Vulnerability Assessment: 6 Best Steps to Better Security