We rely upon our information technology and electronic infrastructure and its capacity, reliability, and security in connection with various and critical aspects of our business activities. We also rely on our ability to expand and continually update these technologies and related infrastructure in response to the changing needs of our business and the risks presented. We face challenges related to supporting our older technologies and implementing necessary upgrades and the hardening of current technologies. In addition, some of these technologies are managed by third-party service providers and are not under our direct control. If we experience a problem with a critical technology, including during upgrades or new technology implementations, any resulting disruptions could have an adverse effect on our business operations and our performance.
Our business operations rely upon our electronic infrastructure and that of our third-party vendors, including to handle information and data such as intellectual property, personal information, protected information, financial information and other confidential and proprietary information related to our business and our employees, prospects, customers, suppliers and other business partners. While we maintain certain administrative, technical, and physical safeguards and take preventive and proactive measures to combat known and unknown cybersecurity risks, our work and processes to build out and mature our electronic infrastructure, controls, policies and safeguards is ongoing. There is no assurance that our current controls and our ongoing efforts will be sufficient to eliminate security risks.
Cyberattacks are increasing in frequency and evolving in nature. We and our third-party providers are at risk of attack through use of increasingly sophisticated methods, including malware, phishing, ransomware, and the deployment of technologies to find and exploit vulnerabilities. Like many organizations, we have been targeted by phishing attacks, for example. Our electronic infrastructure, and information technology systems maintained by our third-party providers, have been in the past, and may be in the future, subjected to attempts to gain unauthorized access, disable, destroy, maliciously control or cause other business disruptions. In some cases, it is difficult to anticipate or to detect immediately such incidents and any damage caused. While these types of incidents have not had a material impact on our business to-date, future incidents involving access to or improper use of our systems, or those of our third-parties, could compromise confidential, proprietary or otherwise sensitive information.
In addition, cyberattacks could negatively impact our reputation and our competitive position and could result in litigation with third parties, regulatory action, significant remediation costs, and loss of business and customers relationships, any of which could adversely impact our business, our financial condition, and our operating results. Although we maintain some insurance coverage, we cannot be certain that coverage would apply to cyber risks, that it may be adequate for liabilities incurred, or that any insurer will not accept or deny coverage of future claims.
We may experience problems with the operation of our electronic infrastructure or the technology systems of third parties on which we rely, as well as the development and deployment of new electronic infrastructure, that could adversely affect, or even disrupt, all or a portion of our operations until resolved. In addition, as a result of the COVID-19 pandemic a large percentage of our salaried employees continue to work remotely full or part-time. This remote working environment may pose a heightened risk for security breaches or other disruptions of our information technology environment.