IT vulnerabilities