Accessibility Tools

A hooded silhouette with cold blue mechanical glowing eyes in near-darkness, representing automated threats that have no human actor behind them.

Introduction: Your Firm’s Reputation Is One Breach Away from Disaster

Your website is not a brochure. For most independent financial services firms, it’s the first thing a prospective client sees, the place where trust either starts forming or doesn’t, and increasingly, a live channel connected to scheduling tools, document portals, contact forms, and email workflows. It is infrastructure. WordPress, the content management system powering more than 40% of the web, is where most of that infrastructure lives. And for the vast majority of firms running on it, that infrastructure is far less secure than they assume.

The threats online are not abstract, and they don’t work the way most firm owners picture them. Bots scanning for WordPress vulnerabilities run around the clock across the entire internet, not looking for anyone specific, just looking for anything exploitable. Cyber gangs and nation state actors have collectively flooded the environment with credential theft tools and exploit kits that criminal operations now license and deploy at scale. A four-person financial planning firm doesn’t need to be anyone’s target. It just needs to be findable.

🎧 Listen to “The 3-Minute Briefing”

Topic: Get the independent financial services firm perspective on WordPress security and compliance infrastructure in under 3 minutes.

Most firm owners aren’t worried about security because they assume it’s already handled. They trusted the developer or agency that built the site. They assumed the hosting provider they pay every month is running a secure environment. They assumed that WordPress, installed and configured by someone who presented themselves as a professional, arrived with meaningful protections in place. Some of those vendors actually know what they’re doing. Many do not, and the ones who don’t rarely advertise that fact. A site can be delivered, invoiced, and handed over looking completely professional while running on generic shared hosting, default configurations, and no meaningful hardening at all. The assumption of security is the exposure.

This is the security crisis most independent financial services firms are sitting inside right now. Not because they were careless, but because they trusted people and systems that weren’t built to protect them. And the firms most exposed are often the most confident that someone else already handled it.

Understanding “Hardened WordPress”: More Than Just a Strong Password

WordPress hardening refers to the systematic process of reducing a WordPress installation’s attack surface. It’s the difference between a site that was configured to work and a site that was configured to be secure. Those are not the same thing, and what separates them can determine whether a firm survives a breach or doesn’t.

A default WordPress installation is built for ease of setup, not for defense. It ships with predictable file structures, a well-known admin URL, default database prefixes, and broad file permissions. None of that is a flaw exactly; it’s a design choice that prioritizes accessibility. But for a financial services firm handling client data, those defaults become liabilities the moment the site goes live.

Hardening addresses this through layered changes across every level of the installation: authentication, file permissions, database configuration, server settings, plugin and theme management, monitoring, and backup architecture. No single change makes a site secure. That’s the point of the layered approach. Each layer compensates for the possibility that another layer fails.

The other thing hardening is not: a one-time event. An installation that was locked down eighteen months ago and left alone since isn’t hardened anymore. Plugins have aged, new vulnerabilities have been published, the threat surface has shifted. Keeping the WordPress version current, maintaining WordPress core files in their expected state, and ensuring clear internal ownership and governance over who can make changes are the disciplines that keep a hardened site hardened. Skip any of them long enough and the work done at the start stops mattering.

Why Independent Financial Services Firms Are Prime Targets: Not “Too Small to Hack”

The “too small to be targeted” assumption is the most expensive mistake independent financial services firms make about cybersecurity. It gets the mechanics of attacks exactly backward.

Targeted attacks exist, but they’re not what most small firms face. What most firms face is automation. Bots crawl the web around the clock probing for known vulnerabilities: unpatched plugins, exposed admin URLs, weak credentials, outdated PHP versions. When a scan finds a match, the exploit runs. SQL injection patterns and XSS attempts fire without a human being involved. The bot has no idea whether the site belongs to a regional insurance agency or a multinational bank. The vulnerability is there, so it gets used. This is also one of the most persistent WordPress security myths: that being small provides some kind of protection. It doesn’t. It often makes things easier for attackers, because smaller firms have fewer resources watching.

What makes financial services firms particularly valuable once compromised is the data they hold. A CPA firm’s website that also functions as a client portal may sit adjacent to years of financial records, tax documents, and personal identification data. A customer data breach at that scale isn’t a generic incident. It’s a high-value one with regulatory consequences attached. And because smaller firms typically have fewer security resources than enterprises, they’re also easier to exploit. Cybercriminals understand this math.

WordPress running on roughly 40% of the web makes it the dominant target for automated scanning; that concentration is part of what makes the platform so attractive to attackers. A single widely-used plugin with an unpatched flaw can expose hundreds of thousands of sites in one sweep. An accounting firm running a vulnerable version of a common contact form plugin isn’t a victim of a deliberate attack. It’s collateral in a mass scan it never saw coming.

The Hidden Dangers of “Vanilla” WordPress Installs and One-Click Hosting Setups

Most hosting providers make WordPress installation simple. A few clicks, a few minutes, and the site is live. That simplicity is real and useful. What it doesn’t include is any meaningful security configuration.

A one-click WordPress install gives you a working site. The admin login lives at the default URL. The database uses the default prefix. File permissions are set broadly. The admin username is often “admin.” The wp-config.php file sits in the default location. These are all well-documented conditions that attack tools are explicitly built to test for.

Bookkeeping practices running on shared hosting face an additional risk that doesn’t get discussed enough. Shared hosting puts your site on a server alongside dozens or hundreds of other websites. If one of those neighbors gets compromised, the infected environment can reach your installation regardless of what you’ve done on your own site. Your security posture is partially determined by strangers. Cross-site contamination on shared servers isn’t theoretical. It’s a documented, recurring problem that managed hosting environments are specifically built to prevent.

Complacency is the other failure mode. A plugin that was clean when you installed it may have a critical vulnerability published six months later. Without an update protocol, that vulnerability just sits there. Research from security firms consistently shows that outdated WordPress plugins and WordPress themes are among the leading causes of successful compromises. Not sophisticated attacks. Just unpatched software meeting an automated scanner. The door was locked once. Nobody checked it again. And when it does get exploited, the range of outcomes goes from injected malware running undetected in the background all the way to complete site collapse: WordPress files deleted or corrupted, the site offline, no clean restore point available.

Core Pillars of a Hardened WordPress Foundation

Security architecture for WordPress isn’t a checklist to run through once. It’s a set of intersecting disciplines that each address a different layer of the attack surface.

