From 89ee966607d29d3351f0ca2fa00d7e8f17698189 Mon Sep 17 00:00:00 2001 From: Tana Berry Date: Tue, 24 Oct 2023 14:45:34 -0500 Subject: [PATCH] typo --- website/blog/2023-10-23-another-okta-breach/item.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/blog/2023-10-23-another-okta-breach/item.md b/website/blog/2023-10-23-another-okta-breach/item.md index 105e18b37451..ae643167bf71 100644 --- a/website/blog/2023-10-23-another-okta-breach/item.md +++ b/website/blog/2023-10-23-another-okta-breach/item.md @@ -71,7 +71,7 @@ Cloudflare’s revelation of their communications timeline with Okta shows anoth In their blog about this incident, Cloudflare provides a helpful [set of recommendations](https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/) to users, including sensible suggestions such as monitoring for new Okta users created, and reactivation of Okta users. -Which just takes us back to the rather lean reposnse by Okta; their customers wrote much more informative and helpful responses than Okta themselves. +Which just takes us back to the rather lean response by Okta; their customers wrote much more informative and helpful responses than Okta themselves. ## Keep telling us @@ -87,7 +87,7 @@ The initial breach attempt was noticed by BeyondTrust within only 30 minutes of ## Stay vigilant out there -Lessons learned abound with every breach. Each of us in the software and technology area watch and learn from each attack. In the blog by BeyondTrust, they provide some valuable steps that customers and security teams can take to minimize … +Lessons learned abound with every breach. Each of us in the software and technology area watch and learn from each attack. In the blog by BeyondTrust, they provide some valuable steps that customers and security teams can take to monitor for possible infiltration. Strong security relies on multiple layers, enforced processes, and defense-in-depth policies.