He also advised adopting two-step authentication, which involves a personalised "secret number" allocated to users in addition to a username and password, and ensuring that the latest version of Wordpress is installed.
Nevertheless, of the ten workshops put on by the FTC last year identity theft, security, and authentication seem to not have been addressed, although a number of workshops dealt with issues of privacy broadly.
When a number generated by the hackers matched an actual ICC-ID, the authentication page log-in screen was returned to the hackers with the email address associated with the ICC-ID already populated on the log-in screen.