The danger to your infrastructure isn't in your protocols. Every protocol - yes, even Telnet - has legitimate use cases but you need to consider how to protect them.
SSH is the de facto tool on effectively every system from the last 20 years. But while it's a great tool, it's also the source of many of our problems.
Try Keystrike in Your Environment for 30 Days