A system for protecting against information security breaches comprises a
credential module that maintains a list of protected security credentials
that are each associated with a known computing system and that detects
when a security credential in the list is used. The system also includes
a protection module that detects use of the security credential in
connection with a computing system other than the known computing system
with which the security credential is associated and that reports such
use to a security server. Methods for using the system are also provided.