Enterprise Vulnerabilities that Attract Hackers