Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Mencegah infeksi malware
Agar terbebas dari malware, Anda harus terus waspada. Artikel ini berisi tips dan
petunjuk mencegah infeksi malware. Namun, ini bukan artikel yang lengkap; Google
juga mendorong pemilik situs untuk melakukan riset secara menyeluruh.
Memantau kondisi situs
Banyak fitur Search Console yang dapat membantu Anda mengidentifikasi potensi masalah. Contoh:
Coba lakukan penelusuran di Google dengan operator penelusuran site: untuk melihat halaman apa saja yang telah ditemukan Google di situs Anda. Sebaiknya lakukan hal ini
secara berkala untuk mengetahui apakah seseorang telah menyisipkan halaman atau konten yang tidak diharapkan di situs Anda. Jika
terdapat halaman yang tidak dikenal di situs Anda, atau topik yang tidak Anda tulis, kemungkinan situs Anda telah
diretas. Jika Anda belum familier dengan operator penelusuran site:, ini adalah cara untuk membatasi penelusuran ke situs tertentu. Misalnya, penelusuran
site:developers.google.com
hanya akan menampilkan hasil dari situs Google Developers.
Laporan Masalah Keamanan
menampilkan halaman di situs Anda yang diretas dan telah diidentifikasi Google, beserta petunjuk
memperbaiki masalah tersebut.
Pilih penyedia konten pihak ketiga dengan hati-hati.
Pastikan bahwa aplikasi pihak ketiga dan iklan di situs Anda berasal dari
sumber tepercaya dan valid. Sumber tepercaya dan valid memberikan dukungan dan informasi kontak di
situs mereka.
Hubungi perusahaan hosting Anda atau platform penayang untuk mendapatkan dukungan.
Sebagian besar perusahaan memiliki kelompok dukungan dan/atau halaman keamanan yang responsif dan membantu. Jika
halaman atau situs keamanan memiliki feed RSS, berlanggananlah ke feed tersebut untuk memastikan Anda tetap mendapatkan informasi terbaru.
Jaga agar semua komputer Anda tetap aman. Terutama saat membuat situs, pastikan
tempat kerja lokal Anda memiliki software terbaru, bersih dari virus, trojan, atau malware serupa,
dan sudah menginstal software antivirus terbaru.
Pemilik situs dengan akses server
Periksa konfigurasi server Anda.
Apache memiliki beberapa
tips konfigurasi keamanan
dan Microsoft memiliki beberapa
resource pusat teknologi untuk IIS
di situsnya masing-masing. Beberapa tips tersebut menyertakan informasi tentang izin direktori, server-side
includes, autentikasi, dan enkripsi.
Buat salinan cadangan file .htaccess
(atau mekanisme kontrol akses lainnya, tergantung platform situs Anda). Gunakan file cadangan
untuk memulihkan jika yang berikut ini gagal. Pastikan untuk menghapus file cadangan setelah
selesai.
Ikuti kabar terbaru tentang update dan patch software terkini.
Ada banyak alat yang mempermudah pembuatan situs, tetapi semuanya berisiko membuat situs rawan
dieksploitasi. Masalah umum bagi banyak pemilik situs adalah memasang forum atau blog di
situs mereka, lalu melupakannya. Sama seperti membawa mobil untuk diservis,
penting untuk memastikan bahwa semua versi program software yang diinstal merupakan
yang terbaru. Buatlah daftar untuk semua software dan plugin yang digunakan untuk situs Anda, dan
perhatikan update serta nomor versinya. Meskipun Anda rajin dan terus mengupdate
semua komponen situs, Anda mungkin masih rentan jika hoster web belum menginstal
patch sistem operasi terbaru. Masalah ini tidak hanya memengaruhi situs kecil. Banyak
peringatan muncul pada situs bank, tim olahraga, dan situs milik perusahaan dan pemerintah.
Awasi file log Anda.
