We know that many WordPress sites have security plug-ins. We will consider how much the possibility of your site being hacked is reduced by installing this security plugin.

Does it make sense to change the login screen URL, login lockdown, or capture the login screen?

Many security plug-ins have a login screen URL change feature and a login lockdown feature that prevents login for a while after several login enforcement attempts.

While this feature is extremely effective against hacking attempts to gain administrator privileges by mechanically entering passwords to the administration screen, it is also possible to create a login situation in WordPress without going through the login screen, and as long as the password is known, the user is logged in.

If you are a highly skilled hacker, it is possible to change the URL of the login screen. However, we believe that the hurdle will be much higher.

If wp-admin is then accessed, it is possible for the administrator to change or tamper with the site in any way. Therefore, the most effective way to protect the login screen, rather than changing the URL of the login screen or performing a login lockdown, is to make the password a string of at least 14 characters, including one-byte alphanumeric symbols and the abhorrent name.

Will the introduction of security plug-ins make it impossible for hackers to penetrate vulnerabilities?

The most common method of WordPress hacking and tampering is to exploit a vulnerability in a plugin to deface the site.
Vulnerability attacks cannot be prevented by enhancing the security of the login screen.

However, plug-ins with the following features will make it difficult to use them to embed malware even if a vulnerability exists on the site.

1 Suppress the listing of files in a folder
This feature makes it difficult to check for vulnerabilities.

2 Suppression of output of version information of plug-ins, etc.
Many plug-ins output the current version of the plug-in in the HTML when invoking the function. This string can prevent vulnerabilities from being exposed.

3 Stopping XMLRPC
XMLRPC provides a series of functions that allow users to remotely log in and post to WordPress. However, since XMLRPC is also used by plug-ins and themes, completely stopping XMLRPC may interfere with the operation of the site.

There are plug-ins that can suppress XMLRPC specifications to some extent without interfering with the operation of plug-ins and themes.

Still, the site can be hacked and defaced.

Even if the security features of plug-ins with these functions are enabled, the vulnerability may still be exploited and the site may be tampered with.

This is because security plug-ins are designed to make it harder to hack and find vulnerabilities, not to stop new vulnerabilities from being found.

The best defense against vulnerabilities is to keep WordPress, plugins, and themes as up-to-date as possible.

Since most hackers use known vulnerabilities, updating only those plugins that have been found to be vulnerable will also greatly improve security.

Plug-ins that can scan for malware, remove malware, and check for vulnerabilities
Free WordPress:Malware Scan & Security Plug-in [Malware and Virus Detection and Removal]