OJS Security

  • OJS is an excellent e-publishing platform, but it has many security loopholes that hackers can exploit to get into your site to either cripple or destroy it. Open Journal Systems security should therefore be one of your primary concerns.
  • The end result of any OJS security breach is significant as publishing sites using OJS have databases containing detailed information about the researchers, which attackers can use for identity theft and fraud. Furthermore, attackers could access and steal unpublished manuscripts or even utilize the OJS to publish bogus research. This is on top of compromising the entire server security and causing a total site malfunction. Open Journal Systems security should therefore be one of your primary concerns.
  • Unfortunately you won’t know you’ve been hacked until it’s too late! Here are some tell-tale signs: you may notice that OJS landing page has been changed, or you may see links or funny characters in your content, blank pages, or PHP errors – chances are your site has been hacked.
  • The majority of all OJS hacking comes from Indonesia (See over 200 OJS Hacking Tutorials by Indonesian Cybercriminals on Google Search).
  • Yes; however, there are many steps to properly secure an OJS site, some of which are very technical. If you aren’t well-versed in the workings of OJS, PHP coding and databases, you’re better off leaving it to a professional. Almost all the hacked sites we’ve fixed had some type of do-it-yourself security.
  • Yes. We will perform a security audit of your site from many different angles and then, present our findings and recommendations to you in a document with a clear road map for taking the next steps.