Once configured, SSH is pretty easy to use. But configuring SSH in a way that takes full advantage of the security advantages it offers is actually quite a task.
Properly configured Public key authentication is much more secure than using passwords. But merely configuring a system with password on authentication to use public key actually weakens rather than improves security: now there are twice as many points to attack. To make a password-only system more secure, you need to stop using passwords altogether and only use the public key scheme for remote access.
If you are a