Menjadikan ini sebuah kebiasaan akan memberikan banyak manfaat, salah satunya adalah peningkatan keamanan. Misalnya,
parameter URL yang tidak dikenal (seperti =http: atau =//) atau lonjakan
traffic untuk URL alihan di situs Anda dapat mengindikasikan bahwa peretas mengeksploitasi
pengalihan terbuka. Selain itu, perlu diingat
bahwa peretas sering kali mencoba untuk mengubah file log. Ambil langkah untuk melindungi file ini dari
serangan. Misalnya, Anda dapat memindahkan file ini dari lokasi defaultnya, sehingga membuatnya lebih sulit
untuk ditemukan peretas.
Periksa situs Anda untuk menemukan kerentanan umum.
Hindari direktori dengan izin terbuka. Itu sama seperti membiarkan pintu depan
rumah terbuka lebar.
Selain itu, periksa juga kerentanan
XSS
(pembuatan skrip lintas situs) dan
injeksi SQL.
Gunakan protokol yang aman.
Google merekomendasikan penggunaan SSH dan SFTP untuk transfer data, sebagai ganti protokol teks biasa
seperti telnet atau FTP. SSH dan SFTP menggunakan enkripsi dan lebih aman.
Terus ikuti berita keamanan terbaru.Google Security Blog
memberikan informasi yang bermanfaat tentang keamanan dan keselamatan online, serta petunjuk ke
referensi lainnya. Situs pemerintah
US-CERT
(United States Computer Emergency Readiness Team) memberikan tips dan
peringatan keamanan teknis.
Jika Anda adalah pengguna Search Console dan mengalami masalah keamanan yang terus berlanjut atau tidak dapat diperbaiki di situs, Anda dapat memberi tahu kami.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Informasi yang saya butuhkan tidak ada","missingTheInformationINeed","thumb-down"],["Terlalu rumit/langkahnya terlalu banyak","tooComplicatedTooManySteps","thumb-down"],["Sudah usang","outOfDate","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Masalah kode / contoh","samplesCodeIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-04 UTC."],[[["\u003cp\u003eThis guide offers essential tips and best practices for preventing malware infection on your website.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Search Console provides valuable tools, such as the Security Issues report, for monitoring your site's health and identifying potential problems.\u003c/p\u003e\n"],["\u003cp\u003eImplementing strong security measures like choosing robust passwords, carefully selecting third-party content, and regularly updating software is crucial for website owners.\u003c/p\u003e\n"],["\u003cp\u003eFor website owners with server access, securing server configurations, monitoring log files, and staying informed about the latest security updates are vital steps in safeguarding your site.\u003c/p\u003e\n"],["\u003cp\u003eIf you encounter persistent security issues despite implementing these recommendations, Google provides a channel to report them.\u003c/p\u003e\n"]]],["To prevent malware, website owners should monitor site health using Search Console features like the `site:` operator and Security Issues report. Key actions include choosing strong passwords, carefully vetting third-party content, and contacting hosting support. For those with server access, regular software updates, server configuration checks, log file monitoring, and vulnerability checks are crucial. Utilizing secure protocols like SSH/SFTP and staying informed on the latest security news are also recommended.\n"],null,["# How To Prevent Malware Infection | Google Search Central\n\nPreventing malware infection\n============================\n\n\nThe price of freedom from malware is eternal vigilance. This article contains tips and\npointers for preventing malware infection. However, it is by no means exhaustive, and Google\nencourages website owners to conduct more thorough research as well.\n\nMonitoring your site health\n---------------------------\n\n\nMany of the features of Search Console can help you identify potential problems. For example:\n\n- Try a search on Google with the [`site:` search operator](https://support.google.com/websearch/answer/2466433) to see what pages Google has found on your site. It's always a good idea to do this periodically to see whether anyone has snuck unexpected pages or content on your site. If you see unknown pages on your site, or topics that you didn't write, you may have been hacked. If you're not already familiar with the `site:` search operator, it's a way for you to restrict your search to a specific site. For example, the search [`site:developers.google.com`](https://www.google.com/search?q=site%3Asite:developers.google.com) will return results only from the Google Developers site.\n- The [Security Issues report](https://support.google.com/webmasters/answer/9044101) shows any hacked pages that Google has identified on your site, and instructions on how to fix the problem.