{"id":9269,"date":"2019-02-26T12:39:00","date_gmt":"2019-02-26T12:39:00","guid":{"rendered":"https:\/\/www.realvnc.com\/en\/?post_type=blog&#038;p=9269"},"modified":"2022-05-06T10:49:26","modified_gmt":"2022-05-06T10:49:26","slug":"4-ways-to-protect-yourself-from-credential-stuffing","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/","title":{"rendered":"4 ways to protect yourself from credential stuffing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9269\" class=\"elementor elementor-9269\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7040ac2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7040ac2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ce58896\" data-id=\"4ce58896\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46e84526 elementor-widget elementor-widget-text-editor\" data-id=\"46e84526\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Because credential stuffing is becoming increasingly popular, in this post we\u2019ll take a look at it more closely, and we\u2019ll give you a few tips on what you can do to protect yourself from it.<\/p><h2>What is credential stuffing?<\/h2><p>The term credential stuffing started making the headlines in recent years following a series of major data breaches that that revealed the login credentials of a staggering numbers of users. For example, in\u00a0two separate\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Yahoo!_data_breaches\" rel=\"noopener\">Yahoo! data breaches<\/a>, the details of a combined 1.5 billion Yahoo! users were compromised in 2016 (yep, that\u2019d be about 20% of the Earth\u2019s population).<\/p><p>Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks (such as those that were part of the Yahoo! breach).<\/p><p>When a breach occurs, the lists of compromised accounts are often made available on some less-than-reputable areas of the internet, like the dark web, either for free or for a fee. Once criminals have their hands on the information they can use it to organize a credential stuffing attack.<\/p><p>Using either an automatic script that they\u2019ve written, or ready-made software that they\u2019ve bought off the shelf, the criminals employ a botnet of infected computers under their control to try to automatically log into all accounts for which they have the credentials.<\/p><p>Each attempt looks legitimate because they are using genuine credentials that might still be valid. Typically only about 0.1-0.2% of the total login attempts are successful, but if the list of stolen credentials is large enough, this can still amount to thousands of matching accounts.<\/p><p>Once attackers have access to these accounts, they drain them of anything they find valuable, such as gift vouchers, credit card numbers, and other private information that they can also use for other nefarious activities (spamming, identity theft\u2026 you name it!<\/p><p>The threat from credential stuffing is amplified by the fact that most times, an email and password is everything they need to log into someone\u2019s account. And if, like many people, you use the same password for multiple accounts, you\u2019re leaving yourself especially vulnerable to this kind of attack if your credentials are leaked.<\/p><p>Successful credential stuffing attacks can make multiple victims: the users who got their data stolen, but also the companies or websites that have to deal with sudden mass login attempts. \u00a0During a credential stuffing attack, the number of attempted logins can increase dramatically, to the point of outnumbering the number of legit attempts from real customers.<\/p><p>Because the company\u2019s computer systems are often not equipped for dealing with such a high volume of logins, genuine users may find that they can\u2019t access their accounts, or that the website is unresponsive.<\/p><h2>How can you protect yourself from credential stuffing?<\/h2><p>Companies can protect against credential stuffing by regularly reviewing their security procedures and applying measures at a system level, such as blacklisting IP addresses and analyzing browser information for discrepancies in logins.<\/p><p>As an individual, the precautions you can adopt to avoid falling victim to this type of cyberattacks are much simpler. These measures will only take you a few minutes and are part of any good computer security routine and, as a bonus, they don\u2019t just protect you against credential stuffing, but other security risks, too!<\/p><h2>1)\u00a0Use a unique password for every account<\/h2><p>The first and most important step you can take to keep your accounts secure is pretty basic: do not reuse your passwords. If each of your passwords is unique and details of one account are revealed, hackers won\u2019t be able to use credential stuffing on your other accounts.<\/p><p>The reason why most people don\u2019t bother making up a new password every time they create an account is because they have too many to remember them all (and given that the\u00a0<a href=\"https:\/\/tech.co\/news\/average-person-100-passwords\" rel=\"noopener\">average person has 100 passwords<\/a>\u00a0to keep up with, it would be a rather difficult feat).<\/p><p>If you also struggle with managing so many accounts, instead of reusing your password you should get a password manager that will help you create random, unique passwords and store your credentials. Because password management software can be accessed with one &#8220;master&#8221; password, that is all you will need to remember to unlock the credentials store in the database. Just make sure it\u2019s something more complex than\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/is-security-worth-the-headache\">the name of your family pet.<\/a><\/p><h2>2) Make sure you haven\u2019t been hacked before<\/h2><p>To check whether your email address has been compromised in a data breach, you can a data leak checker like\u00a0<a href=\"https:\/\/haveibeenpwned.com\/\" rel=\"noopener\">haveibeenpwned<\/a>\u00a0or\u00a0<a href=\"https:\/\/cybernews.com\/personal-data-leak-check\/\" rel=\"noopener\">Cybernews personal data leak check<\/a>. They are helpful resources that keep a regularly updated record of data breaches around the world and can tell you if your accounts have been compromised.<\/p><p>A data leak checker\u00a0will also send you an email as soon as you become victim of a cyberattack, so you can change the relevant passwords to protect yourself.