What should I do if the cloud host is hacked?
1. Change the password of the system administrator account, the password length is not less than 8 digits and the combination of uppercase letters/lowercase letters/digits/special characters is used;
2. Change the remote login port and enable the firewall to restrict the IP that is allowed to log in. The firewall configuration only opens specific service ports and performs source IP access control for FTP, database and other services that do not need to be open to all users; and grep to find out.