6 Steps to Protect Against a Data Breach
By
Joe Siegrist
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
4. Follow breaches, and lock out users who have reused passwords. Follow breaches and use leaked password credentials and user names to check your applications. Lock out users who have reused a password that's been leaked publicly. When you lock them out, notify them of this, and how terrible an idea it is to reuse a password and recommend a password manager for them to install.
0 Comments
View Comments
Joe Siegrist
Author's page
Related Content
Comments