fbpx

Best Internet Security Tips For Your Server

Best Internet Security Tips For Your Server

Best internet security tips that help you to protect your server. One of the first things you should do when running a virtual private server is to make your server as secure as possible. This way you will protect your server from various security attacks that can damage or even destroy your data.

Here are a few best security tips on how to improve the stability and security of your Virtual Private Server:

1. Update Your Software

Updating the software is one of the most important and best Internet security tips to secure your server. Every day there are many vulnerabilities in various Linux applications, services and scripts, and new permanent versions are released very quickly. Installing updates on the server is important and strongly recommended. You can keep your server up to date using your distribution’s package manager, such as “yum” or “apt-get”.

RPM based distros:
# yum update

Debian based distros
# apt-get update && apt-get upgrade

2. Use Strong Passwords

The second best internet security tip is always used as a strong password. Passwords are the best front line defense for your server. A strong password consists of a combination of letters (both upper and lower case), numbers and special characters and it should be at least 8 characters long.

When setting up new accounts on the virtual server, create strong passwords. The stronger the password, the less likely it is to guess and your server will be taken over. Never use easy-to-guess passwords, such as names based on names, addresses, words from the dictionary, important dates, etc. A strong password consists of a combination of letters (both uppercase and lowercase), numbers and special characters, and should be at least 8 characters long.

3. Use Correct File and Directory Permissions

Three types of access rights: read, write and execute are available for three different categories of users: owner, group and others. With these permissions, you can specify who can access or modify files. This is the best internet security tip that makes them very important for the security of your server. Make sure that all files and directories have the correct permissions. You can check the file permissions by running the “ls -l” command. The first line of the output shows file / directory permissions: “r” = read permission; “W” = permission to write; “X” = execute the authorization; “-” means no permission. You can change the permissions using the “chmod” command.

The following commands can help you find any world writable files and directories, which can be a security risk:

To find world writable files type:
# find / -type f -perm -o+w -exec ls -l {} \;

To find world writable directories type:
# find / -type d -perm -o+w -exec ls -ld {} \;

4. Stop / Disable Unneeded Services

All Linux distributions usually have many services configured that will run each time the server is started. The more services running on the server, the more ports are open to potential external intrusion. Disabling unneeded services can improve server security and even overall server performance.

5. Disable ‘root’ login via SSH

The “root” account has full control over the entire server, so allowing SSH to log in directly as “root” is one of the biggest security threats. Hackers can brutally force the server’s “root” password, and when they succeed, they will gain full control over the entire server. Even so, even one small mistake made when logging in as “root” can cause a big problem on the server. It is strongly recommended that you use “root” only when it is really necessary.

6. Delete Inactive Accounts

User accounts that are not used for a long time pose a potential threat to server security. Because no one uses them, they can be broken and used to damage the server or other servers on the network.

To remove a user account from the Linux command line, do the following:
# userdel <username>

If you liked this post please share it with your friends on the social networks or simply leave a reply below. Thanks.

Tags: , , , , , , , , ,

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.