<\/p><h2>3)\u00a0Use multi-factor authentication<\/h2><p>If a software or a website give you the chance of securing your account by enabling\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/why-is-multi-factor-authentication-so-important-to-remote-access\">multi-factor authentication (MFA)<\/a>, take it!<\/p><p>With MFA, if you want to log in to your account you\u2019ll need not just your username and password, but you also at least one other piece of information, such as a code sent to your phone. This way, even if your user details and password are compromised, any attacker would still not be able to access your account because they haven\u2019t got your other credentials.<\/p><h2>4) Delete your old accounts<\/h2><p>Remember the Yahoo! data breach we mentioned earlier in this post? Chances are that if you heard of it in the news, you also remembered that as some point you did have an account with them that you haven\u2019t used in ages. This is a perfect example of why you should always deactivate any account you are no longer using.<\/p><p>The more accounts you have open, the more you are exposed to risks, especially if your password-creation approach has been &#8211; how shall we put it? &#8211; neglectful.<\/p><p>A combination of these measures should go a long way to protect you from falling victim to a credential stuffing attack, or at least limiting the damage if you happen to be unlucky.<\/p><hr \/><p>Cybercriminals are always looking for new ways to breach your security and are becoming increasingly inventive and sneaky.<\/p><p>If you\u2019re concerned about credential stuffing, or any other cybersecurity threat, check out these articles for more ideas about\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/7-ways-social-engineering-can-get-you-hacked\">how to avoid becoming a victim of hackers<\/a>\u00a0and how to avoid\u00a0<a href=\"https:\/\/discover.realvnc.com\/blog\/is-security-worth-the-headache\">cybersecurity fatigue<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Have you ever heard of credential stuffing? If not, it\u2019s understandable: with so many different threats to online security, it\u2019s hard to keep track of the latest techniques used by cybercriminals to get hold of your confidential data.  <\/p>\n","protected":false},"author":19,"featured_media":9252,"template":"","blog_category":[],"class_list":["post-9269","blog","type-blog","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 ways to protect yourself from credential stuffing<\/title>\n<meta name=\"description\" content=\"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 ways to protect yourself from credential stuffing\" \/>\n<meta property=\"og:description\" content=\"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-06T10:49:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"693\" \/>\n\t<meta property=\"og:image:height\" content=\"462\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/\"},\"author\":{\"name\":\"David\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\"},\"headline\":\"4 ways to protect yourself from credential stuffing\",\"datePublished\":\"2019-02-26T12:39:00+00:00\",\"dateModified\":\"2022-05-06T10:49:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/\"},\"wordCount\":1100,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Credentials.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/\",\"name\":\"4 ways to protect yourself from credential stuffing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Credentials.jpg\",\"datePublished\":\"2019-02-26T12:39:00+00:00\",\"dateModified\":\"2022-05-06T10:49:26+00:00\",\"description\":\"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Credentials.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Credentials.jpg\",\"width\":693,\"height\":462,\"caption\":\"Credentials\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/4-ways-to-protect-yourself-from-credential-stuffing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"4 ways to protect yourself from credential stuffing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/c61fa30b0c79c5b2c0f969f1882547f6\",\"name\":\"David\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g\",\"caption\":\"David\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 ways to protect yourself from credential stuffing","description":"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/","og_locale":"en_US","og_type":"article","og_title":"4 ways to protect yourself from credential stuffing","og_description":"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2022-05-06T10:49:26+00:00","og_image":[{"width":693,"height":462,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/"},"author":{"name":"David","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6"},"headline":"4 ways to protect yourself from credential stuffing","datePublished":"2019-02-26T12:39:00+00:00","dateModified":"2022-05-06T10:49:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/"},"wordCount":1100,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/","url":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/","name":"4 ways to protect yourself from credential stuffing","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","datePublished":"2019-02-26T12:39:00+00:00","dateModified":"2022-05-06T10:49:26+00:00","description":"Credential stuffing happens when cybercriminals get hold of lists of user credentials and corresponding passwords that have been leaked in previous cyberattacks. This is what you can do to prevent it from happening.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2022\/03\/Credentials.jpg","width":693,"height":462,"caption":"Credentials"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/4-ways-to-protect-yourself-from-credential-stuffing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"4 ways to protect yourself from credential stuffing"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/c61fa30b0c79c5b2c0f969f1882547f6","name":"David","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82337a5edd1c9eec63a13ba874c629259c5d644575cd7ee90f038aa7d567d394?s=96&d=mm&r=g","caption":"David"}}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/9269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/19"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/9269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/9252"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=9269"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=9269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}