Ransomware is increasingly becoming a serious issue for many companies. It's a type of malware that encrypts all data on and accessible by a computer, and holds the recovery key hostage until payment is made by a certain deadline. If the deadline passes without payment, the recovery key is destroyed and access to the encrypted data is permanently lost. With criminals making large sums of money using this method ransomware will continue to become even more commonplace in the future.
A good first step is planning for recovery in the case of infection despite any of the protections put in place. Having timely, reliable backups is absolutely necessary and should be a focus regardless. Make sure there are regular bac...
SSH is a common way to remotely control, or transfer data between, computers. It is a much more secure method compared to alternatives, such as Telnet, which transmit data in plain text. However, there are a few SSH server settings that can be improved. Below are a few changes to get you started.
Note: You'll want to make sure you aren't using any of the settings that will be disabled or changed.
Edit Or Add The Following Settings
Open the SSH server configuration file (/etc/ssh/sshd_config) in your editor of choice.
Replace port_number with your desired port number. Port numbers from 1024 to 65535 are usually a safe bet, just make sure it's not already in use by another service. SSH typically runs on port 22, but sel...