Cyber Security Myths: ‘Basic cyber-security protocols are enough to protect against possible threats’