Make certain that an idea of separation of duties is applied and reasonable entry controls and account lockout/disabling controls are set up. While a vulnerability does not assurance that an attacker or hacker will focus on your network, it does enable it to be less of a challenge — https://socialaffluent.com/story2453703/the-single-best-strategy-to-use-for-network-security