The six disciplines below form the architecture of a hardened WordPress environment. Each addresses a distinct layer of the attack surface; none substitutes for the others.

Core Security Pillars: What Each Addresses and Default Install State
Security Pillar What It Addresses Default State on Most Installs
Secure Hosting Environment Server-level isolation, malware scanning, infrastructure-level intrusion detection, and automated server patching Generic shared hosting; your site shares a server with dozens of other sites, none of which you control
HTTPS / SSL–TLS Encrypts data in transit between site and visitor; required for contact forms, login portals, and document handling Often unconfigured or misconfigured; HTTP-only sites still exist across the installed base
Security Headers Browser-level protection against cross-site scripting, clickjacking, and content injection attacks Not configured; WordPress does not ship with HTTP security headers enabled by default
Least-Privilege Access Role-based access controls that limit each account to exactly the permissions its work requires Multiple administrator accounts; stale credentials from former staff or contractors still active
Web Application Firewall (WAF) Filters incoming traffic; blocks SQL injection, XSS payloads, and brute force attempts before they reach WordPress Not present; traffic reaches WordPress unfiltered unless a WAF is explicitly configured
Brute Force Protection Rate-limits and monitors login attempts; blocks IPs exceeding failed-attempt thresholds Admin URL at default location; no rate limiting; username often left as “admin”

Each pillar compensates for the possibility that another layer fails. The weakest point in this architecture is typically the hosting environment, because it sits below every other layer and cannot be hardened from inside WordPress.

Secure hosting environment. The foundation. Managed WordPress hosting from a provider with server-level security controls, isolated environments, and active malware scanning is a different product from generic shared hosting. The web server your site runs on determines what protections are available to you before a single plugin is installed.

HTTPS and SSL/TLS. SSL/TLS certificates encrypt data moving between your site and your visitors. For a firm with contact forms, client login portals, or document handling, running without one has visible consequences: browsers flag unencrypted sites, and clients who see that warning before entering their information will reach their own conclusions about the firm’s standards. SSL/TLS has been a baseline expectation for financial services websites for years. There is no defensible argument for leaving it unconfigured.

Security headers. HTTP security headers (Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, and others) are a layer of browser-level protection that most WordPress sites don’t configure. They restrict how the browser can interact with your site’s content and significantly reduce exposure to cross-site scripting and clickjacking attacks. Most WordPress installations ship without them, and most WordPress owners never know.

Least-privilege access. In most small firms, the reason multiple people have administrator access is that it was easier to set up that way. An editor with admin rights, a part-time contractor who can install plugins, a former employee whose account was never removed. Each one is an attack surface that doesn’t need to exist. Role-based access control means each account has exactly the permissions the work requires, with no extras that widen the surface unnecessarily.

Web Application Firewall (WAF) and firewalls. A WAF sits in front of your site and filters incoming traffic, blocking known attack patterns before they reach WordPress (think of it as a digital bouncer who recognizes the language of troublemakers and turns them away at the door). SQL injection attempts, XSS payloads, brute force login attempts: a properly configured WAF intercepts these at the perimeter. Tools like the ModSecurity WAF with the OWASP Core Rule Set (OWASP CRS) are standard components of a hardened environment. DDoS protection at the network level is a separate layer; some managed hosting providers include it, and CDN services like Cloudflare add it as a front-end defense.

Brute force protection. Login attempts should be rate-limited and monitored. Fail2ban and similar tools can automatically block IP addresses that exceed a threshold of failed attempts. Combined with a non-default login URL, this removes one of the most common attack vectors entirely.

These aren’t advanced security concepts. They’re baseline expectations for any financial services firm whose website touches client data.

Locking Down Access: Users, Passwords, and Authentication That Actually Protects You

Credential-based attacks account for a substantial share of WordPress compromises, and the technical bar for exploiting weak authentication is low enough that it barely qualifies as hacking.

Two-factor authentication (2FA), or multifactor authentication more broadly, is the single change that moves the needle most for WordPress login security. After a password, a second step is required, usually a time-sensitive code from an authenticator app. Stolen passwords become significantly less useful. The friction added for legitimate users amounts to a few seconds. That trade is obviously worth making, and yet most small firm WordPress installs don’t have it configured.

Worth knowing: the financial services sector is seeing a rise in AI-powered phishing kits that conduct “Man-in-the-Middle” attacks, intercepting a 2FA code in real time by tricking the user into entering it on a convincing fake site. The emerging answer to this is Passkeys (built on the WebAuthn standard), which are cryptographically bound to the actual domain and therefore immune to phishing entirely. Major WordPress security plugins are beginning to support them. For firms handling sensitive client data, this is the direction authentication is heading, and worth asking about when evaluating security tools.

Social engineering remains one of the most underestimated risks for financial services firms specifically. A bookkeeper who receives a convincing email appearing to be from WordPress support and clicks a credential-harvesting link has bypassed every technical control on the site. Brief staff awareness on how phishing targeting WordPress administrators works (what legitimate communications from hosting providers and WordPress look like, and what they don’t) is worth building into any firm’s security baseline.

Credential reuse is a bigger problem than most people acknowledge. Someone sets their WordPress admin password to the same string they used for a shopping site that was breached in 2022. That combination exists in databases that criminals run automated attacks against every day. A password manager eliminates reuse and generates credentials that aren’t guessable. For teams, shared password management with individual access logs is worth the minor overhead.

The admin username is worth addressing directly. “Admin” is so predictable as a default that brute force tools try it first, every time. Changing it costs nothing. Leaving it in place is an unnecessary gift to anyone scanning your login page.

Role-based access control requires an honest audit of who has what permissions. In small firms, it’s common to find multiple users with administrator access because it was easier to set up that way. Each unnecessary administrator account is an additional attack surface.

Fortifying Plugins, Themes, and the WordPress Core

Plugins are the most common entry point for WordPress compromises. The plugin library is vast, the quality is uneven, and the update discipline in most small firm installations is inconsistent at best.

The minimal plugin philosophy starts from a simple premise: every plugin installed is a potential vulnerability. Plugins you’re not actively using should be deleted. Deactivating them is not enough; they still exist in the file system and can still be exploited. The question to ask about every plugin in a WordPress installation is whether it’s doing something that justifies the security surface it adds.

