This document discusses the various security threats and strategies for internet, mobile, email and cloud technologies. It covers topics such as privacy breaches, malware, phishing, and data loss. The document provides insights into the strategies that can be adopted to safeguard the interests of the users and minimize the threats.