{"id":5935,"date":"2025-02-05T11:28:31","date_gmt":"2025-02-05T09:28:31","guid":{"rendered":"https:\/\/unihost.com\/blog\/?p=5935"},"modified":"2026-03-18T13:36:47","modified_gmt":"2026-03-18T11:36:47","slug":"common-mistakes-infrastructure-security","status":"publish","type":"post","link":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/","title":{"rendered":"The most common mistakes when setting up server or infrastructure security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There may be a bit of triviality somewhere, but in our experience, out of 100 obvious things, a good 20% are always either forgotten or not fully taken care of. This is where small and big problems come from. So let&#8217;s avoid them and make our infrastructure secure!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we&#8217;ll look at both cases from our own experience and some illustrative ones known to the general public. Believe me, we&#8217;ve seen enough in our 10 years on the market &#8211; from hacked servers with a password like 123qwe, server backups on the same server, and ssh keys freely available on GitHub.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We don&#8217;t claim to be \u201csecurity experts\u201d, but we want to share with you what our community has encountered, which will allow you to double-check yourself.<\/span><\/p>\n<p><b>1. Use complex passwords <\/b><b>not only<\/b><b> for prod \ud83d\ude42 and secure the connection to the servers<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Of course, you will remember to do everything right on prod, but what about servers that are used purely for internal needs? Do you think it&#8217;s trivial? It is! And that&#8217;s why, very often, many people just \u201cforget\u201d about it. Having a strong password is not a 100% guarantee that you won&#8217;t be hacked, but if you also think about blocking access over IP, even with a cracked password, it will not be possible to get into your infrastructure.<\/span><\/p>\n<p><b>Case study:<\/b> <i><span style=\"font-weight: 400;\">This is the solution we offered our client when he periodically complained about some new files on the server that shouldn&#8217;t have been there.<\/span><\/i> <i><span style=\"font-weight: 400;\">We don&#8217;t know how and where the client stored the access password, but after restricting access by IP, the \u201cmysterious\u201d files stopped appearing.<\/span><\/i><\/p>\n<p><b>Recommendations:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use complex passwords that contain letters, numbers, and special characters on ALL infrastructure. Even if that server is used once a year and there is \u201cnothing important\u201d there<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Always change automatically generated passwords from your hoster.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use a VPN to administer the server and restrict access for all IPs except yours.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Hide the real IP address of your server &#8211; this significantly reduces the potential scale of damage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Update passwords regularly and avoid <\/span><b>reusing<\/b><span style=\"font-weight: 400;\"> them.<\/span><\/p>\n<p><b>2. Failure to update software on time<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Outdated software, operating systems or CMS (e.g. WordPress, Joomla) often contain vulnerabilities that attackers can exploit.<\/span><\/p>\n<p><b>Case in point:<\/b> <i><span style=\"font-weight: 400;\">In 2017, the world was gripped by the WannaCry ransomware attack, which exploited a vulnerability in an outdated version of Windows.<\/span><\/i> <i><span style=\"font-weight: 400;\">Many companies that did not install updates for the operating system fell victim to the attack.<\/span><\/i> <i><span style=\"font-weight: 400;\">The virus encrypted data on thousands of computers, demanding a ransom to decrypt it.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Install updates and patches for all infrastructure components.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Set up automatic updates for critical systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 CVE. Monitor the emergence of new and previously identified vulnerabilities for the software you use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Regularly scan your software for vulnerabilities.<\/span><\/p>\n<p><b>3. Have and adhere to a cybersecurity policy in the company<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are different situations. Take care of a script in case of an incident. Who is responsible, when and for what. What actions will be taken in the first place, and these people should also have backup with the appropriate level of security clearance. Someone may be on vacation, out of service, etc. It is better to have all this and not need it than vice versa.<\/span><\/p>\n<p><b>Case study:<\/b><span style=\"font-weight: 400;\"> Here we can recall the situation with Kyivstar. There is a golden triangle of cyber defense, which includes technology, processes, and people. If people are not trained, if the human factor is not taken into account, any company can be hacked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Have a cybersecurity policy and specific actions for various incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Pay attention to the cyber hygiene of your team, improve the skills of your technical specialists.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Restrict access to ports that are not in use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Configure firewall rules to allow only necessary traffic.<\/span><\/p>\n<p><b>4. Lack of backups<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Even with the best security, there is always a risk of data loss due to attacks, hardware failures, or administrator error. Lack of backups can have catastrophic consequences.<\/span><\/p>\n<p><b>Case study:<\/b> <i><span style=\"font-weight: 400;\">This is exactly what happened to one of our clients (he became a client after this incident, actually) So, in 2021, OVH&#8217;s data center in Stradburg burned down.<\/span><\/i> <i><span style=\"font-weight: 400;\">The most interesting thing is that the client still thought about backups, although he kept them on the same server in the same data center.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Unfortunately, it was not possible to restore the data, but we dispersed the client&#8217;s entire infrastructure across different geographies and different servers for dedicated tasks.<\/span><\/i> <i><span style=\"font-weight: 400;\">We set up RAID and synchronization with other servers.<\/span><\/i> <i><span style=\"font-weight: 400;\">Now, even in case of a fire, everything will be fine.