For plugins you do run, the source matters. Plugins from the official WordPress repository go through an initial review before listing and benefit from community-reported vulnerability tracking. Ongoing security scrutiny is largely the responsibility of individual developers, not a guarantee from the repository itself. Nulled plugins, meaning premium plugins distributed for free outside official channels, are a well-documented malware delivery mechanism. The money saved on a nulled plugin is a poor trade against the risk it carries.

Supply chain attacks are a more recent threat vector worth understanding specifically: in 2024 and into 2026, attackers increasingly targeted plugins themselves by purchasing abandoned plugins from original developers, or compromising developer accounts, then pushing malicious updates to thousands of sites that trusted the source. The minimal plugin philosophy protects against this, but so does vetting the developer’s history. Is the plugin actively maintained? Does the developer have a track record? Has it changed ownership recently? These are questions worth asking before any plugin goes live on a firm’s site.

Core WordPress updates and plugin security updates are not optional maintenance. They’re active security patches. A known vulnerability in an unpatched plugin is a published roadmap for anyone looking to exploit it. Update protocols should be defined, assigned to a specific person or service, and actually followed. Dependency reviews (periodically auditing plugin dependencies to confirm they’re still actively maintained and haven’t been abandoned by their developers) belong in any serious update protocol. Plugin dependencies on unmaintained libraries are an underestimated vulnerability source.

One 2026-era development that has shifted the calculus on update timing: AI-driven scanning tools can now weaponize a newly disclosed plugin vulnerability in a median window of five to fourteen hours after public disclosure. A weekly maintenance schedule, once considered diligent, is now too slow for high-severity vulnerabilities. This is one of the strongest arguments for Virtual Patching: a capability built into quality WAF configurations that blocks known exploits at the firewall level before the official plugin update is even released. It’s not a substitute for patching, but it covers the exposure window during the hours before an official update is available.

WordPress themes follow the same logic. Premium themes from reputable developers with active maintenance are a different risk profile than free themes downloaded from unknown sources. A theme that hasn’t been updated in three years and is no longer supported is carrying vulnerabilities that will never be patched.

Server-Level and Hosting Hardening: The Security Layer Most Firms Overlook

Most firm owners make WordPress security decisions at the plugin and password level because that’s where the controls are visible. The server layer is less visible, which is part of why it gets overlooked. It’s also where some of the most impactful hardening happens.

Managed WordPress hosting from a security-focused provider includes capabilities that shared hosting simply doesn’t: isolated hosting environments (CageFS is one approach used by quality providers to contain each site in its own file system), server-level malware scanning, automated patching of server software, and intrusion detection at the infrastructure level. These aren’t features you configure. They’re the environment your site runs inside.

PHP security configuration matters more than most WordPress tutorials address. Running a current, supported PHP version closes vulnerabilities in the language itself. PHP-FPM (FastCGI Process Manager) provides process isolation; think of it as firewalls between units in an apartment building, so a problem in one unit can’t spread to the others. PHP security limits that restrict dangerous functions reduce the damage a successful exploit can do. These aren’t settings a firm owner configures directly; they’re capabilities to confirm with your hosting provider or managed service before signing on.

Database hardening operates below the WordPress layer. Changing the default database table prefix from “wp_” is a minor deterrent, not a structural defense against SQL injection. A determined attacker can discover the new prefix easily, but the change is still worth making as one layer among many. More meaningful is restricting database user permissions so the WordPress database account can only perform the operations it actually needs (select, insert, update, delete). Limiting database queries from untrusted sources and ensuring the database is not externally accessible are additional controls worth confirming with your hosting provider.

Two WordPress features deserve explicit attention here. XML-RPC, a remote access protocol that ships enabled by default, is a frequent target for brute force and amplification attacks. Most firms have no need for it and should disable it. The REST API, which enables external applications to interact with WordPress data, should have its exposure reviewed and restricted where full public access isn’t required. Both are well-documented attack surfaces that remain wide open on most default installations.

File permission enforcement on WordPress files and directories is another layer most default setups get wrong. Overly permissive file permissions allow an attacker who gains partial access to escalate that access further. Correct permissions on wp-config.php, the uploads folder, and core directories should be verified during any hardening engagement.

User activity monitoring is an underused capability for multi-staff firms. Knowing who changed a page, who installed a plugin, or who logged in from an unfamiliar location is both a forensic resource after an incident and an administrative control before one. Most quality WordPress security plugins include activity logging. It should be turned on.

SFTP over FTP for file transfers is a small change with meaningful implications. FTP transmits credentials in plaintext. SFTP encrypts the entire session. Any firm still using FTP for site management is transmitting login credentials in a form that can be intercepted on the network. Automated backup systems that store encrypted copies offsite are non-negotiable. A copy on the same server as the site is not a backup; it goes down in the same event. A backup that lives on the same server as the compromised site is not a backup.

Compliance, Ethics, and Professional Duty: Security as Part of Your Fiduciary Responsibility

For independent financial services firms, cybersecurity isn’t only a technical question. It’s an ethical one, and in regulated financial services, it is increasingly a legal one with specific documentation requirements, defined notification windows, and named enforcement bodies.

The landscape has changed faster than most firms realize. The frameworks below aren’t aspirational standards or best-practice guides. They’re in-force regulatory obligations with enforcement mechanisms. The question for most independent financial services firms is not whether these frameworks apply to them but which ones apply, and whether their current infrastructure, including their website, can produce the evidence of compliance that regulators now require.

The Regulatory Framework: What Applies to Your Firm

The table below maps the primary federal and state-level cybersecurity compliance frameworks active for independent financial services firms. This is not a comprehensive legal review; it is a practical orientation to the regulatory environment your firm is operating inside.

