FIND THE FLAWS BEFORE HACKERS DO – WITH VULNERABILITY ASSESSMENT AND PENETRATION TESTING