Implement a server-side check to ensure the new password is different from the current one.
testing data for events
1. Suspicious Activities Monitoring- Continuously monitor for abnormal or unauthorized activities to detect potential security threats promptly
2. Remote Logging- Centralize logging from distributed systems for unified visibility and enhanced security monitoring