How to Use IBM’s zERT to Identify Unencrypted Connections