Numerous organizations maintain active accounts that have not been used for a long time.
The lack of records could complicate the identification of unauthorized access to customer networks during that two-week period.