The article discusses security from cyber attacks and data breaches against businesses and preventative methods and strategies for organizations that utilize so-called threat intelligence. Topics include security software for malicious software (malware), information technology (IT) infrastructure, and creating a threat intelligence plan of action.