Top Five Myths About Securing IoT