 So, I want to bring down this in the most obvious language, in the most understandable language. We are not going to hear the code. So for the beginners, this one is special for you. So, in 20 years, it takes 20 years to build a reputation and a few minutes for a cyber incident to run it. We are going to take this to get this knowledge. We put it out there, but it just takes one parcel and about an hour, if not less, and it goes out. In 2015, the President of the United States made a summit on cyber security. The cyber threat is one of the most serious economic and national security challenges with the Southern nation. The United States is a first world country. This is where almost all these things begin from. And security. But if they find this threat, then we also need to take it seriously. These are the statistics. Oh, specifically in this case, data breaches and exposed records of the United States from 2005 up to 2017. But you see the trend is going high. So which means this summit of black city or summit of unseria, the bad guys are really up in the game. 30% more than 30%. Actually, 32% to be more specific of the websites. But it has the highest. I think this is my source. Anyone can look for it. The Sukuri Act report 2017 in terms of being infected. This is worrying. This is not good. And each of us here should be taking price on how much our security is at threat. David Kennedy says, by such estimates, cyber crime is expected to globally cost up to about 6 trillion. Put the incentives for the innovation and investment at risk and will be more profitable than the global trade of all major drugs combined. So if you hear people trading cocaine, you hear they have a kilogram of cocaine and you fly to the U.S. Next time you're coming here, color law will be yours all. But these guys in cyber crime have the ability to make 6 trillion chili in a yard. Which means we really need to wake up. We really need to take things seriously. So what I think, users to create with password. Just because you have some ex of yours by the time you are joining Facebook, you love this girl so much. Actually this one, this was around 2009. So my password was Patricia 2009. Can you imagine? No, no, no, she left in 2012. I tried. So giving administrative access to users who don't require UI in an IT firm or you build a project. You quite bring many developers on it. These developers have different rules. Some of them don't need to sum up the content. But in this case everyone has equal access everywhere. If you hear people, my father always tells me a secret is supposed to be to you and maybe some other person. If it goes as to the third day, it ceases to become a secret. It's actually a public secret. Public secret is everyone knows about it, but they cannot talk about it. So anyone has potential to do anything, but they won't tell the other. Which is risky. Not enabling HTTPS on your site and allowing users. There's a gentleman who was talking about security. Allowing file uploads from unauthenticated users over no time checking. This one is the one chart approving what content goes into our database. It will help. If all of us can upload to the database, then there's a problem. I will upload something I have no idea about if it is creating harm to our project. I think we are together, right? So how we stay safe is summarized right there. Means the same thing. It is update, update and update. What are we doing? Update in one place. Version defined somewhere is running a big boot that is still using a very obsolete version. Means there is something that added. There is something, there is some content that is helpful. It's quite many things but it's very paramount. Same applies to the plugins, same applies to the theme. This is self-explanation. What would you use a plugin that was developed 2 years ago and yet there is one that was developed last month? So it would actually mean you do note the subsequent important when we do, if we hacked grand size. This is where we need. You can no longer some other person out there has it. If you have ownership over something, yet some other person out there who you actually don't know has the same rights like you have. So in tech language we call it nuke. Nuke is, it's used in the military. Fighting nuclear open. And you know how dangerous they act. So try to nuclear open to this site that has been hacked. Okay, what we do? Actually before you need to sell, I don't know if you will investigate this too. I didn't want to involve any sort of this but I will. Yeah, this is where we sell all, I have to use the most of the language. Where we sell our login details. Yeah, the database credentials, the passwords. Okay, those that allow access to the site, you get, is where we save the context, the actual context, the pictures, the text, the data, everything. So these two, where you knew your site, you sell it somewhere because they told that. The whole site, these two are the foundation of the entire project. So you reinstall after you knew to the site, so we're going to start afresh. You reinstall that of the backups. These are the backups we've been doing. You see, I ask you, you have the backups, right? Because you need to have the backups all the time. Like I have explained, what we backup. These, you can generate a consistent, now these are, I call them the help parameter, but these are now the daily reports. Like I told you, don't use your Xs. Name them, that's what like me. But tango doesn't act. Two-factor authentication. Are we all, do we all have an idea about what two-factor authentication means? We've all logged in to our email gym. Anybody's feature on your site and actually not limited to one place. The other transaction, all your accounts online you can enable is cert. If someone is attempting to get it there, you're notified. Maybe you chose this guy should call you or they should send you a text message, send you a call or send you an email. So you're fully aware when someone is, when someone wants to help business with your site. Use separate one place login day-to-day content and for site administration. This, like I, this goes back to when multiple, multiple access to this account. You need to restrict them by, maybe you, you can upload. We will take your presence later. Limit who can login to your site and what permission they have. This is also, we've talked about it. Use secure protocols back to this gentleman's presentation. I'm sorry I have to rush because I'm told I don't have that. We are only you. I want to give you a very quick example. I don't know. Those of you with your laptops or phones or anything with a lobby to access this. But if you've not given attention to this anyone out there, they'll give him the login page. So now, that is where you hear about the boot force attack. Someone is going to think about your password. Like I told you, someone knows your ex might be chasing your password. They wouldn't try to hit it in them and maybe love gets them. They're in their actual app too. So I have to rush. That same goes for any other than this. Previous speakers have talked about free things, free things, free things. I really want to disagree. And this disagreement is not in the opinion that your content has value. You love what you're doing. This is literally your life. To some developers, they have dedicated all their time, all their life to doing what they do. It's equivalent to the actual value of what you have. This is the problem because you keep subscribing to these free securities, SSF, all your things. And you keep using these trial versions. Like, you see, if this happens to the big companies, Yaw was hacked, and it just got to know recently, Facebook, Cambridge Analytica leaked its data. So now you're relying on the obvious situation. It is risky. So it might be feasible for the startups, for someone ancient into this business, but the more your content grows, the more strong it becomes, the more security. Security is part of the cost of doing business like insurance. So we need to give it the attention it needs. And the final one is, if you really don't know how to deal with security, better get an expert. We will help. Get senior developers, get people who have a great idea. We will stay here. I think I will back to NDA. I think for the questions we will take after. Thank you very much.