Cybersecurity Compliance Frameworks Active for Independent Financial Services Firms
Framework Who It Applies To Core Requirements Incident Notification Window Enforcement
FTC Safeguards Rule (GLBA) Tax preparers, accountants, bookkeepers, non-SEC-registered investment advisors, credit counselors, mortgage brokers, and other non-bank financial institutions Written Information Security Plan (WISP); designated security lead; risk assessment; MFA; encryption; annual penetration testing (firms with 5,000+ consumer records); biannual vulnerability assessments; third-party service provider oversight Report to FTC within 30 days if 500+ consumers affected (effective May 13, 2024) FTC; civil penalties up to $46,517 per violation per day; PTIN consequences for tax preparers
IRS Publication 4557 / WISP Requirement All tax preparers (PTIN holders) Written Information Security Plan; PTIN renewal certification (Form W-12, Question 11) confirms WISP implementation; false certification constitutes perjury on a federal form IRS breach notification guidance applies; FTC Safeguards Rule breach timelines also apply IRS; revocation of PTIN credentials; potential criminal liability for false certification
SEC Regulation S-P (amended 2024) All SEC-registered investment advisers (RIAs), broker-dealers, investment companies Written Incident Response Program; safeguards for customer information; service provider oversight with contractual protections; annual records; policies for secure disposal of customer information Notify affected clients within 30 days of discovering breach of sensitive customer information SEC examination and enforcement; large RIAs (AUM $1.5B+): compliance required by Dec 3, 2025; smaller RIAs: June 3, 2026
SEC Cybersecurity Disclosure Rule (2023) Public companies and SEC-registered entities filing under the Securities Exchange Act Material incident disclosure on Form 8-K; annual disclosures describing cybersecurity risk management, strategy, and governance; board oversight descriptions 4 business days from materiality determination SEC; in effect December 18, 2023 for most filers; smaller reporting companies: June 15, 2024
NYDFS Part 500 (Second Amendment) All DFS-regulated entities operating in New York: banks, insurance companies, mortgage companies, licensed financial services firms Documented technical controls; annual risk assessments; audit logs; MFA for all users; complete asset inventory; independent cybersecurity audits (Class A companies); designated CISO; automated vulnerability scanning; incident response plan; annual board/CISO certification 72 hours to NYDFS Superintendent NYDFS; fines up to $30M documented in enforcement actions; personal liability for CEOs and CISOs; final requirements in effect November 1, 2025
NAIC Insurance Data Security Model Law (MDL-668) Insurance licensees (companies, agencies, agents, brokers) in 20+ states that have adopted the NAIC model law; applies to licensees with 10 or more employees Written information security program; annual risk assessment; incident response plan; oversight of third-party service providers; annual certification to state insurance commissioner 72 hours to state insurance commissioner (some states: 3 to 10 business days) State insurance regulators; potential loss of license; requirements actively in force across adopting states
AICPA SSTS Section 1.3 (effective January 1, 2024) CPAs who are AICPA members Reasonable efforts to safeguard taxpayer data; consideration of applicable laws, data storage methods, technology tools, and third-party providers; WISP aligned with firm size and scope Breach notification follows applicable federal and state law timelines AICPA conduct enforcement; state licensing boards; this is a professional standard, not a regulatory mandate
GDPR Any firm actively marketing to or handling personal data of EU residents, regardless of where the firm is located Data protection by design and default; lawful basis for data processing; consent mechanisms; privacy notices; right to erasure; data processing records; Data Protection Officer (DPO) in some cases 72 hours to supervisory authority; without undue delay to affected individuals when high risk to their rights EU data protection authorities; fines up to 4% of global annual revenue or EUR 20 million, whichever is higher
HIPAA Covered entities and business associates handling protected health information (PHI): includes financial planners advising on long-term care, HSA/FSA administrators, and benefits advisors with access to PHI Administrative, physical, and technical safeguards; annual security risk analysis; access controls; encryption in transit and at rest; audit controls; workforce security training; Business Associate Agreements with vendors handling PHI 60 days from discovery to HHS and affected individuals; annual reporting to HHS for breaches affecting fewer than 500 individuals HHS Office for Civil Rights; fines $100 to $50,000 per violation, up to $1.9M per year per violation category

State-level data breach notification laws and state-specific licensing requirements layer on top of the frameworks above. Most states now have active breach notification statutes with their own timelines and covered-data definitions that apply regardless of industry-specific frameworks.

What the Table Doesn’t Say

Several things are worth stating plainly after reviewing those frameworks.

First, the website is not separate from the regulated environment. It is part of it. A financial services firm website that collects client information through a contact form, hosts a client document portal, or routes visitors into scheduling workflows is a data-handling system that regulators and auditors can reach. A breach originating through that website is a breach of the regulated infrastructure, not a separate incident category. The FTC Safeguards Rule doesn’t distinguish between data exposed through your filing system and data captured through your contact form. Neither do the NAIC state laws, NYDFS Part 500, or Regulation S-P. The website is in scope.

Second, “reasonable security practices” appears in nearly every framework listed above. This phrase is doing significant legal work. It is the standard against which a regulatory inquiry or insurance claim will measure your firm. Vague intent is not reasonable security practices. Installing a plugin and forgetting about it is not reasonable security practices. What regulators and insurers consistently interpret as reasonable includes: documented risk assessments, maintained update protocols, access controls with audit trails, incident response plans with tested procedures, and a security infrastructure that can be described specifically. A well-maintained, hardened WordPress environment can satisfy many of these documentation requirements. A default install on shared hosting, regardless of what plugins are running, cannot.

Third, the notification windows are shorter than most firms assume. Seventy-two hours to notify a state regulator (NYDFS Part 500, NAIC model law, GDPR) means that an incident response infrastructure needs to exist before the breach occurs. The four-business-day window for material SEC disclosures applies from the moment of materiality determination. The thirty-day client notification under Regulation S-P requires knowing what data was accessed and who was affected quickly enough to meet the deadline. None of these timelines are compatible with discovering a breach because a client mentioned something looked strange on your site.

Fourth, the overlap is real and it compounds. A New York-based RIA managing assets for individual clients handles data that falls under NYDFS Part 500, Regulation S-P, and potentially the FTC Safeguards Rule simultaneously. Each framework has its own documentation requirements, notification timelines, and enforcement mechanisms. Meeting one doesn’t satisfy the others. A compliance infrastructure that is auditable, documented, and built on a secure foundation reduces the surface where these overlapping obligations create exposure.

Professional ethics codes are moving the same direction as regulation, just through different channels. The AICPA’s updated Standards on Tax Services require CPAs to demonstrate reasonable data protection efforts using language deliberately broad enough to capture emerging technologies and third-party relationships. State licensing boards for CPAs, attorneys, and CFPs have been incorporating data security expectations into professional conduct standards with increasing specificity. Ignoring a foreseeable breach isn’t a defense before a licensing board. Having documentation of security practices is.

The firms most exposed in this environment are the ones that have handled security informally, assumed someone else handled it, or treated their website as outside the scope of their compliance obligations. In a regulatory environment that now asks specifically for audit logs, incident response plans, and evidence of technical controls, informal is the wrong answer.

