Stolen credentials and orphaned accounts can be abused to perform all manner of malicious activity online. Security professionals can enact many strategies to combat this situation.
https://www.securitymagazine.com/articles/96782-critical-infrastructure-cyberattacks-an-impetus-for-identity-first-security