New vulnerabilities are continually uncovered, and systems are configured or used in ways that make them open to attack.