VPS & Dedicated Hosting: Secure your Server
Securing your VPS or Dedicated server is an important step in maintaining data integrity and confidentiality. It is an essential security check on the access process, limiting access by setting up firewalls, brute-force protection, secure connection via SSH and SFTP, and malware checking. In addition, all these best practices strongly secure your server from unauthorized access.
In this article, we'll discuss:
- Use a Firewall to Limit Access
- Brute Force Protection
- Connecting Securely
- Using Trustworthy Software
- Regularly Check for Malware
- Summary
Use a Firewall to Limit Access
Firewalls prevent external access to software on your server that might otherwise be exposed. With firewalls, you can limit the type of traffic, ports, and IP addresses that are allowed to communicate with your server.
IPTables
Dedicated and VPS servers come with IP Tables. To learn more about IP Tables, please see Manage Ports On Dedicated Or VPS Servers.
Other Firewalls
Besides IP Tables, there are other firewalls you can use on your server:
- UFW (Uncomplicated Firewall)
- NFTables
Brute Force Protection
Some services must be exposed to the internet so that you can connect to your server. In such cases, you still need to protect these access points. A common type of attack called "Brute Force Attack" occurs when an attacker attempts to log in to your server by guessing the username and password. The attacker typically has methods and computers that are capable of trying guesses very quickly and, given enough time, can accurately determine a working username and password.
A way to defend against these types of attacks is to have a system that monitors login attempts. If too many failed attempts occur from the same IP address within a short period of time, that IP address is blocked.
cPHulk
cPHulk is available on Dedicated and VPS servers. To find out how to configure it, please read cPHulk Brute Force Protection.
Connecting Securely
When you connect to your server, it's important to secure the connection. Insecure connections are more likely to have data stolen by anyone who might monitor the connection.
SSH
When connecting using SSH, it's a good idea to use keys instead of a traditional username and password. See Generating a Public/Private Key.
SFTP
When making FTP connections, use SFTP instead of normal FTP. FTP setup using Secure FTP explains how to use SFTP.
Using Trustworthy Software
A key component to security is making sure you only install trustworthy software on your server. Software from the distribution repositories that your server is already set up to use has been vetted and seen as trustworthy. Be careful when installing 3rd party software from untrusted services, you may be unknowingly installing malware.
Updates
You should also strive to keep your software up to date. The longer you keep out-of-date software the more likely you are to have known vulnerabilities in that software exploited.
Check for Malware Often
Even with strong security measures, it's still possible for your server to become compromised. A prudent server administrator will often check for malware on a server even if things seem to be running fine. To learn more about scanning for malware please see Antivirus on Dedicated or VPS servers.
Summary
Securing your VPS or Dedicated Server is multi-layered, which involves limiting access via firewalls, brute force protection, secure connection, trusted software, and malware scans. Implementing all of these security measures can be a great way to keep your server safe from possible threats and ensure a solid, secure hosting environment.
If you need further assistance, feel free to contact us via Chat or Phone:
- Chat Support - While on our website, you should see a CHAT bubble in the bottom right-hand corner of the page. Click anywhere on the bubble to begin a chat session.
- Phone Support -
- US: 888-401-4678
- International: +1 801-765-9400
You may also refer to our Knowledge Base articles to help answer common questions and guide you through various setup, configuration, and troubleshooting steps.