+1 for Cloudflare for DDoS protection.
+1 to changing common ports (22 ssh to #### ssh) will prevent and save you overflow errors from automated attacks
+1 to implementing and monitoring an IDS software, SNORT, AIDE, BASE, Sourcefire are all great but you really want to get someone who knows how to properly configure these things and it will stop many attacks that are known and the reports they generate are great for blacklisting and investigating patterns of different intrusion attempts.
+1 HARDWARE FIREWALLS
Some DO NOTS:
Store data in plain-text (maybe even get full encryption on even your drives if you want to go to that extent)
Weak passwords and keys (complexity < length, if your password is %$!XD guess what it can be broken today easily because of it's length)
Weak encryption or hashes
No salting
using WiFi
+1 to changing common ports (22 ssh to #### ssh) will prevent and save you overflow errors from automated attacks
+1 to implementing and monitoring an IDS software, SNORT, AIDE, BASE, Sourcefire are all great but you really want to get someone who knows how to properly configure these things and it will stop many attacks that are known and the reports they generate are great for blacklisting and investigating patterns of different intrusion attempts.
+1 HARDWARE FIREWALLS
Some DO NOTS:
Store data in plain-text (maybe even get full encryption on even your drives if you want to go to that extent)
Weak passwords and keys (complexity < length, if your password is %$!XD guess what it can be broken today easily because of it's length)
Weak encryption or hashes
No salting
using WiFi
Last edited: