it depends on the threats youre attempting to mitigate.
the best you can do these days is to raise the bar. running windows, having a non-striped array, non-encrypted file system, non-passworded bios, relying on third parties instead of simply having them snake your own KVM up using established OOB access channels.. these are fairly standard opening strains to an enterprise level colo deployment.
point being, viable security is best measured in incremental countermeasures, not trying to decide who are the least biggest scumbags to host with (although deploying anything in an eastern euro shithole is begging for problems, lets face it).






Reply With Quote
