This document discusses cyber threats and strategies for improving technology security. It covers:
1. Common cyber threats like malware, hacking using passwords, and deception are discussed. Malware was involved in 69% of breaches and hacking 81% of breaches.
2. Cyber criminals' motivations include spamming, DDoS attacks, click fraud, stealing financial credentials and ransomware to extort money. Hacked devices can be used in 36 abusive ways.
3. Effective defenses include threat awareness, moving beyond passwords for authentication, and regularly scanning devices for malware before and after connecting online.