The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.