Viruses, malware, and cyber attacks are increasingly sophisticated threats. The document discusses the history of security issues like spam and botnets. It defines common types of malware like rootkits, trojans, and ransomware. The document examines notable data breaches and the most active current malware. It profiles the adversaries behind attacks and the countries most targeted. The anatomy of a hack is outlined, and statistics about breach detection times and costs are provided. Examples show security risks for small businesses and risks of unsecured mobile devices. The document promotes managed security services and assessments to bolster protection beyond antivirus and firewalls alone.