This article explains how to protect SSH on web servers using basic Tips but placing emphasis on IP whitelisting.
This articles provides a framework designed to help businesses recover after a cyber attack.