May 11, 2024, 5:24 p.m. | /u/CyberSecMaverick

cybersecurity www.reddit.com

Greetings, *CyberSecurity Mavericks!*

Operating two honeypots recently, I've noticed the significant amount of brute-forcing and bot activity targeting SSH. My latest article focuses on SSH security. The most effective ways of fortifying your SSH server is to ditch password authentication and move to SSH Key-based authentication. I'll be sharing how to setup your server for SSH key-based authentication and essential SSH security best practices.

[**A Guide To Securing Your Remote Access Using SSH Keys**](https://cybersecmaverick.medium.com/a-guide-to-securing-your-remote-access-using-ssh-keys-84b48097f3bf)

access article authentication bot brute cybersecurity guide honeypots key keys latest password password authentication remote access security server sharing ssh ssh key ssh keys ssh security targeting

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Vice President, Controls Design & Development-7

@ State Street | Quincy, Massachusetts

Vice President, Controls Design & Development-5

@ State Street | Quincy, Massachusetts

Data Scientist & AI Prompt Engineer

@ Varonis | Israel

Contractor

@ Birlasoft | INDIA - MUMBAI - BIRLASOFT OFFICE, IN