From aa954c4807b09a028118d32cea21cf36e851b50b Mon Sep 17 00:00:00 2001 From: Tana M Berry Date: Tue, 24 Oct 2023 16:02:26 -0500 Subject: [PATCH] website/blogs: fixed typo in blog (#7281) typo Co-authored-by: Tana Berry --- website/blog/2023-10-23-another-okta-breach/item.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/blog/2023-10-23-another-okta-breach/item.md b/website/blog/2023-10-23-another-okta-breach/item.md index 105e18b37..ae643167b 100644 --- a/website/blog/2023-10-23-another-okta-breach/item.md +++ b/website/blog/2023-10-23-another-okta-breach/item.md @@ -71,7 +71,7 @@ Cloudflare’s revelation of their communications timeline with Okta shows anoth In their blog about this incident, Cloudflare provides a helpful [set of recommendations](https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/) to users, including sensible suggestions such as monitoring for new Okta users created, and reactivation of Okta users. -Which just takes us back to the rather lean reposnse by Okta; their customers wrote much more informative and helpful responses than Okta themselves. +Which just takes us back to the rather lean response by Okta; their customers wrote much more informative and helpful responses than Okta themselves. ## Keep telling us @@ -87,7 +87,7 @@ The initial breach attempt was noticed by BeyondTrust within only 30 minutes of ## Stay vigilant out there -Lessons learned abound with every breach. Each of us in the software and technology area watch and learn from each attack. In the blog by BeyondTrust, they provide some valuable steps that customers and security teams can take to minimize … +Lessons learned abound with every breach. Each of us in the software and technology area watch and learn from each attack. In the blog by BeyondTrust, they provide some valuable steps that customers and security teams can take to monitor for possible infiltration. Strong security relies on multiple layers, enforced processes, and defense-in-depth policies.