1. Inconvenience: Legitimate users may be temporarily locked out, causing delays in accessing critical information. 2. Resource Intensive: Requires continuous monitoring and maintenance by IT staff. 3. False Positives: Legitimate login attempts might be flagged as suspicious, leading to unnecessary lockouts.