Conduct penetration tests to find vulnerabilities.