Follow a five-step checklist
to secure your box:
1. Assess your vulnerability. Decide which machines
can be attacked, which services they are running,
and who has access to them.
2. Configure the network device for maximum
security. run service only what you must, and
configure access control list if need
3. Secure physical access to the network.
4. Create worst-case-scenario policies.
5. Keep up-to-date with security news.