In all our web hosting packages, the SSL certificate is defined free of charge.
Full performance, fully equipped servers for every budget.
Ensure your passwords are strong and unique:
At least 12 characters long
Include uppercase, lowercase, numbers, and special characters
Regularly update passwords
Change the default SSH port (22) to a custom port.
Use SSH Key Authentication instead of passwords.
Disable root login in /etc/ssh/sshd_config by setting PermitRootLogin no.
/etc/ssh/sshd_config
A firewall allows you to control traffic flow to your server. Use UFW (Ubuntu) or firewalld (CentOS):
sudo ufw allow 22/tcp sudo ufw allow 80/tcp sudo ufw enable
Fail2Ban blocks IPs that repeatedly fail to log in:
sudo apt-get install fail2ban sudo systemctl enable fail2ban sudo systemctl start fail2ban
Use services like Cloudflare or AWS Shield to prevent traffic overload and attacks.
Outdated software may contain vulnerabilities. Keep your system updated:
sudo apt-get update && sudo apt-get upgrade -y
Set up daily or weekly backups to restore data in case of attacks or hardware failures.
Instead of logging in as root, create a new user and assign necessary privileges:
sudo adduser new_user sudo usermod -aG sudo new_user
Regularly scan your VDS server for malware using:
ClamAV for open-source malware protection
sudo apt-get install clamav sudo freshclam sudo clamscan -r /var/www
Limit user access to only essential files to improve security.
Set proper permissions for your directories to protect sensitive data:
sudo chmod 750 /var/www sudo chmod 600 ~/.ssh/authorized_keys
Use log monitoring tools like Logwatch, GoAccess, and Fail2Ban to track suspicious activity and unauthorized access.
By following these security practices, you can strengthen your VDS server’s security, prevent attacks, and ensure your data remains safe.