A network's security risks change as new assets are added and new vulnerabilities are discovered in the wild. Yet, each vulnerability scan can exclusively identify a moment in time. To keep up with the evolving cyberthreat landscape, organizations conduct scans regularly.
Most vulnerability scans don't look at every network asset in one go because it is resource- and time-intensive. Rather, security teams often group assets according to criticality and scan them in batches. The most critical assets might be scanned weekly or monthly, whereas less critical assets can be scanned quarterly or annually.
Security teams can also run scans whenever major network changes occur, like adding new web servers or creating a new sensitive database.
Some advanced vulnerability scanners offer continuous scanning. These tools monitor assets in real-time and flag new vulnerabilities when they arise. However, continuous scanning isn't consistently feasible or desirable. More intensive vulnerability scans can interfere with network performance, so some IT teams might prefer to hold periodic scans instead.