Cybersecurity Best Practices Part 1 - Preventing Opportunistic Attacks in 5 Easy Steps