Reducing access risk.
Deactivate unused accounts.
Avoid shared logins.
Review access after role or staffing changes.