Getting Started
Cybersecurity Fundamentals
Vulnerability and Threat Information
Cybersecurity Regulations and Standards
CMMC
CMMC Home
CMMC Training
By Level
By Domain
CCRA
About CyberAssist
Contact Us
DIB SCC
Search
Select Page
Microsoft – Security Identifiers
ISACA Journal Article – Data Loss Prevention: Next Steps
Infosecurity Magazine – Inactive Accounts: The Key to Your Company’s Sensitive Data
Microsoft – Regularly check for and remove inactive user accounts in the Active Directory
Microsoft – Configure CMMC Level 2 Identification and Authentication (IA) controls
Identity Automation – Definitive Guide to Account Username Conventions
Open Web Application Security Project (OWASP) – Testing for Default Credentials
NIST SP 800-53: IA-2 Identification and Authentication (Organization Users)
CyberSheath- How Multi-Factor Authentication Protects Your Business
NordLayer – The importance of multi-factor authentication for remote access