Web Hosting Security Features That Matter for Your Online Business
Account Isolation: The Foundation of Hosting Security
Account isolation determines whether a security compromise on one website can spread to others on the same server. On shared hosting without proper isolation, a vulnerable WordPress plugin on one site can be exploited to access files, databases, and email for every other site on the server. This cross-account contamination is one of the most common attack vectors for small business websites, and it happens through no fault of the affected site owner.
CloudLinux is the industry-standard isolation technology for shared hosting. CloudLinux uses CageFS to create a virtualized file system for each account (preventing one account from seeing or accessing another account's files) and LVE (Lightweight Virtual Environment) to limit each account's CPU, memory, and I/O usage (preventing one compromised or poorly coded site from consuming all server resources). Hosting providers that use CloudLinux include SiteGround, A2 Hosting, and many quality shared hosts. When evaluating a shared hosting provider, ask specifically whether they use CloudLinux or an equivalent isolation technology.
VPS and cloud hosting provide stronger isolation by default because each account runs its own operating system instance. A compromise on one VPS cannot access another VPS on the same physical hardware unless the hypervisor itself is compromised, which is an extremely rare and sophisticated attack. For ecommerce stores processing payments, the isolation provided by VPS hosting or cloud hosting is a practical requirement for PCI compliance.
Automated Security Patching
Your hosting server runs an operating system (typically Linux), a web server (Nginx, Apache, or LiteSpeed), PHP, a database server (MySQL or MariaDB), and various supporting software. Every component has vulnerabilities that are discovered and patched regularly. The speed at which your hosting provider applies these patches directly affects your exposure to known attacks.
Quality managed hosting providers apply critical security patches within 24 to 48 hours of release and routine patches within 1 to 2 weeks. They test patches on staging systems before deploying to production servers to prevent updates from breaking customer sites. Ask your hosting provider about their patch management timeline and whether they maintain a security bulletin or changelog that documents when patches are applied.
On unmanaged hosting, you are responsible for monitoring security advisories and applying patches yourself. This requires subscribing to security mailing lists for your operating system, web server, PHP version, and database server, and acting promptly when critical vulnerabilities are announced. Tools like unattended-upgrades (for Ubuntu/Debian) and dnf-automatic (for RHEL/CentOS) can automate OS-level security patches, but web application patches (PHP, MySQL) typically require manual attention and testing.
Web Application Firewall (WAF)
A WAF filters incoming web traffic and blocks requests that match known attack patterns before they reach your website. WAFs protect against SQL injection (attackers injecting database commands through form fields), cross-site scripting (XSS, attackers injecting malicious JavaScript), file inclusion attacks, and brute force login attempts. A WAF operates at the hosting or CDN level, providing protection regardless of your website application's own security measures.
Cloudflare WAF (free basic rules on the free plan, full WAF on Pro at $20/month) is the most accessible WAF for small businesses. Cloudflare's free plan includes basic threat protection that blocks known malicious bots and common attack patterns. The Pro plan adds managed WAF rulesets (OWASP Top 10 protection), rate limiting, and custom firewall rules. Since Cloudflare works with any hosting provider, it is the practical choice for adding WAF protection to existing hosting that lacks its own WAF.
SiteGround's custom WAF is built into their hosting platform and automatically updated with rules targeting current WordPress, WooCommerce, and PHP vulnerabilities. SiteGround's security team monitors the WordPress ecosystem for new vulnerabilities and deploys protective WAF rules, often before the plugin developers release a patch. This proactive protection is one of SiteGround's strongest security differentiators.
Sucuri WAF ($199+/year) provides a dedicated WAF and CDN service that proxies your traffic through their network, blocking malicious requests before they reach your server. Sucuri includes malware scanning, malware removal if your site is compromised, and a CDN. For ecommerce stores on hosting without a built-in WAF and where Cloudflare's free WAF rules are insufficient, Sucuri provides comprehensive protection.
