This document discusses different types of hackers: black hat hackers who perpetrate crimes for financial gain or other nefarious goals; green hat hackers who are new to hacking; white hat hackers who try to stop black hat hackers through ethical hacking; and grey hat hackers who are in between good and evil. It also outlines some ways to protect company data from breach, including using firewalls for web applications, encrypting data, blocking unnecessary sites and limiting access, choosing the right internet service provider (ISP), and changing passwords regularly.