Get a Pentest and security assessment of your IT network.

Cyber Security

Web Server & Remote Worker Security

TL;DR

This guide covers essential steps to secure your web server and protect access when staff work remotely. It focuses on strong passwords, software updates, firewalls, VPNs, multi-factor authentication (MFA), regular backups, and monitoring for suspicious activity.

Securing Your Web Server

  1. Keep Software Updated: This is the most important step. Updates patch security holes.
    • Operating System: Regularly update your server’s OS (e.g., Linux, Windows Server).
    • Web Server Software: Update Apache, Nginx, IIS, or whatever you use.
    • Databases: Keep MySQL, PostgreSQL, MongoDB etc. up to date.
    • Content Management Systems (CMS): If using WordPress, Joomla, Drupal, update the core and all plugins/themes.
  2. Strong Passwords & User Accounts:
    • Use strong, unique passwords for all accounts. A password manager is highly recommended.
    • Disable default accounts or change their passwords immediately.
    • Limit user privileges – only give people the access they need.
    • Regularly review and audit user accounts.
  3. Firewall Configuration: A firewall blocks unwanted traffic.
    • Enable a firewall (e.g., ufw on Linux, Windows Firewall).
    • Only allow necessary ports and services through the firewall. For example, port 80 (HTTP) and 443 (HTTPS). Block everything else by default.
      sudo ufw allow 80/tcp
  4. HTTPS Encryption: Use SSL/TLS to encrypt data in transit.
    • Obtain an SSL certificate (Let’s Encrypt is a free option).
    • Configure your web server to use HTTPS.
    • Redirect HTTP traffic to HTTPS automatically.
  5. Regular Backups: If something goes wrong, you need backups.
    • Automate regular backups of your website files and database.
    • Store backups offsite (e.g., cloud storage) – don’t keep them on the same server.
    • Test your backups regularly to ensure they can be restored.

Securing Remote Worker Access

  1. Virtual Private Network (VPN): A VPN creates a secure connection.
    • Require remote workers to use a VPN when accessing company resources.
    • Choose a reputable VPN provider with strong encryption and privacy policies.
  2. Multi-Factor Authentication (MFA): Adds an extra layer of security.
    • Enable MFA on all critical accounts, including email, VPN, web server access, and any cloud services.
    • Use a strong MFA method like authenticator apps (Google Authenticator, Authy) or hardware tokens. SMS-based MFA is less secure.
  3. Endpoint Security: Protect the worker’s device.
    • Require anti-virus/anti-malware software on all remote devices.
    • Ensure operating systems and applications are up to date.
    • Implement disk encryption (e.g., BitLocker for Windows, FileVault for macOS).
  4. Remote Access Policies: Clear rules for workers.
    • Develop a clear remote access policy outlining security requirements.
    • Train remote workers on security best practices (phishing awareness, password management, data protection).
  5. Monitoring & Logging: Watch for suspicious activity.
    • Monitor server logs for unusual login attempts or errors.
    • Use intrusion detection/prevention systems (IDS/IPS) to detect and block malicious traffic.
    • Regularly review security logs for potential threats.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation