SearchSecurity.com

Brute-force SSH attack prevention depends on network monitoring basics

I've noticed an uptick in brute-force SSH attack attempts on non-standard ports on our network. What do you think could be behind this, and how should I can go about securing those ports?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement