Endpoint Technologies ' Kay want to have just one or two individuals responsible for the account, they should be named individuals, so that if there’s a problem, Roger Kay can go to those people. Tim Junio, a cybersecurity fellow at Stanford University’s Freeman Spogli Institute for International Studies, also highlighted the risks posed by weak passwords.