Confronting Security Fears to Control Cyber Risks [Part 1]