How to understand and respond to it security vulnerabilities