{"id":2039,"date":"2025-03-27T11:00:00","date_gmt":"2025-03-27T03:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=2039"},"modified":"2025-10-22T16:52:31","modified_gmt":"2025-10-22T08:52:31","slug":"credential-stuffing-the-hidden-dangers-of-password-reuse","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/","title":{"rendered":"Credential Stuffing: The Hidden Dangers of Password Reuse"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> &gt; <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> &gt; What is Credential Stuffing: The Hidden Dangers of Password Reuse<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1 undefined\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Credential Stuffing: The Hidden Dangers of Password Reuse<\/span><\/h2><p class=\"eb-ah-subtitle\">March 27, 2025<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-1024x538.jpg\" alt=\"What is Credential Stuffing\" class=\"wp-image-2040\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Credential stuffing is a type of cyberattack where hackers use stolen usernames and passwords, typically obtained from a data breach, to gain unauthorized access to user accounts on other websites. This attack relies on the fact that many people reuse the same login credentials across multiple platforms.<\/p>\n\n\n\n<p>Here\u2019s a deeper dive into how credential stuffing works and how you can protect yourself.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Credential Stuffing Works<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Data Breach Acquisition:<\/strong> Attackers obtain stolen login information from data breaches, often through hacking, phishing, or social engineering.<\/li>\n\n\n\n<li><strong>Credential Lists:<\/strong> These stolen credentials are compiled into lists, which are then automated to target various online services.<\/li>\n\n\n\n<li><strong>Automated Attacks:<\/strong> Using specialized software, attackers rapidly attempt to log into accounts on different websites using the stolen credentials.<\/li>\n\n\n\n<li><strong>Account Compromise:<\/strong> If a successful login is achieved, the attacker gains access to the compromised account, potentially leading to identity theft, financial loss, or other harmful consequences.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why Credential Stuffing Attacks Work So Well<\/h2>\n\n\n\n<p>Credential stuffing attacks are surprisingly effective, mainly because they exploit a few key factors related to common weaknesses in user behaviour and website security. Here are the main reasons these attacks are so effective:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Password Reuse:<\/strong> One of the biggest reasons credential stuffing works is that many users <a href=\"https:\/\/lookafter.com\/blog\/why-reusing-passwords-is-a-recipe-for-disaster\/\" target=\"_blank\" rel=\"noreferrer noopener\">reuse the same username and password<\/a> across multiple accounts. When one account is compromised in a data breach, attackers can use the stolen credentials to attempt to log into other accounts associated with the same user.<\/li>\n\n\n\n<li><strong>Automation and Bots: <\/strong>Attackers use automated tools and bots to try thousands, or even millions, of username-password combinations across multiple websites quickly. This automation allows them to test credentials on a large scale with minimal effort, greatly increasing the chances of success.<\/li>\n\n\n\n<li><strong>Widespread Data Breaches:<\/strong> With the increasing number of data breaches, stolen credentials are easily accessible on the dark web or hacker forums. Hackers can buy large lists of credentials and try them on various platforms, hoping to find matches for active accounts.<\/li>\n\n\n\n<li><strong>Weak Password Policies: <\/strong>Credential stuffing thrives on weak password choices. Many users still rely on easily guessable passwords like &#8220;123456&#8221; or &#8220;password&#8221;. Additionally, some organizations fail to enforce strict password policies, allowing users to create weak passwords or avoid regular password changes.<\/li>\n\n\n\n<li><strong>Vulnerable Websites:<\/strong> Websites with inadequate security measures, such as outdated software or weak encryption, are more susceptible to credential stuffing attacks. Additionally, sites that do not implement multi-factor authentication, CAPTCHA checks, or rate-limiting for login attempts are especially vulnerable.<\/li>\n\n\n\n<li><strong>Lack of User Awareness:<\/strong> Many users are unaware of the risks of credential stuffing and continue to use weak or repeated passwords. This lack of awareness makes them vulnerable to having multiple accounts compromised at once, giving attackers more opportunities to succeed.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Consequences of Credential Stuffing<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Account Hijacking:<\/strong> Attackers can take over accounts, lock out legitimate users, and perform unauthorized transactions.<\/li>\n\n\n\n<li><strong>Financial Losses:<\/strong> Credential stuffing can lead to unauthorized purchases, bank fraud, and theft.