The does and don't of personal cybersecurity