6 Steps to Effective Vulnerability Management for Your Technology