Five Steps to Mitigate the Risk of Credential Exposure