Do IT consultations include vulnerability scanning