Logging in via SSH is completely insecure; hackers can gain access to your systems via a network by eavesdropping on the network traffic, posing as you.
One simple matter of fact in the networking world is that all connections have to be encrypted — from your laptop’s Internet connection to the Ethernet cable. Similarly, the data that travels over these connections needs to be encrypted as well. There are also a number of encryption standards that enable both encryption and authentication