Do you know that your assets can cost you lots of money ??
In wrong hand; it can be used to extort money from you.
It could be used to hold you hostage; encrypted or locked while they demand money from you before it can be opened.
Not all of the threat actors will give you access to your assets after you paid the ransome which was demanded from you and all the assets might no longer intact because of encryption and decryption processes.
All your assets should be guided with outmost secrecy. Even the process of password hardening should be totally explained to organisation.
Hakuna Matata .. Derek