\n- If Google detects malware on your site, you'll see a notification in the [message panel in\n Search Console](https://support.google.com/webmasters/answer/9388335). To ensure that you're notified quickly, you can have your messages [forwarded to your email account](https://support.google.com/webmasters/answer/140528).\n\nSecurity checklist\n------------------\n\nIn addition to monitoring your site regularly, we also recommend the following:\n\n### All website owners\n\n- **Choose good passwords.** The [Google account guidelines](https://support.google.com/accounts/answer/32040) are helpful.\n- **Pick third-party content providers very carefully.** Make sure that third-party apps and ads on your site are from trusted and legitimate sources. A trusted and legitimate source provides support and contact information on their website.\n- **Contact your hosting company or publishing platform for support.** Most companies have helpful and responsive support groups and/or security pages. If a security page or site has an RSS feed, subscribe to it to make sure you stay up to date.\n- Keep all of your computers safe. Especially when working on a website, make sure that your local workstation has up-to-date software, is clean from viruses, trojans, or similar malware and has recently updated anti-virus software installed.\n\n### Website owners with server access\n\n- **Check your server configuration.** Apache has some [security configuration tips](https://httpd.apache.org/docs/2.4/misc/security_tips.html) on their site and Microsoft has some [tech center resources for IIS](https://www.google.com/search?q=microsoft+iis+security+best+practices) on theirs. Some of these tips include information on directory permissions, server-side includes, authentication, and encryption.\n- **Make a backup copy of your `.htaccess` file** (or other access control mechanisms depending on your website platform). Use your backup file to recover if the following fails. Be sure to delete the backup file once you are finished.\n- **Stay up-to-date with the latest software updates and patches.** There are lots of tools that make building a website easy, but each one adds some risk of being exploited. A common pitfall for many website owners is to install a forum or blog on their website and then forget about it. Much like taking your car in for a tune-up, it's important to make sure you have all the latest updates for any software program you have installed. Make a list of all the software and plug-ins used for your website, and keep track of the version numbers and updates. Even if you're diligent and keep all your website components updated, you may still be vulnerable if your web hoster has not installed the most recent operating system patches. This problem affects not only small sites; there have been warnings on the websites of banks, sports teams, and corporate and government websites.\n- **Keep an eye on your log files.** Making this a habit has many great benefits, one of which is added security. For example, unfamiliar URL parameters (like `=http:` or `=//`) or spikes in traffic to redirect URLs on your site may indicate that a hacker is exploiting [open redirects](/search/docs/advanced/guidelines/sneaky-redirects). Also, bear in mind that hackers often try to alter log files. Take measures to protect these files from attack. For example, you can move these files from their default location, making it harder for hackers to find them.\n- **Check your site for common vulnerabilities.** Avoid having directories with open permissions. This is like leaving the front door to your home wide open.\n\n\n Also check for any\n [XSS](https://www.owasp.org/index.php/Cross_Site_Scripting)\n (cross-site scripting) and\n [SQL injection](https://owasp.org/www-community/attacks/SQL_Injection) vulnerabilities.\n- **Use secure protocols.** Google recommends using SSH and SFTP for data transfer, rather than plain text protocols such as telnet or FTP. SSH and SFTP use encryption and are much safer.\n- **Keep up to date on the latest security news.** The [Google Security Blog](https://security.googleblog.com/) provides useful information about online security and safety, as well as pointers to other resources. The government site [US-CERT](https://us-cert.cisa.gov/) (United States Computer Emergency Readiness Team) provides technical security alerts and tips.\n\n\nIf you're a Search Console user and are having trouble with persistent or unfixable security issues on your site, you can let us know.\n\n[Report a security issue](https://support.google.com/webmasters/contact/report_security_issues)"]]