
It does not matter if our online business is small or large, there will always be a certain risk that we will suffer a web attack by hackersCybercriminals look for both technical and human vulnerabilities, and any site that stores or transmits data can become a target. That's why it's essential to know How to react to a web attack and what steps to follow from the first symptom to full recovery.
It is important to be informed about What to do if this happens and also how to prepare in advance, following Tips to improve your website's securitybecause the first minutes and hours after an incident are crucial for contain the damage, protect information y comply with legal obligationsIf this is your situation, or you want to know how to react if it happens, here you will find a complete and practical guide.
Steps to react to a web attack on our page

Contact support staff
If you have a own server Contact your systems engineering team or the cybersecurity officer (CISO, systems administrator, etc.). They will know how to handle the situation and will be able to analyze the technical indicators of the attack (logs, antivirus or EDR alerts, web messages, unusual server slowness) and will activate the incident response plan If it exists.
If your web business is in a external server or hired a hosting providerFind the support number or channel and explain the situation in as much detail as possible: when the problem started, what messages or errors appear, if content has changed, and if any security alerts have been received. They will guide you to resolve your issue and may be able to... isolate the affected siteReview their infrastructures and, if appropriate, collaborate with other specialized teams (e.g., the reference CERT).
Redirect your page to a "maintenance" page
Prevent your customers from thinking your page has disappeared or been compromised by displaying malicious content. Set up a temporary "remodeling" or "under maintenance" pageAlways apologizing for the inconvenience and inviting them to return another time. This protects the brand's image and reduces users' exposure to potential scripts, banners, or redirects injected by the attacker.
This maintenance page should be simple, and be free of suspicious code and be hosted in an environment that the technical team has verified as secure. Meanwhile, the main site can remain isolated for analysis while still keeping users informed that the issue is being addressed.
Check if any damage was caused
Many times the only thing they seek hackers It involves appearing on other people's websites, modifying the homepage, or leaving visible messages (defacement). However, in many other cases the objective is steal information, implement malware, using the server in attacks against third parties or encrypting data by ransomwareTherefore, it is essential to thoroughly review whether there was any theft or loss of information and document everything.
Together with your team of engineers, review the following Key aspects:
- File integrity from the site (unauthorized changes, suspicious new files, unknown scripts).
- Databases: altered tables, deleted or exported records, presence of users created without authorization.
- Unusual entrances: unknown IP addresses, after-hours logins, multiple failed attempts.
- Availability Server issues: extreme slowness, continuous crashes, or abnormal resource usage may indicate a denial-of-service attack or the presence of malware.
This review will serve to determine the true extent of the incidentDeciding which systems need to be restored from backups and what data might have been compromised is crucial for communication with customers and, where appropriate, with the authorities.
Change all passwords and acquire new protocols
Once your website is fixed and the threat contained, add security plugins and new passwords So that if the person who carried out the attack tries again, they will encounter measures that will stop them. It is recommended:
- Use strong and individual passwords for each service (hosting panel, FTP/SFTP, database, CMS, email, etc.).
- Activate multi-factor authentication (MFA) whenever possible, especially in critical access points.
- Review and limit the user permissionsby removing unnecessary or old accounts.
- Update all extensions, themes, and components of the content manager to close known vulnerabilities.
In addition to credential changes, consider implementing tools such as a web application firewall (WAF)Intrusion detection systems or continuous monitoring services, which help to identify anomalous behavior in the early stages of a possible attack.
Take steps to prevent it from happening again
Always have a backup your page, both for the files and the database, and include security protocols such as SSL/TLS certificates To encrypt communications and install various antivirus or antimalware solutions on the computers that manage the site, establish a clear policy for all staff to avoid opening suspicious files, clicking on dubious links, or providing credentials through unverified emails or forms.
It is also recommendable:
- Define a incident response plan that indicates who does what, how the incident is documented and who is notified.
- Perform vulnerability analysis periodic checks or penetration tests to discover flaws before attackers do.
- Form the team in good cybersecurity practicesbecause human error is often the entry point for many attacks.
- Evaluate the hiring of cyber risk insurance and specialized external services to have expert support in critical moments.
The odds of suffer a cyber attack Risks are reduced if we have the necessary measures in place to ensure a secure site and a proactive organization. Remember that we are not only compromising our own information but also that of our clients, so acting quickly, relying on professionals, and learning from each incident becomes crucial for protecting business continuity and reputation.

Having a comprehensive approach that combines prevention, early detection, organized response and continuous improvement This will make each attempted attack less impactful and allow your website and e-commerce to remain a reliable environment for your users.