Changes

Secure hosting guide

41 bytes added, 9 years ago
/* Step 3: Plan for contingency and threat mitigation */
For each form of system use relevant threats and strategies to mitigate them are include. These approaches are ordered in terms of technical ability requirements. The following topics are relevant to all setups:
*[[System_Management|System Management]]
*[[Data_Backup|Data backup and recovery]]
*[[Access Restrictions]]