User gaining unauthorised access to IT systems