Failure to safeguard confidential informationControlPeriodic automated vulnerability scans of systems, networks and devices