The best security measures are useless if weak credentials are chosen. This raises two essential questions, which I would like [...]