The document discusses various security threats posed by new technologies, and proposes potential solutions to address them. These threats include keyboard loggers stealing passwords, iPods and other removable storage downloading corporate data without permission, personal information being shared over peer-to-peer networks, and Trojan horses stealing bank details. Proposed solutions involve restricting or banning potentially risky technologies and educating users and companies about more secure practices.