This document discusses internet security and cybercrime. It begins with an introduction by Sam Lumpkin of 2AB, Inc and then covers the following topics: how different groups view security (management, users, hackers); examples of security breaches and headlines; how common unauthorized access is; what hackers can do; why companies should care about security; how to begin securing a network; implementing security through awareness, physical controls, electronic access controls, access authorization, policy, and logging; and enforcing security policies.