The workstations and browsers used to access the WordPress admin are part of the security surface, and most security conversations about WordPress skip right past them. A compromised browser extension or an unpatched laptop used to log into the site can expose credentials and session tokens regardless of how well the server is hardened. Endpoint security (keeping staff devices updated and limiting browser extensions) is worth a brief policy conversation, even for small firms.

Real-World Consequences: What a Single WordPress Breach Can Cost Your Firm

The consequences of a WordPress compromise don’t stay on the server.

A financial planning practice that suffers a breach faces several simultaneous problems. The immediate technical damage (malware, defaced pages, injected redirect scripts sending visitors to phishing sites) is the visible part. The less visible part starts almost immediately: search engines detect the malicious content and flag the site, clients receive warnings when they try to visit, and the firm’s email domain gets flagged for spam if the attackers used it for phishing campaigns. Recovery from search engine penalties alone can take months.

Then there’s the client notification obligation. Depending on the state and the nature of the data exposed, the firm may be legally required to notify affected clients of a breach. That notification is not a private matter. It creates a documented record of the incident. For a firm whose value proposition is built on trust and discretion, that record is damaging in ways that are hard to quantify but easy to observe in client retention and referral patterns.

Regulatory fines are possible. Incident response costs are certain. A competent forensic investigation to determine what was accessed, for how long, and through what vector runs into thousands of dollars at minimum. Malware remediation (identifying and removing injected code, cleaning infected files, confirming the site is fully clear) is its own billable engagement after that. Emergency remediation (restoring from backup, hardening the site after the fact) adds to that. If the firm didn’t have clean, tested backups, or if rollback paths weren’t defined in advance, the costs increase significantly.

Security incidents also generate security incident logs that may be discoverable in regulatory proceedings or litigation. The documentation of a breach (what happened, when, what data was exposed, what the firm knew and when) becomes part of the record. Firms without adequate logging have a harder time demonstrating the scope of an incident or proving that certain data was not compromised.

Lost billable hours during the incident are real costs too. A breach doesn’t pause the rest of the practice. It lands on top of everything else, demanding time and attention from people whose time is how the firm generates revenue.

The reputation damage is harder to put a number on. Referrals that don’t come. Prospects who find the incident in a search and choose a different firm. Clients who leave without saying why. These costs don’t show up in an incident response invoice, but they’re often the most significant long-term consequence.

Making the Business Case: Why Hardened WordPress Delivers Massive ROI for Independent Firms

The financial argument for hardened WordPress is not complicated once you look at the actual numbers.

It helps to be clear about what “hardening” actually means in the market, because the term covers a wide range of services with very different outcomes. Basic hardening (a security plugin, managed backups, uptime monitoring, and a WAF) runs roughly $350 to $500 per month from a competent managed service. That’s a meaningful step up from an unmanaged default install, and it closes the most common attack vectors. What it doesn’t deliver is compliance-ready infrastructure. It doesn’t give you documented audit trails, immutable logs, isolated hosting environments, or the single point of accountability that regulators and insurers increasingly want to see. For a firm whose website sits adjacent to client financial data, that distinction matters.

A complete solution (secure and compliant hosting infrastructure, fully managed WordPress operations, ongoing compliance positioning, and full assisted support under one point of responsibility) is a different product category from basic hardening. Comply.Press, built specifically for regulated financial services firms, is one of the very few platforms that delivers all of that as an integrated system rather than a Frankenstack of separate vendors, plugins, and services that no single party is accountable for. The alternative to an integrated platform is assembling those capabilities yourself across multiple providers, which carries its own cost and coordination burden, and still typically leaves gaps that a unified, purpose-built platform closes by design.

Compare either option to the cost side of a breach.

The table below draws from published incident response cost data and regulatory penalty ranges for small financial services firms.

Breach Cost Estimates for a Small Financial Services Firm
Cost Category Typical Range for Small Financial Services Firm
Forensic investigation $3,000 – $15,000
Emergency remediation $2,000 – $10,000
Regulatory fines (state/federal) $1,000 – $100,000+
Client notification and credit monitoring $500 – $5,000 per affected client
Lost revenue during downtime $500 – $5,000+ per day
Reputational damage / lost referrals Difficult to quantify; often exceeds direct costs
Total exposure (moderate breach) $25,000 – $150,000+

Against a moderate breach exposure of $25,000 to $150,000 before accounting for reputational fallout, the ROI calculation isn’t close. A complete solution like Comply.Press carries a higher monthly investment, but it also delivers compliant infrastructure, documented audit trails, and a single point of accountability, capabilities that basic hardening doesn’t include and that regulators and insurers are increasingly treating as the baseline expectation.

There’s also the insurance dimension. Cyber liability coverage for financial services firms is increasingly available and, for firms handling sensitive client data, increasingly worth carrying. Insurers ask about security posture as part of underwriting. A demonstrably hardened WordPress installation with documented maintenance practices is a better risk profile than an unmanaged default install. That difference can affect both eligibility and premium. There’s also a claim denial risk that most firms don’t consider. Many cyber policies include conditions of coverage that require “reasonable security practices.” A firm that certifies reasonable security but hasn’t updated a plugin in eighteen months or is running on unmanaged shared hosting may find a claim denied on those grounds. The hardening investment reduces the probability of a claim. It also preserves coverage validity when you actually need to file one.

One specific exposure worth naming: contact forms. Most financial services firm websites include a contact form that collects names, email addresses, phone numbers, and sometimes more. Clients who aren’t warned otherwise sometimes include sensitive information (account numbers, SSNs, financial details) in a free-text inquiry. The data collected by those forms, and how it’s stored (or whether it’s stored at all), is part of the security surface. A hardened WordPress environment addresses this through form data policies: limiting what gets stored, encrypting what must be retained, and auto-deleting entries after a defined window. It’s a small configuration decision with meaningful compliance implications.

For investment advisors working under SEC cybersecurity guidance, the business case has a compliance component as well. Documented security practices aren’t just good risk management. They’re evidence of due diligence that matters if a regulator ever asks.

From Vulnerable to Vigilant: A Practical Hardening Roadmap for Independent Firms

The path from a default WordPress installation to a properly hardened one doesn’t require rebuilding everything at once. It requires working through the right sequence.

Start with an honest assessment. Before making changes, understand what you’re working with. A WordPress security audit reviews your current installation against a security baseline: plugin versions, theme status, user accounts and permissions, file permissions, PHP version, hosting environment, backup status, and existing security plugins. You can’t prioritize without knowing where the exposure is.

