Cyber-vetting’s Usage, Risk, and Future