How to Protect Your Identities and Applications from Becoming the Next Attack Vector