theres 2 further things you can do to enhance ssh security:
switch to public key only ssh logins as detailed here: How do you setup ssh to authenticate using keys instead of a username / password?How do you setup ssh to authenticate using keys instead of a username / password?
then you can restrict SSH logins to specific IP's as detailed here: how to restrict ssh login to a specific ip or hosthow to restrict ssh login to a specific ip or host
if those methods are setup correctly then to get in, someone needs to connect from your IP address with your private key file