How Do We Identify Our Digital Vulnerabilities?