Changing SSH port is OK.. but it's not really the answer. You need to find out HOW they got in.. if it was via SSH, it's not because it was on port 22, it's because something was exploited/username and password guessed etc.
All changing the port does is stop people "stumbling" across the fact that SSH is open. Did they even get in via SSH originally? Or did they exploit another service which then allowed them to login via SSH? Did they even use SSH? Lots of different things to consider.
Anyway, it looks like you've moved to Debian now.. just keep up to date with security.debian.org - apt-get update/apt-get upgrade. Also subscribe to the Debian Security mailing list, so when new packages get uploaded, you can see if you use them and if so, get the upgrade done ASAP.
Of course, even this isn't completely safe, but then.. the only way to fully secure a server is to turn it off.. which isn't always ideal.. so it's the next best thing.
Good choice on choosing Debian!
All changing the port does is stop people "stumbling" across the fact that SSH is open. Did they even get in via SSH originally? Or did they exploit another service which then allowed them to login via SSH? Did they even use SSH? Lots of different things to consider.
Anyway, it looks like you've moved to Debian now.. just keep up to date with security.debian.org - apt-get update/apt-get upgrade. Also subscribe to the Debian Security mailing list, so when new packages get uploaded, you can see if you use them and if so, get the upgrade done ASAP.
Of course, even this isn't completely safe, but then.. the only way to fully secure a server is to turn it off.. which isn't always ideal.. so it's the next best thing.

Good choice on choosing Debian!
