939266168

Data and server protection from hackers

By running your own server, you may feel more secure against hackers. While cybersecurity requires constant vigilance, it can become an easy routine knowing some useful procedures to protect your server from attacks.

 

In this article, we will look at some methods you can start applying for your server security, and to improve its protection as soon as possible.

Hide all information in your server software versions

If hackers can determine the version of software your server is running, they can use those to exploit any known flaws and security weaknesses in this release. You'll have to look for specific steps for that particular software, but some common software and services you'll want to check are:

Mail servers: Various mail servers can communicate their version to banners, which are sent after connecting via SMPT, IMAP and POP3, as a form of security handshake. It is known as grab attacks.

Web servers: Analyze your server's HTTP headers if you are using Apache, NGINX, Microsoft IIS, or anything else.

  • WordPress: You'll check almost everything, including plugins, forms, galleries, themes, and filenames, including CSS and . Here are some good tips for securing your WordPress site.
  • SSH: OpenSSH communicates with the OS version by default.
  • Fillet servers: Your FTP, SFTP, WebDav, and other file servers could share their release information at login, before authentication.
  • Website languages: Frameworks for PHP, Java, .NET, and other web languages ​​can sometimes include HTTP headers with version information, such as "Powered by x".

Consider virtualizing the SQL environment

SQL Server virtualization was once considered too resource-intensive to be practical in everyday use, but times have changed as server hardware has grown significantly in power in recent years. Some good practices to remember are to always try to use SLAT-compatible hardware and monitor server performance using a performance monitoring tool such as SentryOne.

Install only the absolutely necessary software

If your server has a lot of services, add-ons and software, you have a fairly broad attack vector. Your server should contain the essentials, with only the most critical tools and software you need to install.

You should also make it a dependency checkpoint for software, as this can lead to by installing additional software. You should try to get software with the least possible level of dependencies.

Protect yourself from brute force attacks

Instead of allowing password connections, consider SSH key authentication. However, there are advantages to using SSH keys, such as tools for breaking weak SSH key passwords to recover the SSH key. It is a much stronger form of security than regular passwords in many cases.

Other things you need to do is set limits on the authentication rate so that the automated one and key control to significantly slow down and automatically block IP addresses with a failed connection rate.

In addition, you should close as many network ports as possible while filtering out those that cannot be blocked. The firewall configuration should have a block policy by default and you should filter open ports by allowing only traffic based on the actual expected source (IP address, location, etc.).

Update your software regularly

Many breach attempts nowadays are either aided or abetted entirely by bot tools, which scan your network for critical access points. You can mitigate many potential risks by keeping your software up to date, not only with security code updates for your operating system, but also any packages and dependencies.

You should also check your server logs regularly for signs of problems, such as errors or strange events.

Conclusion

This is just a short list of immediate steps you can take to secure your server from hackers, but there are much more in-depth strategies you can take as you delve deeper into cyber security. If you are running a server at home, you may also want to consider protecting yourself from data and identity.

 

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).