Using multiple layers of security, and monitoring to remove single points of failure for security.
- Using password authentication for accounts.
- Monitor number of denied logins, conservatively blocking clients that fail to log in repeatedly.
- Monitor logins for suspicious activity, and block judiciously.
- Monitor suspected compromised accounts.