A complete inventory is the basis for applying cybersecurity. It also allows devices and systems with known vulnerabilities or security defects to be identified immediately. For example, a recent bulletin from the FDA singled out a specific infusion pump product with weak security that could allow an unauthorized user to control the device and alter the dosage delivered by the pump. By keeping the inventory up to date, it becomes a handy checklist for quickly assessing the need to respond to further device or system information from government agencies and other entities.