Safeguarding Your Online Presence: A Guide to Avoiding Common Authentication Vulnerabilities