When 3 A.M. Becomes a Security Reminder

Old accounts aren’t just clutter; they’re risks. Here’s how a 3 a.m. alert reminded me why Identity and Access Management matters, even at home.

At 3 a.m., I woke up to one of those alerts no one likes to see: an old account of mine on a platform I hadn’t touched in years first showed a failed password attempt, then a successful password change. I had assumed I’d already closed out every account on that platform, but one slipped through. To make things more interesting, it was tied to an email address I rarely use anymore but still monitor. (The good news? That email account does have MFA, so at least the “old gatekeeper” was locked up properly.)

The account itself was created before multi-factor authentication (MFA) became common. While MFA existed in earlier forms: like bank cards and PINs. It wasn’t until the early 2010s that companies such as Google and Microsoft made it mainstream. This account came from that “pre-MFA” era, when added security wasn’t yet the default.

I wasn’t surprised. I knew exactly what was happening and why. Dormant accounts are often the easiest targets. They don’t benefit from modern security updates, they’re rarely monitored, and they usually lack protections like MFA. Attackers count on people forgetting about them. That’s why I immediately deleted the account. But I didn’t stop there. I used the moment as a checkpoint to scan through my digital footprint. I started identifying other accounts I no longer used and deleted them, too. By eliminating unnecessary accounts, I was reducing my attack surface, the total number of doors and windows an attacker could try to get through.

This kind of cleanup is part of a major area of cybersecurity called Identity and Access Management (IAM). IAM is all about making sure the right people have the right access to the right systems, and just as importantly, that people don’t keep access they no longer need. Within IAM, there’s a concept called Account Lifecycle Management. Think of it like the life story of an account: it’s created, it’s used, and eventually, it should be closed when it no longer serves a purpose. The problem is, many people never get to that last step. That’s how old, forgotten accounts become dangling threads for attackers to pull on.

This ties directly into three important risk concepts: risk avoidance, risk acceptance, and risk appetite.

Risk Avoidance is choosing to remove a potential threat altogether. For me, shutting down unused accounts was risk avoidance in action. If I don’t need it, I don’t keep it.

Risk Acceptance is understanding that some risk will always exist. Even with MFA and strong passwords, nothing online is completely risk-free. I accept that reality, because the benefits of living and working online far outweigh the risks of disconnecting.

Risk Appetite is about how much risk you’re willing to live with. Everyone has a different threshold. I have a very low appetite for keeping old accounts around. The value just isn’t there compared to the exposure they create.

That 3 a.m. alert didn’t surprise me; it reinforced something I already practice: dormant accounts are liabilities. They’re outdated, unmonitored, and exactly the kind of low-hanging fruit attackers go after.

My advice is simple: do your own IAM check-up. Audit your accounts. Keep the ones you use, secure them with MFA and strong passwords, and close the ones that are gathering dust. You don’t leave every door in your house unlocked just because you’re not using it. Don’t do it with your digital life either.

Leave a comment

I’m Aqueelah

Cybersecurity isn’t just my profession, it’s a passion I share with the most important person in my life: my daughter. As I grow in this ever-evolving field, I see it through both a professional lens and a mother’s eyes, understanding the critical need to protect our digital spaces for future generations.


Read about my mission to combat job scams

Scammers are targeting job seekers with increasing sophistication. I developed a Zero Trust-based framework: Project TRUSThire and submitted it to NIST to help protect digital hiring. Learn what this means for cybersecurity and community safety.

Read the Article

🎧 Listen to the CyberMom Plus One Podcast!

Disclaimer:

“I bring my background in cybersecurity and motherhood to everything I share, offering insights grounded in real experience and professional expertise. The information provided is for general educational purposes only and is not a substitute for personalized legal, technical, or consulting advice.
AQ’s Corner LLC and its affiliates assume no liability for actions or decisions taken based on this content. Please evaluate your own circumstances and consult a qualified professional before making decisions related to cybersecurity, compliance, or digital safety.”
.wp-block-site-title a { color: #3ABAEB !important; transition: color 0.3s ease; } .wp-block-site-title a:hover { color: #E967B8 !important; }