Stories of compromised servers and data theft fill today's news. It
isn't difficult for someone who has read an informative blog post to
access a system via a misconfigured service, take advantage of a recently
exposed vulnerability or gain control using a stolen password.