https://www.epa.gov/system/files/documents/2023-11/information_security_system_and_communications_protection_procedure.pdf
This example procedure from the EPS facilitates the implementation of security control requirements for the System and Communications Protection control family, as identified NIST SP 800-53.
https://expertinsights.com/insights/the-top-dns-web-filtering-platforms-for-businesses/
A list of web content filtering solutions provided by Expert Insights.
Federal Communications Commission – Voice Over Internet Protocol (VoIP) – Federal Communications Commission
3.13 3.13.14 System and Communications Protection
https://www.fcc.gov/general/voice-over-internet-protocol-voip
This publication from the FCC provides answers to FAQs about VoIP.
https://consumer.ftc.gov/articles/how-secure-your-home-security-cameras
This article describes how to secure and access webcams.
https://www.forcepoint.com/cyber-edu/defense-depth
This article defines defense in depth, and why it's required to protect data.
https://informationsecurityprogram.com/network-security-best-practices/
This article discusses best practices for network security such as network basics, network segmentation, and a network security checklist.
https://www.lifewire.com/secure-your-ip-security-cameras-2487488
This article describes how to secure IP cameras, and methods to controlling access to them.
https://learn.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
This article describes best practices for data security and encryption within Microsoft’s Azure environment.
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/cc732103(v=ws.10)
This document from Microsoft provides step by step directions to enable or disable network bridge within Windows.
https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc700820(v=technet.10)
This article covers the design, deployment, and use of both network and host-based firewalls.