Almost every large company is being bombarded with cyber-attacks all day, every day.
About one million new malicious programs are created every day, according to security firm Symantec. That is a lot to defend against - and that does not include the many other ways attackers try to get at their targets.
Some attacks are crude and are easy to defend against. Others are more cunning and try to trick people into opening booby-trapped email messages. The most dangerous attacks exploit security holes that most people have not discovered yet in widely-used software.
Surely companies have defences that can stop attacks?
On average companies use 75 separate cyber-defence systems to police their networks. However, these systems can deliver an overwhelming number of alerts and warnings to security staff.
Worse still, it is often hard for companies to correlate the information provided by each separate system, says Darren Thomson, European technology boss at security firm Symantec. This can mean security teams spend time chasing false positives or problems that look serious but are not the current biggest threat they face.
And technology cannot always help if somebody in an organisation opens a booby-trapped attachment on a phishing email.
Many attackers are increasingly exploiting human frailty because cyber-defences seem to have improved far faster than people.
And even the best security is weakened if a company insider decides to betray their employer.
What happened to TalkTalk ?
Details are scant but it looks like there were two elements to the breach.
The first was a distributed denial of service (DDoS) that tried to knock over TalkTalk's servers by hitting them with lots of data.
There are hundreds if not thousands of these kinds of attacks every day, says Roland Dobbins from Arbor Networks, a company that helps firms block the massive data flows.
These attacks simply try to knock sites offline. Often, says Mr Dobbins, they can be used as a smokescreen to distract security staff from other activity. Other groups have used them to steal cash or data.
The DDoS assault on TalkTalk seems to have been accompanied by another attack which sought to get at its customer database. That is why the company has warned that personal information might have been accessed.
But TalkTalk has been hit three times...
Many companies now prepare for the day they will be breached rather than expect technology to keep them safe and secure all the time.
Often attackers can get into a corporate network using stolen staff credentials but that just gets them a foothold. From there they need to explore, expand and gather network privileges that help them get at the data they really want to steal.
The length of time it can take to realise that a breach has taken place gives attackers a long time to bed in, explore and escalate their access. Companies are getting better at spotting that anomalous behaviour but the advantage often still lies with the attackers.
Many companies employ ethical hackers to test their security systems and properly encrypting customer data helps ensure any stolen information is useless to attackers, or expensive to sell.
TalkTalk will have questions to answer if it emerges that hackers were able to steal unencrypted customer information.