A computer-implemented method includes identifying a primary login platform and identifying one or more security developments associated with the primary login platform. The computer-implemented method further includes determining one or more security corrective actions based on the one or more security developments. A corresponding computer program product and computer system are also disclosed.
展开▼