Skip to content

Preventing Compromises / Controlling Access Privileges

Content in this post includes recommendations and suggestions for password creation and management as well as information on training materials available to the GW community.  This resource guide is presented as part of the Cybersecurity is a Shared Responsibility awareness campaign.  The GW IT Security team provides these posts to support increased awareness and knowledge across all stakeholder groups.  The principle the posts follow is that cybersecurity is a shared responsibility for all users.  Suggestions on content, areas of focus, or to arrange team training should be directed to infoec@gwu.edu.

Persistent cyber-attacks target personal, organizational, and system accounts.  The resources and training modules below are designed for various technical knowledge levels.  Some resources including some training modules may require access to restricted content.  Access restrictions for any sites requiring access will be noted.  External links to sites not controlled by GW will also be noted with an external link notation.  Details on organizations providing the external materials are listed at the bottom of this article in the event you are not familiar with the acronym or function.

Password Strength and Complexity Resources, Articles, and Guidance

Increased understanding of the need for strong and complex passwords as well as emerging security technologies is critical to ensuring your data and access to your systems and services are secure.

Password Managers

Password managers are applications used to store passwords.  Generally, provide a convenient place to store all of your passwords, requiring you only remember the password manager master password.  These solutions can be installed on devices, access through cloud services, and/or integrated into web browsers.  They provide convenience of only remembering one password to access a tool that contains all of your unique passwords.

The Best Password Managers | PCMag – External Content Hosted by PCMag

Training Modules

The following modules are available to faculty and staff through GW’s Talent@GW system.  Search for training titles in the Learning -> Browse for Training menu after logging into Talent@GW.  Managers can assign training to staff through the Talent@GW system as well.

Creating Strong Passwords - Security Awareness Training

Audience – Introductory Level of Technical Knowledge

Talent@GW Search Term - Password Security

Content Provider and Location:  KnowBe4 Module  Accessed Through Talent@GW

Privileged User Security Series: Privileged Access (8 minutes)

Audience – Intermediate Level of Technical Knowledge Required

Talent@GW Search Term  -Privileged Access

Content Provider and Location:  KnowBe4 Module  Accessed Through Talent@GW

Privileged User Security Series: Secure Windows Administration (15 minutes)

Audience – Intermediate to Advanced Level of Technical Knowledge Required

Talent@GW Search Term - Secure Windows Administration

Content Provider and Location:  KnowBe4 Module  Accessed Through Talent@GW

Privileged User Security Series: Secure Linux Administration (15 minutes)

Audience – Intermediate to Advanced Level of Technical Knowledge Required

Talent@GW Search Term - Secure Linux Administration

Content Provider and Location:  KnowBe4 Module  Accessed Through Talent@GW

Privileged User Security Series: Secure Database Administration (15 minutes)

Audience – Intermediate to Advanced Level of Technical Knowledge Required

Talent@GW Search Term - Secure Database Administration

Content Provider and Location:  KnowBe4 Module Accessed Through Talent@GW

 

Securing Windows Server 2016: Managing Privileged Identities (1 hour 7 minutes)

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2016

Content:  LinkedIn Learning Module Accessed Through Talent@GW

Securing Windows Server 2016: Server Hardening Solutions

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2016

Content:  LinkedIn Learning Module Accessed Through Talent@GW

Securing Windows Server 2019

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2019

Content:  LinkedIn Learning Module Accessed Through Talent@GW

 

Securing Windows Server 2016: Managing Privileged Identities (1 hour 7 minutes)

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2016

Content:  LinkedIn Learning Module Accessed Through Talent@GW

Securing Windows Server 2016: Server Hardening Solutions

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2016

Content:  LinkedIn Learning Module Accessed Through Talent@GW

Securing Windows Server 2019

Audience – Advanced Level of Technical Knowledge Required

Talent@GW Search Term – Server 2019

Content:  LinkedIn Learning Module Accessed Through Talent@GW

Password Guidance and Reference Materials Sources and Organizations

CISA https://www.cisa.gov/ - CISA is the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience. We are designed for collaboration and partnership. Learn about our layered mission to reduce risk to the nation’s cyber and physical infrastructure.

ISACA  https://www.isaca.org/about-us  - As a globally recognized leader in IS/IT for over 50 years, ISACA is a professional membership organization committed to the advancement of digital trust by empowering IS/IT professionals to grow their skills and knowledge in audit, cybersecurity, emerging tech and more.

SANS sans.org launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place.