Cybersecurity Best Practices: Declutter to Defend