Network vulnerability assessments: Scan all, scan often