Compromised credentials are at the root of many intrusions, but there are ways to reduce the threat from stolen credentials.