Security Vulnerabilities For Research Businesses