DDoS Protection
Distributed Denial of Service (DDoS) attacks overwhelm your server with fake traffic, making your store inaccessible to real customers. DDoS-for-hire services cost as little as $10 to $50, making these attacks accessible to competitors, extortionists, or anyone with a grudge. For ecommerce stores, a DDoS attack during Black Friday or a major sale can cost thousands of dollars in lost revenue.
DDoS protection works by filtering traffic through a network that can absorb and analyze massive traffic volumes, separating legitimate visitors from attack traffic and passing only the legitimate requests to your server. Cloudflare's free plan provides basic DDoS mitigation that stops the most common volumetric attacks. Enterprise DDoS protection from Cloudflare Business ($200/month), AWS Shield Advanced, or Akamai provides guaranteed mitigation capacity and faster response to sophisticated attacks. The DDoS protection guide covers implementation options by budget level.
At minimum, every business website should use Cloudflare's free plan for basic DDoS protection. The 5-minute setup (changing your nameservers) provides a meaningful security improvement at zero cost.
Malware Scanning and Monitoring
Hosting-level malware scanning checks your website files for known malicious code patterns, unauthorized file modifications, and suspicious file additions. For WordPress and WooCommerce stores, common malware includes JavaScript card skimmers injected into checkout pages, backdoor files that provide persistent attacker access, and SEO spam injections that add hidden links to gambling and pharmaceutical sites.
Quality managed hosting providers include automated daily malware scanning. SiteGround's SG Site Scanner, Kinsta's malware scanning, and Cloudways' malware protection monitor for file changes and known malware signatures. Some providers include malware removal as part of their hosting service, while others charge separately or recommend third-party tools. For self-managed hosting, install a malware scanner like Wordfence (free tier available for WordPress), Sucuri Security (free scanner, paid for WAF and removal), or MalCare ($99+/year for automated malware removal).
File integrity monitoring is a related feature that tracks changes to your website files and alerts you when files are modified unexpectedly. Legitimate file changes happen during updates and content changes, but file modifications outside of these events may indicate a compromise. Wordfence and Sucuri both include file integrity monitoring for WordPress sites. The malware protection guide covers scanner selection and configuration.
Backup Security
Backups are a security feature, not just a convenience feature. In a ransomware attack or destructive breach, your most recent clean backup is the only thing standing between a recoverable incident and a catastrophic one. Hosting-level backup security involves three considerations.
Backup isolation. Backups stored on the same server as your website are vulnerable to the same attacks. If ransomware encrypts your server files, backups stored on that server are encrypted too. Your hosting provider should store backups on separate infrastructure from your web server, ideally in a different data center or cloud region. Ask your provider specifically where backups are stored and whether backup storage is isolated from production servers.
Backup encryption. Backups contain your complete website including customer data, order history, and potentially cached payment information. Unencrypted backups that are stolen or accidentally exposed create a data breach identical to a compromise of your live site. Your hosting provider should encrypt backups at rest using AES-256 or equivalent encryption. If your provider does not encrypt backups, implement your own encryption layer or use a backup service that does.
Backup access controls. Limit who can access, download, and restore backups. A backup downloaded to an unsecured laptop or shared via unencrypted email is a security vulnerability. Your hosting control panel should require authentication for backup operations, and backup downloads should be logged. The backup strategy guide covers the full backup security framework.
Evaluating a Hosting Provider's Security
When comparing hosting providers, ask these specific questions rather than accepting marketing claims of "secure hosting." Does the provider use account isolation technology (CloudLinux or container-based isolation)? What is the timeline for applying critical security patches? Is a WAF included or available, and is it automatically updated with new rules? What DDoS protection is included? Does the provider include malware scanning, and what happens if malware is found? Are backups stored separately from production servers, and are they encrypted? Does the provider publish a security policy or SOC 2/ISO 27001 certification?
A provider that answers these questions clearly and specifically is investing in security infrastructure. A provider that responds with vague assurances about "enterprise-grade security" without technical specifics is likely providing minimal security beyond basic server configuration. For ecommerce stores, the ecommerce security guide covers the full security picture beyond hosting-level concerns.
