This document provides an overview of cyber security threats for non-technical executives. It discusses who may target a company's data such as hackers, criminals, and terrorists. It outlines common methods of attack like phishing, ransomware, and malware. The document also considers what data is most valuable to an organization to assess potential damage from attacks. Finally, it recommends actions for protection including implementing security baselines, training, and balancing cyber risks with other business risks.