@nixCraft i will make an admission. one my linux installation got hacked many years ago. basically it was my idiotic mistake. i forgot to shutdown ssh server or firewall it. good news was that it was simplistic ddos attack script.
@nixCraft Years ago a graduate student connected RPi with default password and ssh enabled to our experimental (=fully open) network segment. Someone managed to log in just 23 seconds after his first login. Bad passwords, allowing password authentication and no fail2ban is just as bad idea as it has ever been. Furthermore, most systems could just limit ssh access only from trusted networks, so you need to have to keep better eye to one or few jumphosts for ssh -J jump.example.com (or use VPN).
@nixCraft wemy solution: don't port forward my ssh so unless they connect to my secure network at the exact time I happen to be hosting an ssh seever, which is usually for under a day, and then manage to guess my username and password, I think I'm fine.