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Set up regular data backups.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Store backups on separate servers or in cloud storage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Check the integrity of backups and perform test restores.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Check if the backup automation is running at the frequency you want<\/span><\/p>\n<p><b>5. Ignoring data encryption<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Transmitting sensitive data (e.g. passwords, payment information) without encryption makes it easy prey for attackers.<\/span><\/p>\n<p><b>Case in point:<\/b> <i><span style=\"font-weight: 400;\">In 2018, British Airways was fined 183 million pounds due to a data breach of 500,000 customers.<\/span><\/i> <i><span style=\"font-weight: 400;\">Attackers were able to intercept confidential information (credit card numbers, names, addresses) because the data was transmitted without proper encryption on the company&#8217;s website.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use HTTPS protocols to protect data in transit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Encrypt backups, important files, and databases on the server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use SSL\/TLS certificates for websites.<\/span><\/p>\n<p><b>6. Improperly configured access rights<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Granting excessive access rights to users or services can lead to unauthorized access to critical resources.<\/span><\/p>\n<p><b>Case study:<\/b> <i><span style=\"font-weight: 400;\">A client contacted us because of a sudden increase in server load.<\/span><\/i> <i><span style=\"font-weight: 400;\">Malware (a cryptocurrency miner and a remote control program) was detected, and an SSH key of an unknown person was added.<\/span><\/i> <i><span style=\"font-weight: 400;\">After the malware was removed, the attacker regained access through malicious code in the Bash profile and a vulnerable website module.<\/span><\/i> <i><span style=\"font-weight: 400;\">Once these vulnerabilities were fixed, the attacker&#8217;s access was completely blocked.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Follow the principle of minimum privileges (grant only the necessary rights).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Do not concentrate all accesses or pass keys on the accounts of individual employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Regularly check and update access rights.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use separate accounts for different services.<\/span><\/p>\n<p><b>7. Lack of monitoring and logging<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Without proper monitoring and logging, you may not notice suspicious activity or an attack on your server.<\/span><\/p>\n<p><b>Case study:<\/b> <i><span style=\"font-weight: 400;\">A current client came to us with this atypical request.<\/span><\/i> <i><span style=\"font-weight: 400;\">He had some suspicions about the honesty of some of his team members, so he asked us to develop a solution that would help detect any atypical behavior.<\/span><\/i> <i><span style=\"font-weight: 400;\">Monitoring was configured on individual RDPs and when logging into the work server, a bot was immediately triggered to notify the client.<\/span><\/i> <i><span style=\"font-weight: 400;\">Additionally, a ban was set to install any software.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Monitoring helped to identify that one employee was constantly logging into the server after hours.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Set up a monitoring system to track the status of servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Keep event logs and analyze them regularly for anomalies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Use tools for automatic threat detection (e.g., SIEM systems).<\/span><\/p>\n<p><b>8. Round-the-clock support<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Yes, it is difficult to attribute this to errors and it is more of a recommendation. However, a timely response is just as important as all the previous measures. Therefore, if something has already happened, it is very good if the support of your data center or web hosting provider can respond in time. Unfortunately, such giants as Hetzner, OVH, or AWS will simply not be able to answer you in 5 minutes. And if your admin is \u201coffline\u201d, you don&#8217;t have access to the server, then welcome to the club \u201cYour request will be held by responsible employee during his working hours\u201d<\/span><\/p>\n<p><b>Case study:<\/b> <i><span style=\"font-weight: 400;\">This is exactly what we provide to our clients.<\/span><\/i> <i><span style=\"font-weight: 400;\">24\/7\/365 &#8211; fast and high-quality support.<\/span><\/i> <i><span style=\"font-weight: 400;\">It does not matter whether it is day or night, holiday or weekend.<\/span><\/i> <i><span style=\"font-weight: 400;\">Our clients can contact us via live chat on the website and get a response in less than a minute(!).<\/span><\/i> <i><span style=\"font-weight: 400;\">Of course, it all depends on the case and the solution itself may take longer, but if you are hacked and you can&#8217;t do anything yourself, your server will be shut down in 2 minutes and at least no one will get important information from it.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Recommendations:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Set up a monitoring system to track the status of your servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Keep event logs and analyze them regularly for anomalies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2714 Choose hosting based on <\/span><span style=\"font-weight: 400;\">your<\/span><span style=\"font-weight: 400;\"> needs. Not everyone needs market giants. Especially if you have a small infrastructure.<\/span><\/p>\n<p><b>Conclusion.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Security is not a one-time task but an ongoing process. Do not skimp on it, because the cost of possible consequences can be much higher. If you have doubts about your abilities, contact professionals or use the services of reliable hosting providers that offer built-in security and support.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thanks to everyone who read this far: using the promo code<\/span><b> DEV10, <\/b><span style=\"font-weight: 400;\">we offer you a 10% discount on your first order and a <a href=\"https:\/\/unihost.com\/\">free consultation.