Some users will provide their password to a stranger who says he is from their company's IT department.

A critical factor in selecting monitoring software is to ensure it is not tied to any one vendor. Effective security requires an independent program able to monitor data flowing from and to any application, irrespective of format, vendor or version.

It is possible to track a user's actions on a corporate network, but it is not possible to be 100% sure that the person logged in is the user who was assigned the identity.