Securing Your Systems: The Top 5 Vulnerabilities You Must Know