Will an IT consultation identify potential threats