13 IT security myths debunked