SSH is a protocol that allows two machines to communicate securely. A client connects into a server, in a similar way to how your browser connected to a server to receive this content before displaying it on your screen. SSH secures traffic by encrypting it. Other protocols, like Telnet and HTTP, do not. As you likely know, HTTPS does, which is why it is preferred over HTTP.
SSH isn’t perfect though, and it depends on users to keep its servers secure.
Try SSHing into your home networking devices and find out if they respond. Imagine how many computers, devices, and machines at work have SSH servers running. Then get out there and secure them.
Come back soon for the next item in our series and, in the meantime, check out our write up on implants and supply chains.