Get a dedicated host.


If you can't, store all sensitive information in a database, and use the technique mentioned earlier to protect your database access credentials.