Category:
Dedicated Servers

How to improve the security of your dedicated server

 

If you’ve decided to invest in a dedicated server, then congratulations: you’ve made a wise decision. As with all network connections, though, there are a number of things you can do to help improve the security of yours. Here, we’re going to go through some of the best techniques for improving your connection security quickly.

Chance your SSH (Secure Shell) Listen Port to one that’s different to 22

This is a fairly ‘standard’ port, and as such it can make you susceptible to brute force attacks looking to guess your passwords and usernames. It’s a basic change, but you might be surprised how few businesses do it.

Prioritise using TLS (Transport Layer Security) interfaces

TLS interfaces encrypt the traffic moving between your computer and the server, and as a result it can block any hackers looking to capture login information. Most servers offer this as an option, including cPanel, Webmail, SMPTP and IMAP/POP3, but it’s not always turned on by default. Ensure yours is.

Only use trusted computers to do any administrative work

This goes without saying, but we’ll say it! Always ensure that any administrative work on the server is carried out from trusted computers. That is, computers that you’ve already made additional security changes to. Don’t connect using any old device, even if you’re on the move. It’s not worth it.

Regularly scan for malware

Another option that you’d think would be common sense, but that many businesses ignore. When companies are short on time, spending half an hour once a week to run a malware scan seems like something you can’t afford to do. Actually, you can’t afford NOT to do it. Even one infection in a single computer can lead to havoc across a network. Make regular scans an essential part of your security policy.

Make sure you update regularly

Regularly updating anti-virus software is something that most businesses do. However, it’s not enough. You need to update every single piece of software you use on the server. This includes your anti-virus and anti-spyware packages, but should also include your operating system, any cloud software, any software packages you use (such as Office) as well as any content management systems. It only takes one loophole in one older piece of software for hackers to start causing serious damage.

Published on:

Read More