Vulnerability scanning: Why does your organization need it?