Cyber Smart Defence
Cyber Smart Defence
Description
Cyber Smart Defence is a lightweight WordPress security plugin designed to protect your website against unauthorized access, brute-force login attempts, and suspicious request patterns.
The plugin runs quietly in the background and integrates directly with WordPress. It monitors login activity, blocks abusive behavior, and records security-related events for administrative review.
No complex configuration is required. Once activated, protection is enabled automatically.
Features
- Login attempt monitoring
- Automatic temporary lockout after multiple failed login attempts
- IP-based threat detection
- Firewall protection against common malicious request patterns
- Secure threat logging for administrators
- Lightweight and performance-friendly
External Services
This plugin connects to an external service provided by Cyber Smart Empire to check IP reputation.
What data is sent
* IP address of the visitor being checked
When data is sent
* Only when an IP reputation check is performed
Service provider
* Cyber Smart Empire
Service URL
* https://cybersmartempire.com
Privacy Policy
* https://cybersmartempire.com/privacy
Terms of Service
* https://cybersmartempire.com/terms/
Installation
- Upload or activate the Cyber Smart Defence plugin.
- Open Cyber Defence from the WordPress admin menu.
- Protection is enabled automatically upon activation.
No manual configuration is required.
Faq
No. Cyber Smart Defence does not modify WordPress core, themes, or other plugins.
The plugin monitors failed login attempts and temporarily locks access after repeated failures from the same IP address.
Access is temporarily restricted and a security message is displayed.
Yes. The plugin works automatically without requiring advanced configuration.
No. The plugin is optimized for performance and only runs checks when necessary.
Reviews
Changelog
3.1.2
- Security hardening and compatibility improvements
- Code quality and standards compliance fixes
2.3
- Added login lockout system
- Added IP-based threat logging
- Improved security response handling
2.2
- Improved admin interface
- Compatibility updates
- Stability improvements