Proactively managing and monitoring the network is part of the protection and vulnerability scans can help the organization identify and fix vulnerabilities /issues discovered before they become exploitable. Scans of the network, servers, applications and myriad of other network components is a good start point.
It is important to form vulnerability scans as part of the network protection because for Every time a computer connects to the Internet, there is a risk of a hacker taking advantage of some new vulnerability. This needle in the cyber-haystack can wreak havoc on networks and computers. Most disconcerting, these vulnerabilities can cause more than annoying pop-ups. They can worm their way into a network and steal proprietary information and other data critical to the profitability of a business. Even the National Institute of Standards and Technology’s Computer Security Division keeps a National Vulnerability Database (NVD) in an effort to help companies prepare against potential attacks. The NVD is sponsored by the Department of Homeland Security’s National Cyber Security Division. As of April 2014, there were more than 50,000 vulnerabilities scored in the NVD.