Credential stuffing is the automated use of usernames and passwords that have been obtained through hacking. These hacks can be coordinated by the party carrying out the credential stuffing attack, or hackers can purchase pre-obtained logins from the dark web. In this article, we provide six of the most effective techniques to protect yourself from credential stuffing attacks.