Address quick wins immediately. Change the admin username if it’s still “admin.” Enable 2FA on all admin accounts. Remove plugins and themes that aren’t in active use. Verify that SSL/TLS is correctly configured and that the site enforces HTTPS everywhere. These take hours, not days, and they close some of the most commonly exploited vulnerabilities.

Evaluate your hosting environment. If you’re on generic shared hosting, the security ceiling is low regardless of what you configure at the WordPress level. Migrating to managed WordPress hosting with server-level security controls is often the single highest-impact change a firm can make. It’s also one that affects every other layer of the security architecture.

Implement systematic update protocols. Assign responsibility for core updates, plugin security updates, and theme updates. Define how quickly critical patches get applied after release. Automate where appropriate, but verify that automated updates are actually running and haven’t silently failed. Vulnerability management (tracking disclosed vulnerabilities against the plugins and themes your site runs) is the ongoing discipline that connects new threat information to your specific installation. Given that AI-powered scanning tools can exploit newly disclosed vulnerabilities within hours of public disclosure, a quality managed environment should also include Virtual Patching at the WAF level: blocking known exploits before the official update is even available.

Build monitoring and backup systems. Uptime monitoring, file integrity monitoring, audit logs, and error log review are how you know something is wrong before a client tells you about it. In practice, this means a security dashboard that alerts you the moment a file changes without authorization, flags unusual login activity, and confirms your backups are actually running. Offsite, encrypted backups with tested restoration procedures are how you recover when something fails. Both should be running before you need them. Website maintenance that also includes periodic performance checks is worth building in. Security and performance are related; a site under attack often shows performance degradation first.

Define an incident response plan. A short, practical document that answers: who gets called, what gets isolated, how do you communicate with clients, where do the backups live, who handles the forensics. The time to write this is not during an active incident.

Choosing the Right Security Partners, Tools, and Services

The decision about which parts of WordPress security to handle internally versus delegate is mostly a time-and-expertise question.

The technical depth required for a proper WordPress security audit, a server migration to a managed hosting environment, or a WAF configuration using the ModSecurity WAF with the OWASP CRS is not trivial. For a firm owner whose core expertise is accounting, insurance, or financial planning, the learning curve for doing this correctly is steep and the opportunity cost of the time is high. Delegating it to someone who does it every day is usually the right economic decision.

What to look for in a WordPress security partner: demonstrated experience specifically with financial services firms, not only general web development. A security-focused approach to hosting and infrastructure, beyond plugin management alone. Clear documentation of what’s covered in a maintenance agreement and what isn’t. Responsive communication when something needs attention.

The more important distinction is between vendors who assemble a collection of tools and vendors who own the entire environment. Most so-called managed WordPress solutions are cobbled together from multiple providers (a hosting company, a security plugin, a backup service, a WAF) with no single party accountable for how those pieces interact. When something breaks or a regulator asks questions, the finger-pointing starts. Comply.Press was built specifically to solve this for regulated financial services firms: secure and compliant hosting infrastructure, fully managed WordPress operations, ongoing compliance positioning, and full assisted support under a single point of responsibility. It’s one of the very few platforms purpose-built for the security and compliance demands of this specific audience, not a generic managed hosting product with a compliance layer added on top.

Automated vulnerability scanning as part of a regular maintenance process is worth building into any managed service agreement. WordPress moves fast. A plugin that was clean last month may have a disclosed vulnerability this month. Scanning for known issues on a defined schedule, rather than only when something seems wrong, is how you find problems before they’re exploited.

The vetting question that matters most: does the partner treat your site’s security as an ongoing responsibility or as a one-time project? The answer to that question tells you a lot about whether the relationship will actually protect your firm.

Measuring and Communicating Security: Turning Protection into a Competitive Advantage

Most financial services firms keep their security practices entirely internal, which means they’re leaving a meaningful trust signal on the table.

Clients who are choosing between two otherwise comparable firms (two investment advisors, two bookkeeping services, two insurance agencies) will occasionally make that choice on factors that feel intangible: who seems more careful, more professional, more trustworthy. Security practices, when communicated clearly, contribute to that perception.

A security policy page on your website that explains, in plain language, how you protect client data communicates care and intentionality. It doesn’t need to be technical. It needs to be honest and specific: we run our site on managed WordPress hosting with server-level security controls, we encrypt all data in transit, we conduct regular security reviews, and if something ever goes wrong, here’s how we handle it. That page exists almost nowhere on small firm websites. The firms that have it stand out.

Security badges and certifications from reputable sources (SSL certificate indicators, security scanner clean-bill verifications, managed hosting security seals) are visible trust signals at the point of first contact. Visitors who are evaluating whether to submit a contact form or schedule a consultation are making a trust decision. Visible evidence of security investment influences that decision.

The deeper competitive argument is this: clients in accounting, insurance, financial planning, and investment management are entrusting you with financial data, personal information, and plans that affect their families for decades. They are, consciously or not, assessing whether you take that responsibility seriously. A firm that can demonstrate a hardened, maintained, monitored website is communicating something real about how it operates. That’s not a marketing claim. It’s evidence.

Conclusion: Harden Your WordPress Today, Because Your Clients’ Trust Is Non-Negotiable

The distance between a standard WordPress installation and a properly hardened one is something most firms won’t recognize until they’re on the wrong side of it. That’s the nature of security failures: they’re undetectable until they’re not.

What we’ve covered in this article is not theoretical. The vulnerabilities are real, the attack patterns are automated and relentless, and the consequences for financial services firms (financial, regulatory, and reputational) are serious enough to justify treating this as a priority rather than a someday task.

The good news is that the path forward is clear. A security audit to establish baseline. Quick wins to close the most obvious exposures. A move to a managed hosting environment with real server-level protections. Systematic update and maintenance protocols. Monitoring and backup systems that are actually running. A partner who treats your security as an ongoing responsibility.

Your website is the front door to your practice. The clients who trust you with their financial lives, their insurance coverage, their retirement plans, and their tax obligations are trusting, partly, that you’ve secured the infrastructure that touches their data. That trust is worth protecting.

We help independent financial services firms build and maintain hardened WordPress environments designed specifically for the security and compliance demands of financial services. If you’d like to talk through where your current site stands and what it would take to get it to a standard that protects both your clients and your practice, reach out. We’re glad to start with a conversation.

