Vulnerabilities in IT Analytics