This is the first of a series of posts on attachment styles, starting with secure attachment. Other posts will outline insecure attachment styles, how they develop, and what can be done to help.