There are a lot of reasons, it appears, to avoid vulnerability scanning – and most of them have some variation of laziness at their root. It takes too long. It costs too much. I don’t have time. And on and on. The fact is that there are far more reasons to perform vulnerability assessment than there are not to. Probably the most missed target for vulnerability scanning is also the most typically vulnerable – the low-hanging fruit of end- point devices. That includes mobile devices. Wouldn’t it be great if a user could perform a vulnerability check or a check for personally identifiable information (PII) or credit card information on demand, investing a total of a minute or so and a cost of just pennies? Or, even better, what if that user’s employer performed the check automatically in such a way that it would be completely unobtrusive and still very inexpensive? Now, with iScan, an innovative cloud application, you can do exactly those things and for, as the founder told me, less than the cost of a Chicken McNugget.