How to Proactively Harden Your Environment Against Compromised Credentials