This document discusses cyber security threats and recommendations for addressing them. It begins with an overview of the history of threats like Melissa in 1999 and Slammer in 2003. Today's threats are described as persistent, sophisticated, and targeted. The document then outlines the anatomy of a common attack involving phishing emails, drive-by downloads, gaining access to internal networks, and exfiltrating data. It recommends building a strong security foundation with controls and guidelines, developing an incident response plan, and establishing partnerships for assistance in responding to incidents.