The initial step is to find out what variety of certificate you need. For example, if internet hosting articles on a number of platforms (on separate domains/subdomains) it may imply that you need to have different SSL certificates. The hacker can also get a website validated (DV) SSL certificate that https://www.hostscheap.com/wordpress-install-service