The paper covered the seven most common ways cyber attacks occur: Malware, Emotet, Denial of Service, Man in the Middle, Phishing, SQL injection, and Password Attacks. Each attack accomplishes different goals in different ways, such as data theft, ransomware, or denial of services. The article also touched upon two new changes in the field of cyber security: total connectivity and the explosion of data. First, major companies like apple have been trading conveniance for security by connecting various devices to one network. This allows attackers to breach multiple devices at once. Second, due to an explosion in the amount of data, it is ever more important for companies to remain secure.