“Hackers”. It is a term that we are all familiar with. Since the dawn of the internet, users’ personal information has been targeted by cyber criminals. Many of whom make a living by stealing and selling account log in information and credentials that may assist in identity theft and intellectual property theft. This article highlights the different ways cyber criminals obtain and sell information. According to Rexxfield, “Information theft, loss, or attack is now the prevalent type of crime against organizations.”. Further, according to the University of Maryland, Every 39 seconds, malicious hackers attack computers and networks. These statistics are quite frankly frightening. However, making yourself familiar with their tactics and tools that they use can help to make you better equipped to defend yourself or your company against an attack. As the article reiterates, hackers will work twice as hard for your credentials if they know that the resources they must use are worth the prize. Our cell phones and accounts offer individual users many options to ensure that our personal data is safe. Changing your password often and utilizing two and multiple factor authentication is crucial in protecting your information. However, no one is immune to potential attacks. What implications do you have in place to ensure that your information is safe and secure?