Through this interview, we’d like to share some essential tips on how to protect your servers using open-source technologies—in a simple and cost-effective way.
To explore this topic, I spoke with María Fernanda Suárez, a 24-year-old Software Developer at Kriptos. She graduated from the Escuela Politécnica Nacional with a degree in Systems Analysis. Her greatest passions include programming, acting, and reading.
Known as Mafer by her closest friends, she understands the importance of protecting servers—whether physical or cloud-based. Servers store critical information, and that data must never fall into the wrong hands. It’s not only important to store data securely, but also to ensure that it travels safely across networks.
As she puts it:
“Open-source solutions help accelerate digital transformation.”
Simple Ways to Secure Your Servers
Here are some of María Fernanda’s practical recommendations for protecting information in transit to and from servers:
- Use SSH (Secure Shell): A protocol for securely gaining remote access to a server. SSH encrypts data during transmission, keeping communication secure.
- Use Linux: It’s easy to install SSH on Linux via sudo apt-get install openssh-server. Linux also includes a built-in firewall. Activating it and applying packet-filtering rules can prevent unauthorized access.
- For Windows users: Tools like PuTTY or Bitvise allow secure SSH connections to servers.
- Avoid installing unnecessary open-source software unless it's essential, as this can reduce your exposure to vulnerabilities.
- Keep systems updated, encrypt data at rest, and regularly check which ports are listening on the network.
What Open-Source Technologies Protect Our Servers?
María Fernanda emphasizes the value of simulating internal attacks—as ethical hackers do—to expose vulnerabilities and strengthen defenses.
Her top recommendations include:
- Kali Linux: A powerful tool for identifying vulnerabilities.
- Nessus: Complements Kali Linux by protecting servers against detected vulnerabilities.
- Let’s Encrypt: Adds security certificates to encrypt server-client communication.
- Firewalls: Tools like iptables and Shorewall help block unauthorized access.
Open Source vs. Licensed Software: Which Is More Reliable?
According to María Fernanda, it depends on your organization's needs and the experience of your team:
“Both open-source and licensed solutions are targets for cybercriminals. The difference lies in how they’re supported and maintained.”
Advantages of Open-Source Software:
- Community support: Large communities contribute continuously to enhance security and fix vulnerabilities.
- Transparency: Access to source code allows you to verify how data is managed and implement tailored protection.
Advantages of Licensed Software:
- Official support: You have a team to contact if something fails.
- Ease of use: Ideal for less experienced teams who need a reliable, “hands-off” solution.
“Open-source works best for experienced teams. Licensed software is better for teams needing more support.”
When Should You Use Open-Source Technologies?
“If your goal is rapid development—like in a startup—open-source solutions are the way to go.”
They offer flexibility in switching technologies or vendors and benefit from active user communities that drive innovation.
Final Tips for Companies Considering Open Source
Before choosing an open-source solution, evaluate:
- Functionality: Does it meet your security and operational needs?
- Time: How long will it take to implement and configure?
- Cost and effort: Is your team ready to maintain it?
“GitHub is a great place to start. It shows useful metrics—like how many contributors the tool has, compatibility with other software, and issue tracking.”
