Popular FTP client applications like Filezilla and Putty support SSH for remote connections, which should be used instead of telnet and FTP. Using telnet is not recommended because logins, passwords and commands are transferred in clear text. An attacker could eavesdrop on telnet sessions and obtain the credentials of other users. The use of FTP is also not a recommended best practice. FTP servers can only handle usernames and passwords in plain text, which means that credentials, FTP commands and transferred files could be sniffed. SSH and SFTP can be used to replace telnet and FTP in a manner almost invisible to the average user.
You should also remember to use SSH v2.0. Versions prior to 2.0 are not completely cryptographically safe, so they should be avoided. SSH version 1 is vulnerable to a well-known security exploit that allows an attacker to insert data into the communication stream.
If you set up an SSH server, remember to set the timeout and maximum denied login attempts. I would suggest a 60 second timeout or less for idle connections and a maximum of 3 unsuccessful login attempts.
Keep Up with TechRepublic