Difference between revisions of "Choose a hosting provider"

(High Technical)
Line 150: Line 150:
 
[http://www.securethelock.com/2014/01/09/12-steps-for-hardening-mysql-from-attackers/| 12 steps for Hardening MySQL from Attackers]
 
[http://www.securethelock.com/2014/01/09/12-steps-for-hardening-mysql-from-attackers/| 12 steps for Hardening MySQL from Attackers]
 
</li>
 
</li>
</ol>
+
</ul>
<ul>
+
'''Web app'''
+
<li>
+
</li>
+
</ol>
+
  
 
</div>
 
</div>

Revision as of 19:42, 18 May 2014

Criteria

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical

 [Expand

Intermediary Technical

 [Expand

Basic Technical

 [Expand

Comparison Matrix


Back to front page