We are dependent on various information technologies throughout our Company to administer, store and support multiple business activities. We routinely experience various cybersecurity threats, threats to our information technology infrastructure, unauthorized attempts to gain access to our Company sensitive information, and denial-of-service attacks as do our customers, suppliers and subcontractors. We conduct regular periodic training of our employees as to the protection of sensitive information which includes security awareness training intended to prevent the success of "phishing" attacks.
The threats we face vary from attacks common to most industries, such as ransomware attacks to disable critical infrastructure and extort companies for ransom payments, to more advanced and persistent, highly organized adversaries, including nation states, which target us and other defense contractors because we protect sensitive information. If we are unable to protect sensitive information, our customers or governmental authorities could question the adequacy of our threat mitigation and detection processes and procedures, and depending on the severity of the incident, our customers' data, our employees' data, our intellectual property, and other third-party data (such as subcontractors, suppliers and vendors) could be compromised. As a consequence of their persistence, sophistication and volume, we may not be successful in defending against all such attacks. Due to the evolving nature of these security threats, the impact of any future incident cannot be predicted.
Although we work cooperatively with our customers, suppliers, and subcontractors to seek to minimize the impact of cyber threats, other security threats or business disruptions, we must rely on the safeguards put in place by these entities, which may affect the security of our information. These entities have varying levels of cybersecurity expertise and safeguards and their relationships with U.S. government contractors, such as Astronics, may increase the likelihood that they are targeted by the same cyber threats we face.
If we experience a data security breach from an external source or from an insider threat, we may have a loss in sales or increased costs arising from the restoration or implementation of additional security measures, either of which could adversely affect our business and financial results. Other potential costs could include damage to our reputation, loss of brand value, incident response costs, loss of stock market value, regulatory inquiries, litigation and management distraction. A security breach that involves classified information could subject us to civil or criminal penalties, loss of a government contract, loss of access to classified information, or debarment as a government contractor. Similarly, a breach that involves loss of customer-provided data could subject us to loss of a customer, loss of a contract, litigation costs and legal damages and reputational harm.