Summary
In this chapter, you learned to prevent users from sharing corporate credentials with external parties either by reusing their corporate username and password on a web resource that was not approved for that use (for example, social media) or by phishing attacks that try to get users to submit their credentials on a malicious site.
In the next chapter, we will take a practical approach to troubleshooting and we will review which steps are needed to find the root cause of some common issues.