Avoid The Top Five Breach-Inducing Mistakes and Mitigate Log4Shell Risk