CYBERSECURITY VULNERABILITY ASSESSMENTS: UNMASKING YOUR IT WEAKNESSES