Having user accounts with unidentified custodians or no longer in use increases the risk of perpetrators using these user accounts to perform unauthorized activities and it may not be detected.
By sharing user accounts, system-based activities performed by these users may not be traceable to the person’s identity.