We are increasingly dependent on information technology that leaves us vulnerable to cyber threats from actors seeking to influence events through violence, steal trade secrets and intellectual property, or compromise critical infrastructures like SCADA systems that control utilities. While attribution is difficult, states have been implicated in incidents like Stuxnet against Iran and cyberattacks between Georgia and Russia. Individuals and organizations can help manage these risks by not becoming an easy target, obtaining threat intelligence, assuming compromise will occur, and responding appropriately to incidents.