Cyber Security Lessons From The Cuckoo's Egg