Home SecurityNetwork Security 5 steps to avoid credential dumping attacks