Find the Flaws Before Hackers Do – With Vulnerability Assessment and Penetration Testing