 

WordPress Security Questions We Hear Most from Independent Financial Services Firms

How would I even know if my WordPress site had been compromised?
Realistically, you’d have no way to know without monitoring tools in place. The malware that gets injected into WordPress installations typically isn’t designed to break anything visible. The whole point is to operate undetected. What it does instead: redirects certain visitors to phishing sites, skims form submissions, or piggybacks on your server’s resources to run spam campaigns elsewhere. Nothing on your end looks different. What eventually surfaces it tends to be external: a Google Search Console warning, a client flagging something odd they saw, an email blacklist notification. We also occasionally see unexplained server resource spikes as the first signal. File integrity monitoring catches it earlier because it alerts the moment a file changes outside of a known update, and most small firm WordPress installations don’t have that running.
What actually makes managed WordPress hosting different from regular shared hosting, from a security standpoint?
The security ceiling on shared hosting is lower than most people realize, and it’s not a problem you can fix from inside WordPress. Your site shares a server with dozens or hundreds of other websites, and if any of those neighbors gets compromised, the infection has pathways into your installation regardless of how well you’ve configured your own side. Cross-site contamination is a documented failure mode, not a theoretical one, and managed hosting is specifically built to prevent it. Managed environments isolate each site in its own contained file system, run server-level malware scanning, handle automated patching of the server software itself, and operate intrusion detection at the infrastructure level. None of those are settings you configure. They’re part of the environment your site runs inside, not features you add. Moving to managed hosting is often where we start with financial services firms because every other layer of hardening depends on that foundation being solid, and shared hosting has weaknesses at that level that no amount of WordPress-side configuration can close.
Can’t I just install a security plugin and call it done?
Security plugins like Wordfence or Solid Security are worth running. Login protection, file integrity monitoring, malware scanning, audit logs: those are real capabilities and they add real value. What they operate on is the WordPress application layer. The server underneath, the PHP configuration, the file permissions, the hosting environment itself: those are outside what any plugin touches. A well-configured security plugin on top of a default shared hosting setup with outdated PHP and permissive file permissions still has most of the actual attack surface wide open. We’ve seen sites with active security plugins get compromised through the hosting layer, and the plugin had no way to prevent it because the problem was below where it operates.
Plugins seem like the main vulnerability everyone talks about. How bad is the actual exposure?
It’s the most consistent entry point in breach data year over year, and by a meaningful margin. Patchstack’s research found that the significant majority of new WordPress vulnerabilities originate in plugins rather than WordPress core. Part of what makes it worse for small firms specifically is that update discipline tends to be informal: no assigned owner, no defined schedule, no one verifying that automated updates are actually running rather than silently failing. A plugin that was clean when you installed it two years ago may have had a critical vulnerability disclosed eight months ago. If nobody’s been watching, that vulnerability has been sitting there the whole time. The other thing worth knowing: AI-driven scanning tools can now move from a newly disclosed vulnerability to active exploitation in under fifteen hours in some cases, which makes “we update weekly” a slower response than the threat requires.
We already have strong passwords. Is two-factor authentication really worth the friction?
The problem with strong passwords is that they don’t stay exclusively yours. Credential databases compiled from past breaches get used in automated attacks constantly. If a password you’re using appeared in any breach anywhere, it’s being tested against login pages at scale right now. A strong password that’s been exposed is no longer strong. Two-factor authentication breaks that entire attack class because the second factor isn’t something that travels in a credential database. Worth knowing though: the more targeted threat we’re seeing for financial services firms is AI-powered phishing that intercepts a 2FA code in real time by routing the login through a convincing fake site. Passkeys address that specifically. They’re cryptographically tied to the actual domain, so a fake site can’t capture them. Major WordPress security plugins have started supporting them, and for firms handling sensitive client data it’s the direction worth moving toward.
What should I actually be asking when I’m evaluating someone to handle our WordPress security?
Start by asking whether they’ve worked specifically with financial services firms, not just general web clients. The compliance context is different, and a developer who’s primarily built marketing sites for e-commerce companies is going to have different instincts about what matters. Hosting is a good early tell: a security-focused answer involves managed hosting with isolated environments, and “whatever you’re already on is fine” is not that answer. How they handle the window between a vulnerability disclosure and an available patch matters too, because that exposure window is where a lot of compromises happen. Virtual Patching at the WAF level is the real answer to it, and whether they can speak to that tells you something. Then look at what documentation they produce at the end of an engagement: what was changed, what the current state is, what the ongoing maintenance covers. If they can’t describe that documentation, the work probably stopped at installing a plugin.
My firm is small. Aren’t we too small to be worth targeting?
Framing it as targeting is where the model breaks down. Most of what hits small WordPress installations isn’t a person deciding to go after your firm. It’s automated scanning running continuously across the entire internet, testing for known vulnerabilities in plugins, probing default admin URLs, trying credential combinations from breach databases. The bot that found your site has no idea whether you have four employees or four hundred. The vulnerability was there, so the exploit ran. Small financial services firms are actually easier targets in some ways because they typically have fewer resources watching and less formal update discipline. And the data that financial services firms hold (financial records, tax documents, insurance claims, investment accounts) is high-value data. The relevant question is whether you have a known vulnerability that’s currently being scanned for, not whether anyone chose you specifically.
What is Virtual Patching and do we actually need it?
Virtual Patching is a WAF-level capability that blocks known exploit patterns before an official plugin patch is released. There’s always an exposure window between when a vulnerability gets disclosed publicly and when your site has the patched version installed. Research tracking AI-assisted scanning tools puts that window at hours for high-severity vulnerabilities now, not days. Virtual Patching intercepts the attack patterns at the firewall during that period. It doesn’t fix the underlying flaw, but it covers the exposure until the patch is available. Firms on managed hosting with a properly configured WAF typically have this. On shared hosting with a security plugin, it usually isn’t part of the picture.
How does a breach actually affect our professional standing or regulatory compliance?
The exposure runs deeper than most firms expect. On the regulatory side, the specifics depend on your practice type, but the direction is consistent across all of them: cybersecurity is being treated as a professional obligation, not an IT question. Financial planners under SEC registration are operating under guidance that treats digital infrastructure as part of fiduciary due diligence. The NYDFS Part 500 regulation requires documented technical controls and audit logs from financial services firms in New York. State ethics boards for CPAs and attorneys are moving the same direction, just through different channels. Then there’s the breach notification obligation, which is separate from regulation entirely: depending on state law and what data was exposed, you may be legally required to notify affected clients, and that notification creates a documented record. And there’s the discovery angle: security incident logs can be subpoenaed in regulatory proceedings or litigation. A firm without audit logs, without documentation of what data was accessed, and without evidence of reasonable security practices has very little standing if that process ever starts.

