The statement is false because high sensitivity systems often contain critical data or functionality and therefore should be monitored more frequently to ensure vulnerabilities are identified and addressed promptly. However, the scanning process should be designed to minimize the risk of disruption while ensuring these systems maintain a strong security posture. Low sensitivity systems, while still important, might not require the same frequency of scanning, as they may not hold data or functionalities that are critical to the organization's operations or sensitive in nature.