Home » Technology » Security Transformation » Top four features needed for optimum hosting security
Billions of dollars are transferred across the internet on a regular basis, and information is stored on the internet that is worth billions of dollars. You could say that how to ensure hosting security is the multi-billion-dollar question.
Hosting security is in part a partnership – a partnership between the hosting company and their customers. When you do appoint a hosting company, make sure you carry out your due diligence, and ensure that the company maintains servers. You should also see if it has published a security protocol that you can review.
Bear in mind that there are multiple motivations for attacks on your system, however, you can broadly divide them into two categories: attacks for which the motive is to gain or steal information – or indeed money – and attacks designed to cause inconvenience or financial harm.
Carry out regular back-ups. In this way, if security is compromised, data is lost or in some way manipulated, there is the recourse to upload data that was created beforehand. Do not rely on your host for data back-up, but equally, there is no harm in choosing a host which automatically backs-up clients’ data.
But what features are required for optimum hosting security?
First of all, ensure Secure File Transfer Protocol or SFTP. This is a method for transferring files between two machines, with security measures that are generally considered superior to security measures in FTP – file transfer protocol. SFTP transfers files using private and safe data streams. One way in which SFTP scores over FTP is that it encrypts passwords.
Secondly, ensure Secure Sockets Layer – SSL. This is a security technology for guaranteeing that the link between a web browser and a website is encrypted, and ensuring all data that is transferred remains private. To create an SSL connection a web server requires a SSL certificate. You can ascertain if an SSL certificate is in place by looking for a padlock image on the URL address, as well as an https:// address instead of http://.
Thirdly, establish if your hosting company has adequate firewalls. You would expect your hosting company to have firewalls, but make sure that firewalls specific to different clients are independent. Linked with this, ensure your hosting company has IDS – Intrusion Detection System.
Finally, create anti-DDOS (distributed denial of service attack) features. A DDOS attack can occur when a third party bombards your host with information requests that cannot be handled. Features reducing the damage from a DDOS attack can involve single network management protocol – SNMP – in which unusual activity is identified and can divert traffic to a cloud scrubbing service.