Cybersecurity: Myth vs. Fact