Loading...

Knowledge Base
Switch to Bluehost and get money back
Migrate your WordPress website from your current host and we'll cover the costs.

VPS & Dedicated Hosting: Secure your Server

Securing your VPS or Dedicated server is an important step in maintaining data integrity and confidentiality. It is an essential security check on the access process, limiting access by setting up firewalls, brute-force protection, secure connection via SSH and SFTP, and malware checking. In addition, all these best practices strongly secure your server from unauthorized access.


In this article, we'll discuss:


Use a Firewall to Limit Access

Firewalls prevent external access to software on your server that might otherwise be exposed. With firewalls, you can limit the type of traffic, ports, and IP addresses that are allowed to communicate with your server.

IPTables

Dedicated and VPS servers come with IP Tables. To learn more about IP Tables, please see Manage Ports On Dedicated Or VPS Servers.

Other Firewalls

Besides IP Tables, there are other firewalls you can use on your server:

  • UFW (Uncomplicated Firewall)
  • NFTables

Brute Force Protection

Some services must be exposed to the internet so that you can connect to your server. In such cases, you still need to protect these access points. A common type of attack called "Brute Force Attack" occurs when an attacker attempts to log in to your server by guessing the username and password. The attacker typically has methods and computers that are capable of trying guesses very quickly and, given enough time, can accurately determine a working username and password.

A way to defend against these types of attacks is to have a system that monitors login attempts. If too many failed attempts occur from the same IP address within a short period of time, that IP address is blocked. 

cPHulk

cPHulk is available on Dedicated and VPS servers. To find out how to configure it, please read cPHulk Brute Force Protection.

Connecting Securely

When you connect to your server, it's important to secure the connection. Insecure connections are more likely to have data stolen by anyone who might monitor the connection.

SSH

When connecting using SSH, it's a good idea to use keys instead of a traditional username and password. See Generating a Public/Private Key

SFTP

When making FTP connections, use SFTP instead of normal FTP. FTP setup using Secure FTP explains how to use SFTP. 

Using Trustworthy Software

A key component to security is making sure you only install trustworthy software on your server. Software from the distribution repositories that your server is already set up to use has been vetted and seen as trustworthy. Be careful when installing 3rd party software from untrusted services, you may be unknowingly installing malware.

Updates

You should also strive to keep your software up to date. The longer you keep out-of-date software the more likely you are to have known vulnerabilities in that software exploited.

Check for Malware Often

Even with strong security measures, it's still possible for your server to become compromised. A prudent server administrator will often check for malware on a server even if things seem to be running fine. To learn more about scanning for malware please see Antivirus on Dedicated or VPS servers.

Summary

Securing your VPS or Dedicated Server is multi-layered, which involves limiting access via firewalls, brute force protection, secure connection, trusted software, and malware scans. Implementing all of these security measures can be a great way to keep your server safe from possible threats and ensure a solid, secure hosting environment.

If you need further assistance, feel free to contact us via Chat or Phone:

  • Chat Support - While on our website, you should see a CHAT bubble in the bottom right-hand corner of the page. Click anywhere on the bubble to begin a chat session.
  • Phone Support -
    • US: 888-401-4678
    • International: +1 801-765-9400

You may also refer to our Knowledge Base articles to help answer common questions and guide you through various setup, configuration, and troubleshooting steps.

Did you find this article helpful?

 
* Your feedback is too short

Loading...