Install vulnerability scanning software appropriately