A cyber incident is considered to be any adverse event that threatens the confidentiality, integrity or availability of our information resources. These incidents may be an intentional attack or an unintentional event and could involve gaining unauthorized access to our information systems for purposes of misappropriating assets, stealing confidential information, corrupting data or causing operational disruption. The risk of a security breach or disruption, particularly through cyber-attacks or cyber intrusions, including by computer hackers, nation-state affiliated actors, and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased, and will likely continue to increase in the future. Such threats are prevalent and continue to rise, are increasingly difficult to detect, and come from a variety of sources, including traditional computer "hackers," threat actors, "hacktivists," organized criminal threat actors, personnel (such as through theft or misuse), sophisticated nation states, and nation-state-supported actors. Some actors now engage and are expected to continue to engage in cyberattacks, including, without limitation, nation-state actors for geopolitical reasons and in conjunction with military conflicts and defense activities. During times of war and other major conflicts, we and the third-party service providers upon which we rely may be vulnerable to a heightened risk of these attacks, including retaliatory cyberattacks.
The result of these incidents could include disrupted operations, misstated or unreliable financial data, disrupted market price of our common stock, misappropriation of assets, liability for stolen assets or information, increased cybersecurity protection and insurance costs, regulatory enforcement, litigation and damage to our investor relationships. These risks require continuous and likely increasing attention and other resources from us, Apollo and third-party service providers to, among other actions, identify and quantify these risks, upgrade and expand our technologies, systems and processes to adequately address them and provide periodic training for the Manager's employees to assist them in detecting phishing, malware and other schemes. Such attention diverts time and other resources from other activities and there is no assurance that such efforts will be effective. Additionally, the cost of maintaining such systems and processes, procedures and internal controls may increase from its current level.
In the normal course of business, we and our third-party service providers collect and retain certain personal information provided by borrowers, employees and vendors. We also rely extensively on computer systems to process transactions and manage our business. We can provide no assurance that the data security measures designed to protect confidential information on our systems established by us and our service providers will be able to prevent unauthorized access to this personal information. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed not be detected and, in fact, may not be detected. Accordingly, we and our service providers may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us and our service providers to entirely mitigate this risk.
Remote work has become more common among the employees and personnel of the Manager, Apollo and other third-party service providers and has increased risks to the information technology systems and confidential, proprietary, and sensitive data of the Manager, Apollo and other third-party service providers as more of those employees utilize network connections, computers, and devices outside of the employer's premises or network, including working at home, while in transit, and in public locations. Those employees working remotely could expose the Manager, Apollo and other third-party service providers to additional cybersecurity risks and vulnerabilities as their systems could be negatively affected by vulnerabilities present in external systems and technologies outside of their control.
Our business depends on the communications and information systems of Apollo and other third-party service providers. Such systems may fail to operate properly or become disabled as a result of cyber incidents. Any failure or interruption of the systems of Apollo or any other counterparties that we rely on could cause delays or other problems and could have a material adverse effect on our operating results. None of us, the Manager or Apollo have experienced any material breach of cybersecurity. However, we can provide no assurance that the networks and systems that we, the Manager, Apollo or our third-party service providers have established or use will be effective. As our reliance on technology has increased, so have the risks posed to our communications and information systems, both internal and those provided by the Manager, Apollo and third-party service providers. Apollo's processes, procedures and internal controls that are designed to mitigate cybersecurity risks and cyber intrusions do not guarantee that a cyber incident will not occur or that our financial results, operations or confidential information will not be negatively impacted by such an incident. Despite the security policies and procedures, Apollo has implemented that were designed to safeguard our systems and confidential, proprietary, and sensitive data and to manage cybersecurity risk, there can be no assurance that these measures will be effective. Apollo takes steps to monitor and develop our information technology networks and infrastructure and invest in the development and enhancement of our controls designed to prevent, detect, respond to, and mitigate the risk of unauthorized access, misuse, computer viruses, and other events that could have a security impact.
Even if we are not targeted directly, cyberattacks on the U.S. and foreign governments, financial markets, financial institutions, or other businesses, including borrowers, vendors, software creators, cybersecurity service providers, and other third parties with whom we do business and rely, may occur, and such events could disrupt our normal business operations and networks in the future.