I'm about to install a new ubuntu server after having this virus https://askubuntu.com/questions/1115770/crond64-tsm-virus-in-ubuntu .
When installing the new VPS I'm going to install clamav and follow these protection tips: https://www.eurovps.com/blog/20-ways-to-secure-linux-vps/
Is it enough or are there any other tips in general or specifically to this virus that I should apply to the new VPS?
Thanks
Should you actually be compromised, the most important thing is to do is to do a comprehensive root cause analysis. See the canonical question on this topic: How do I deal with a compromised server? Look at what processes and technical controls failed, for every system. This will be time consuming, but worthwhile to not make those mistakes again.
Once you have lessons learned, yes rebuilding from a clean known good operating system is a reasonable thing to do.
And so on. There is more to security, but this hygiene stuff is a large part of it.
Some of EuroVPS's advice is flawed.
IPv6 should be enabled.
Password complexity of alphanumeric special is obsolete. NIST 800-63B says allow very long passwords, disallow dictionary words and previous breach corpuses, but do not impose alphanumeric special requirements. The latter is easy for computers to crack, but difficult for humans to remember.
I don't see the point of changing the ssh port. You can to avoid some of the brute force scanning noise. But it doesn't really matter if you secure your ssh keys, don't use passwords, and ban misbehaving IPs at the firewall.