<\/li>\n\n\n\n<li><strong>Identity Theft:<\/strong> With access to personal information stored in user accounts, attackers can use it for more extensive identity theft schemes.<\/li>\n\n\n\n<li><strong>Reputation Damage:<\/strong> For businesses, a successful credential stuffing attack can harm reputation and trust, especially if customer accounts are compromised.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Yourself from Credential Stuffing<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Use Unique Passwords:<\/strong> Always use different passwords for different accounts. This reduces the risk of multiple accounts being compromised in one attack.<\/li>\n\n\n\n<li><strong>Enable Two-Factor Authentication:<\/strong> This adds an extra layer of security, requiring more than just a password to log in.<\/li>\n\n\n\n<li><strong>Monitor Accounts for Suspicious Activity:<\/strong> Keep an eye on account activity, and report any unauthorized logins or transactions immediately.<\/li>\n\n\n\n<li><strong>Use a Password Manager: <\/strong>Password managers can help you generate and store strong, unique passwords for each account.<\/li>\n\n\n\n<li><strong>Stay Updated:<\/strong> Ensure that you use platforms that regularly update their security protocols to protect against credential stuffing attacks.<\/li>\n<\/ol>\n\n\n\n<p>By understanding credential stuffing and taking proactive steps to secure your accounts, you can better protect yourself from these increasingly common attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.<\/p>\n","protected":false},"author":1,"featured_media":2040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"content\",\"tags\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[31,17],"class_list":["post-2039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-password-security","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Credential Stuffing: The Hidden Dangers of Password Reuse<\/title>\n<meta name=\"description\" content=\"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Credential Stuffing: The Hidden Dangers of Password Reuse\" \/>\n<meta property=\"og:description\" content=\"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-27T03:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T08:52:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Credential Stuffing: The Hidden Dangers of Password Reuse\",\"datePublished\":\"2025-03-27T03:00:00+00:00\",\"dateModified\":\"2025-10-22T08:52:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg\",\"keywords\":[\"Password Security\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\",\"url\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\",\"name\":\"Credential Stuffing: The Hidden Dangers of Password Reuse\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg\",\"datePublished\":\"2025-03-27T03:00:00+00:00\",\"dateModified\":\"2025-10-22T08:52:31+00:00\",\"description\":\"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Credential Stuffing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Credential Stuffing: The Hidden Dangers of Password Reuse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Credential Stuffing: The Hidden Dangers of Password Reuse","description":"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/","og_locale":"en_US","og_type":"article","og_title":"Credential Stuffing: The Hidden Dangers of Password Reuse","og_description":"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.","og_url":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2025-03-27T03:00:00+00:00","article_modified_time":"2025-10-22T08:52:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Credential Stuffing: The Hidden Dangers of Password Reuse","datePublished":"2025-03-27T03:00:00+00:00","dateModified":"2025-10-22T08:52:31+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/"},"wordCount":677,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg","keywords":["Password Security","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/","url":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/","name":"Credential Stuffing: The Hidden Dangers of Password Reuse","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg","datePublished":"2025-03-27T03:00:00+00:00","dateModified":"2025-10-22T08:52:31+00:00","description":"Credential stuffing is a common cyberattack that exploits reused passwords. Learn about its dangers and how to protect yourself.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2025\/01\/Credential-Stuffing.jpg","width":1200,"height":630,"caption":"Credential Stuffing"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/credential-stuffing-the-hidden-dangers-of-password-reuse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Credential Stuffing: The Hidden Dangers of Password Reuse"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=2039"}],"version-history":[{"count":4,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2039\/revisions"}],"predecessor-version":[{"id":2045,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2039\/revisions\/2045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/2040"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=2039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=2039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=2039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}