In the event of a cyber-attack, one of the first places auditors investigate are ad hoc scripted batch processes as they pose significant areas of weakness.
Such scripts typically fail to provide any central visibility, audit trail or change control, passwords are usually stored in plain text and they are often a single point of failure as they are frequently scripted and managed by one individual.