of the BESS

  • We have a strong management team who are very much committed to serve the best quality product with competitive price. We believe commitment is the key to success.
  • We are committed to provide a service what customer wants to implement. For that reason we have a strong marketing team that is very much familiar about current technology and ideas. The people in the team are very professional with the knowledge about the situation of our customer’s expectation. So, they are capable of sharing the best idea and will design competitive best solution what you looking for.
  • On the other hand we also have a very strong technical team who are working together with successful track record in same field. They are capable to accomplish all jobs within the shortest possible time and committed to serve after sales service in short time.

Attributes of the Product and Services:

Security Items

CCTV & IP Camera system:

1) CCTV camera (HD&AHD) solution with DVR based 2) IP Camera Solution with NVR based 3) IP Wireless Home Security Camera Mobile Based 4) PTZ Camera Solution 5) ZOOM Type Camera (Very focal)

Access Control & Time Attendance system:

1) Biometric Access Control & Time Attendance system 2) Proximity Access Control & Time Attendance system 3) Face Id Access Control & Time Attendance system

Metal Detector system:

  • Hand Held Metal Detector supply
  • Arch-way

Fire Alarm System:

1)Addressable Fire Alarm System 2) Conventional Fire Alarm System 3) Wireless Stand alone Fire Alarm system 4) Fire Extinguisher supply & installation 5) Fire Extinguisher Re-filling

Networking Items:

  • Complete Office Networking 
  • LAN Cabling 
  • Switching Router ,Rack ,Accessories
  • Trouble shooting
  • Configuration 
  • Testing …..

Electronics Items : 1) Multimedia Projector

Others Products:

  • Video Door Call System
  • Auto Bugler alarms system
  • Proximity Card & Holders Supply

Projects Experienced by the member(s) of BESS Team

Though the Bengal Electra Security Services is comparatively new as an establishment, but its team member(s)  has been experienced substantially in working with numerous partners, for instance,  Sigma Group, Ananda Group, Lalon School & Collage, TRZ Group, Khulna Shipyard, Tk Group, Grace Builders Ltd, Otobi,Imran Studio, Zavi & Zayeand  Group,RanksTel, Poly Cables,  Azmiry United Finance,  Far East composite ltd, UGI Group,  Surge Communication,

Elecreo Group, Shardar Tower, Kallol Group, Sun flower School, Samadsons Group,Hasan Knitting, Power Breeze, Langka  Bangla, Hall-Mark Group, BASE TEXTILES LIMITED, National  Feed, GFN ACCESSORIES, RFL, J. B. TRADING, Prity Garments, Masud & Company Joy Media,  SPARKLE APPARELS, Land Mark Group, ZIPLACE FASHION, PACIFIC JEANS, VIKA KOLB, Sikdar Garments, ALPHA HOMEO CARE 2,  BANGLADESH

CLINIC, Bay,  ATTIC BUILDERS (PVT.) LTD, Rainbo Departmental Stor, ALPHA BUILDERS LTD, Confidence, BABOR TRAVELS, Niloy Engineering Ltd., DIGNITA, Bonolota Housing at Bengal Security MOMOSHA TRADING CORPORATION, and Amena Tower

Fire Extinguishing Equipment
Location Marked Floor Clear
Maintenance of Equipment
Storage of Flammable & Explosive Material
Alarm System
Fire Fighting Drills & Instructions
Security System
Emergency Planning
Fire Prevention & Protection Coordinator

Emergency Action Plan available

  • To ensure safe, effective response to emergency situations.
  • Emergency plan devised to cover all eventualities and copies to be available to all employees on a “ need-to-know” basis.
  • (Enter full text Emergency Plan)
  • Separate first-aid-trained.
  • First aid teams to be appointed and listed on notice boards, First aid to be included in regular drills.
  • Coordinator trained to take control.
  • Coordinator ( and alternate ) to be appointed and trained.
  • ( Enter details of training and copy of appointment(s)
  • Control Centre / Emergency equipment.
  • A suitable area to be designated as control centre during emergency evacuation