Security Stamping

Consider the following scenario: A user logs on to website with device A and does not log off Perhaps they lose the device e.g. a smart phone The user then panics, logs on to device B (laptop) goes to the website and changes their password The user would hope that device A no longer works […]