 

 

“The 3-Minute Briefing” Text

This is your 3-minute briefing.

 

Today we’re talking about why most independent financial services firms are operating on WordPress infrastructure that was never actually built to protect them, and what real security looks like for a regulated firm.

 

Most independent financial services firms aren’t worried about their website security because they assume it’s already handled. They trusted the developer who built the site. They trusted the hosting provider they pay every month. They assumed that whoever configured WordPress knew what compliance requirements looked like for a financial services firm. Some of those vendors do know. Many don’t, and the firms that paid them are now running on generic shared hosting, default configurations, and no meaningful hardening, without knowing it. The assumption of security is itself the exposure.

 

The reason that assumption holds is that the distance between a site that looks secure and one that actually is secure is undetectable from the outside. WordPress installs with defaults designed for ease rather than defense: predictable file paths, well-known admin URLs, broad permissions. Hosting providers make setup simple without making setup secure. The result is that a site can look healthy and be actively compromised at the same time, with nothing surfacing until someone external notices.

 

There’s also a timeline problem that’s gotten worse recently. When a vulnerability is disclosed in a widely used plugin, AI-assisted scanning tools are now moving from disclosure to active exploitation in hours, sometimes under fifteen. A firm that patches weekly is working on a schedule that was considered responsible a few years ago but is now slower than the threat it’s responding to. This is why hardening isn’t really a set of things you do once. It’s a maintained posture. The installation that was properly locked down eighteen months ago has been drifting since then, whether anyone noticed or not.

 

For financial services firms, there’s a dimension to this that goes beyond the technical. Financial planners, CPAs, and insurance agencies hold sensitive client data and operate under professional standards that treat data protection as an obligation, not a preference. Regulators are no longer satisfied with intent. They want documentation: audit logs, records of when patches were applied, evidence that reasonable practices were in place. A breach at a firm without that paper trail doesn’t just create a technical problem. It creates a compliance problem and a liability exposure at the same time.

 

The path forward requires being honest about what category of solution the problem actually demands. Basic hardening closes some common attack vectors. It doesn’t deliver compliant infrastructure, documented audit trails, or a single point of accountability. A complete solution (secure hosting, fully managed WordPress operations, ongoing compliance positioning, and full assisted support) is a different thing entirely. That’s what Comply.Press was built to provide, specifically for regulated financial services firms.

 

If you want to understand where your current site sits against a real security baseline, not a plugin scorecard but an actual assessment, we’re glad to start there.

 

This concludes your 3-minute briefing. Thanks for listening.

 

Citations & Supporting Resources

The claims in this article are grounded in published research, regulatory documentation, and industry data. The sources below support the article’s core factual assertions and are provided for readers who want to verify the data or explore the underlying regulatory frameworks in greater depth.

  • WordPress Market Share Statistics (wordpress.com)
    The official WordPress.com blog confirms that WordPress powers approximately 43% of all websites on the internet, based on W3Techs tracking data, supporting the article’s characterization of WordPress as the dominant platform for financial services firm websites and the reason it represents such a concentrated attack surface.
    https://wordpress.com/blog/2025/04/17/wordpress-market-share/
  • State of WordPress Security in 2025 (Patchstack)
    Patchstack’s annual WordPress security research report documents that 96% of all new WordPress vulnerabilities originate in plugins rather than WordPress core, directly supporting the article’s emphasis on plugin management as the most critical ongoing security discipline. The same report notes that over half of plugin developers did not patch reported vulnerabilities before public disclosure.
    https://patchstack.com/whitepaper/state-of-wordpress-security-in-2025/
  • NYDFS Cybersecurity Regulation Resource Center (New York Department of Financial Services)
    The official NYDFS cybersecurity resource center documents the Second Amendment to 23 NYCRR Part 500, with final enhanced requirements taking full effect in phases through November 2025. This is the primary regulatory source for the article’s discussion of documented technical controls, audit logs, and annual risk assessments as compliance obligations for financial services firms in New York.
    https://www.dfs.ny.gov/industry_guidance/cybersecurity
  • SEC Cybersecurity Disclosure Rules (SEC.gov)
    The SEC’s official press release on its July 2023 cybersecurity disclosure rules confirms the requirement for public companies and registered investment advisers to disclose material cybersecurity incidents within four business days of determining materiality. This supports the article’s characterization of SEC disclosure obligations as part of the compliance landscape for investment advisors.
    https://www.sec.gov/newsroom/press-releases/2023-139

We’ve built this article to be accurate and current because the firms we work with operate in environments where the details matter. If something here raises a question specific to your firm’s situation, we’re glad to talk through it directly.

John Larsen

CEO and Chief Marketing Officer, liftDEMAND

John A. Larsen brings a rare perspective to financial services marketing, built through a 30-year career that spans from the operational front lines to the boardroom. He began as a bank teller, moved through accounting, and went on to manage the bank’s overnight investments with the Federal Reserve. That experience gives him a practical understanding of how financial institutions manage risk, capital, accountability, and growth. That foundation, supported by his former Series 7, 63, Real Estate, and Insurance licenses, shaped his early work helping firms design growth strategies that work inside real regulatory and operational constraints. During this time, he helped Union Bank of San Diego launch the nation’s first self-directed 401(k), worked with MFS Financial to bring mutual funds to market, and helped The Geneva Companies (then the leading mid-market mergers and acquisitions firm) attract high-value business owners. He also built a proprietary natural-language query marketing database that a major regional Northern California bank relied on for nearly a decade.

In 2001, John turned to the digital frontier, later founding liftDEMAND to bring institutional-grade strategy to local independent financial firms. Today, he delivers that experience through a suite of proprietary solutions, including comply.press, AuthorityOxygen, and his Perfect-10 multi-year framework. Since 2001, he has helped clients generate more than $550 million in new revenue opportunities. Now serving as a Fractional CMO, John combines deep marketing expertise, advanced data systems, and applied AI research to help financial services owners grow safely, stay compliant, and compete effectively against much larger organizations with disciplined, precision-engineered growth systems.