A nice article describing some of the steps someone might take to secure their Pi. The list is also relevant for almost any Linux computer/VM. Some of the steps are common sense (change default passwords, set up ssh keys) and others are less so (hardware Watchdog).
Enjoy!