Debunking four cybersecurity myths