The document discusses targeted cyber attacks and the dangers they pose to organizations. It notes that many organizations wrongly assume they will not be targeted, but that all organizations have confidential information worth stealing. Successful targeted attacks can allow thieves to access and steal sensitive internal data. Examples given include industrial espionage, where documents were stolen by hacking a database server, and spying by hacking an ex-partner's online accounts. The results of cyber attacks can include financial losses and damage to credibility for victims.