The importance of performing network-based vulnerability scans