360 Audits Can Reveal Vulnerabilities in Your IT Infrastructure