<\/a><\/span><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/unihost.com\/\" class=\"shortcode button blue large  \">Free consultation<\/a><\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-5935\" data-postid=\"5935\" class=\"themify_builder_content themify_builder_content-5935 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>There may be a bit of triviality somewhere, but in our experience, out of 100 obvious things, a good 20% are always either forgotten or not fully taken care of. This is where small and big problems come from. So let&#8217;s avoid them and make our infrastructure secure! In this article, we&#8217;ll look at both [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":5913,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-5935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-webdev","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The most common mistakes when setting up server or infrastructure security - Unihost.com Blog<\/title>\n<meta name=\"description\" content=\"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most common mistakes when setting up server or infrastructure security - Unihost.com Blog\" \/>\n<meta property=\"og:description\" content=\"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-05T09:28:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T11:36:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"34\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex Shevchuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Shevchuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\"},\"author\":{\"name\":\"Alex Shevchuk\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\"},\"headline\":\"The most common mistakes when setting up server or infrastructure security\",\"datePublished\":\"2025-02-05T09:28:31+00:00\",\"dateModified\":\"2026-03-18T11:36:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\"},\"wordCount\":1486,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg\",\"articleSection\":[\"WebDev\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\",\"url\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\",\"name\":\"The most common mistakes when setting up server or infrastructure security - Unihost.com Blog\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg\",\"datePublished\":\"2025-02-05T09:28:31+00:00\",\"dateModified\":\"2026-03-18T11:36:47+00:00\",\"description\":\"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg\",\"width\":1160,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/unihost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The most common mistakes when setting up server or infrastructure security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/blog\/#website\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"name\":\"Unihost.com Blog\",\"description\":\"Web hosting, Online marketing and Web News\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/blog\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\",\"https:\/\/x.com\/unihost\",\"https:\/\/instagram.com\/unihost\",\"https:\/\/www.linkedin.com\/company\/unihost-com\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\",\"name\":\"Alex Shevchuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"caption\":\"Alex Shevchuk\"},\"description\":\"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/\",\"url\":\"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The most common mistakes when setting up server or infrastructure security - Unihost.com Blog","description":"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/","og_locale":"en_US","og_type":"article","og_title":"The most common mistakes when setting up server or infrastructure security - Unihost.com Blog","og_description":"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.","og_url":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/","og_site_name":"Unihost.com Blog","article_publisher":"https:\/\/www.facebook.com\/unihost","article_published_time":"2025-02-05T09:28:31+00:00","article_modified_time":"2026-03-18T11:36:47+00:00","og_image":[{"width":200,"height":34,"url":"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png","type":"image\/png"}],"author":"Alex Shevchuk","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Alex Shevchuk","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/"},"author":{"name":"Alex Shevchuk","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474"},"headline":"The most common mistakes when setting up server or infrastructure security","datePublished":"2025-02-05T09:28:31+00:00","dateModified":"2026-03-18T11:36:47+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/"},"wordCount":1486,"publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"image":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg","articleSection":["WebDev"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/","url":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/","name":"The most common mistakes when setting up server or infrastructure security - Unihost.com Blog","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage"},"image":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg","datePublished":"2025-02-05T09:28:31+00:00","dateModified":"2026-03-18T11:36:47+00:00","description":"Discover the most common mistakes in server and infrastructure security setup. Learn how to protect your systems effectively and avoid costly errors.","breadcrumb":{"@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#primaryimage","url":"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2025\/01\/security.svg","width":1160,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/blog\/common-mistakes-infrastructure-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/unihost.com\/blog\/"},{"@type":"ListItem","position":3,"name":"The most common mistakes when setting up server or infrastructure security"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/blog\/#website","url":"https:\/\/unihost.com\/blog\/","name":"Unihost.com Blog","description":"Web hosting, Online marketing and Web News","publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/blog\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost","https:\/\/x.com\/unihost","https:\/\/instagram.com\/unihost","https:\/\/www.linkedin.com\/company\/unihost-com"]},{"@type":"Person","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474","name":"Alex Shevchuk","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","caption":"Alex Shevchuk"},"description":"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/","url":"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/comments?post=5935"}],"version-history":[{"count":7,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5935\/revisions"}],"predecessor-version":[{"id":5991,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/5935\/revisions\/5991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media\/5913"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media?parent=5935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/categories?post=5935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/tags?post=5935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}