Hardening SSH Security: Best Practices for Securing Remote Access