WordPress Accounts – Transfer blog (after Backup blog)

If you are a single-source blogger with one unique message then a solo account with your blog is sufficient.

kathleen_kettner_wordpress_transfer_blogIf you have more than one message, or messenger, then set up separate WordPress Accounts because each account links to one email address.  If you want separate streams of blog info then keep them apart from inception.  Maybe your company intranet wants an HR blog, an Ops blog, and a Suggestion Box blog for all users.

Three accounts allow the company to control or change access by group.  Multiple accounts might enhance your security if you work with a mix of private and public information.

TipEven using separate accounts, you can cross-link posts and pages between blogs as needed in terms of mixing content while still controlling who can access the dashboard within each blog.

You will have to switch between WordPress accounts for each blog-group but that helps keep the various identities separate.  You might have a family blog and a separate blog for your recording business.

To backup a blog

Quick Tip:  On Dashboard under Tools, Export, identify blog and download All Content to your local storage.  Do this periodically and ALWAYS before a transfer.

To transfer a blog

  • Make sure you have WordPress login credentials and email access for both the current account and the target account
  • Go to Dashboard of Account, select My Blogs to identify blog to be moved
  • Hover over the blog and select Transfer Blog
  • Identify target WordPress account by user name or email address
  • Read very scary message about this being permanent and irrevocable and involves your paid services and don’t dare do it if you don’t mean it.  Click and it is almost done!!
  • Receive confirmation email and click link to complete.

Tip:  Even using separate accounts, you can cross-link posts and pages between blogs as needed in terms of mixing content while still controlling who can access the dashboard within each blog.

For more info:  Moving a Blog

#transferblog #backupblog #blogmore

Biggest security threat to your network: the users

Who has the keys to your information?


Any cyber security plans you make have to assess the mix of risks:  gaps in the programming, errors in deployment and maintenance, insufficient operational controls, and then there are the users!

Like home security systems that are not armed, the failure of users to protect themselves mocks the efforts made on other fronts to secure the data environment.

Users underestimate how important they are in the defense of information.  Their disregard for the underlying aims of the company regarding privacy and market-advantage should be a big red flag to management about their own effectiveness.  It shouldn’t be “cool” to disdain the tech-tools provided to do your job.

Look at your company’s security issues and identify those that stem from poor enforcement of the basics.  Then, police yourself.

I suggest you surrender to the idea of complex passwords and then put on your thinking cap and come up with a system that works for you.  As an authorized user, you represent someone who crosses the proverbial moat and enters the kingdom of data.  Don’t be blasé about that!

1) Quit being so literal.  On security questions you do not (and should not) include actual information like your mother’s maiden name (say it is Jezebel) or your place of birth (try Hickinpickin) or provide any other verifiable factoid.

2) Keep it simpleI.luv.2.dogs? incorporates upper and lower case letters, a number and a symbol.

3) Do not cross-contaminate passwords by using a public-forum password like Hotmail with a secure forum like banking.

4) The more characters in a password, the better.  Going from the standard 8-character to a 12-character password slows down auto-hackers*.  Don’t always go for the minimum, sprinkle in a few extra taps because it’s well worth it.

* If there are approximately 80 alpha-numeric-symbol characters available, then the complexity comes from the additional choices in the 9th, 10th, 11th and 12th characters (80*80*80*80).  This compounds the 80*80*80*80*80*80*80*80 possibilities of the basic eight-character minimum.