Discussion about this post

User's avatar
Erich Winkler's avatar

Great practical advice as always, Chris.

What I like about tools like Have I Been Pwned is that they don’t scare people. They make risk visible. Once you see your email in a breach list, password reuse stops being abstract and starts feeling real.

The hard lesson most people learn too late is that the breach itself isn’t the problem. It’s the reuse afterwards that causes the real damage.

Anything that shortens the gap between exposure and action is a win.

Tracy Friedlander's avatar

I just need to go through all of your posts and do these things, thank you for making it so simple with each post!

10 more comments...

No posts

Ready for more?