Difference between revisions of "Choose a hosting provider"

(Basic Technical)
(Basic Technical)
Line 285: Line 285:
 
'''Wordpress Security''' is described in detail in the following [http://codex.wordpress.org/Hardening_WordPress| guide].  
 
'''Wordpress Security''' is described in detail in the following [http://codex.wordpress.org/Hardening_WordPress| guide].  
 
</li>
 
</li>
</div>
 
 
</div>
 
</div>
  

Revision as of 18:28, 25 May 2014

Criteria

There are several aspects which should be considered when selecting a service host. Below is a general list, this document gives detailed information on each area.

  • Price - relative services offered
  • Reputation - are they well known, have they had security breaches or reports of poor support, do they adhere to certain principles inline with that of your organisation - such as data privacy or protection of human rights defenders.
  • Specialisation - do they work in the field of human rights, software applications or general hosting
  • Is mail provided
  • Hardware specifications
  • Operating systems offered
  • Supported provided
  • Readily discusses your security concerns and which security features and processes they offer with their hosting.
  • Provides the most recent stable versions of all server software.
  • Provides reliable methods for backup and recovery.
  • Provides encryption options for hosting of sites or mail

Features

It is quite important to consider the possibilities offered by your provider's control panel. If you need to write a support ticket everytime the server has to reboot, it wont be an efficient process, especially during a crises. Possible features to look out for include

  • Automated operating system installs
  • Server boot and reboot
  • Remote console (sometimes known as KVM)
  • Server and network statistics
  • Dynamic components (e.g. adding extra disk space, RAM without rebuilding the machine or having to order a new service)
  • Server access (varies between SSH, SFTP or web based)

Secure hosting setups

Depending on available skill level the following secure system setups are possible:

 [Expand

High Technical

 [Expand

Intermediary Technical

 [Expand

Basic Technical