employment computer control network laptop security notebook vulnerability social networking credit pest assessment computer repair verification information security network security check computer security automation exploit