WordPress Accessibility
The team at 2able have lived and breathed WordPress since 2010. In that time we’ve worked on various WordPress Accessibility projects, both direct for organisations and on behalf of other Digital Agencies. As you can imagine, this has been across a variety of sectors with varying needs.
Features
- Working with WordPress since 2010
- WordPress technical issues
- Wordpress multi-lingual websites
- Mobile first WordPress websites
- WordPress Core and Plugin issues
- Security assistance and WordPress hardening
- WordPress page speed assistance
- WordPress Child Theme assistance
- WordPress hosting solutions and advice
- WordPress Backup strategies
Benefits
- Over 10 years WordPress experience
- Freeing you up to focus on what you do best
- Present your WordPress site in other languages
- Device-friendly solutions
- Security is fully-managed
- Ultra-fast website speeds for Google
- Trusted by other Digital Agencies with their WordPress needs
- Reduced down-time with safe update practices
- Wide-range of hosting options
- Multi-location backups for safety reasons
Pricing
£75 a unit an hour
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 3 9 3 1 0 2 7 4 0 4 6 0 9 0
Contact
2ABLE LTD
Ben Crowley
Telephone: 01202 237 891
Email: ben.c@2able.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- PHP version 7.4+
- MySQL 5.6+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Emergency issues within 1 hour. Standard response within 8 hours. SLAs can be tailored to meet the needs of the client.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- This has been extensively tested by the developers.
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels are customised to the clients needs.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We initially assess the requirements of the client through questions around their website requirements. We then recommend a solution accordingly, which can include training and documentation if required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We supply WordPress website files and databases at the end of the contract.
- End-of-contract process
- Providing WordPress site files and databases is included in the price.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile and desktop visual designs will be provided to the client for approval, before the site is developed.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- WordPress back-end interface for editing the front-end content
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
WordPress aims to make the WordPress Admin and bundled themes fully WCAG 2.0 AA compliant where possible.
All new and updated code released in WordPress must conform with these guidelines as per the WordPress Accessibility Coding Standards. - API
- Yes
- What users can and can't do using the API
- Full details are available at https://developer.wordpress.org/rest-api/
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- This can be defined in the scoping of the project.
Scaling
- Independence of resources
- We have monitoring in place and have low thresholds. Should these thresholds be breached, we respond accordingly.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide 3rd party tools such as Google Analytics. Raw logs can also be provided.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Depending on the hosting solution chosen, they can either request this from us, obtain from backups, or access themselves via the WordPress back-end.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 100% network uptime. If this is not achieved, a refund is given for the length of time the outage occurs.
- Approach to resilience
- Catalyst2 10G network is designed to be completely redundant from the ground up, every element of their core network is duplicated. They don’t just deploy one switch/router/firewall, they deploy two. catalyst2 ensure that even if the hardware fails, they have a spare ready to automatically take over, or right beside it to be plugged in, with the result being minimal or no impact on your service.
- Outage reporting
- This can be customised to the clients needs, such as emails and SMS alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- We provide user levels based on requirements. WordPress admin access is restricted to 2able only.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
- 2able follow GDPR requirements for all areas of our business.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration management is managed by third parties.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We provide these services through an approved supplier.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- This is managed by our supplier.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our supplier has operational ISO27001-complaint processes and systems for incident response.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
2able are carbon neutral
Pricing
- Price
- £75 a unit an hour
- Discount for educational organisations
- No
- Free trial available
- No