We rely on computer systems, hardware, software, technology infrastructure and online sites and networks for both internal and external operations that are critical to our business (collectively, "IT Systems"). We own and manage some of these IT Systems but also rely on third parties for a range of IT Systems and related products and services, including but not limited to cloud computing services.
Our business depends on our ability to limit and mitigate interruptions to or degradation of the security of our network. We face numerous and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems, as well as trade secrets, intellectual property, personal information or other Company confidential information (collectively "Confidential Information"). We are considered a critical infrastructure provider and therefore may be more likely to be the target of cyber-attacks. Our IT Systems are subject and vulnerable to unauthorized access, social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware, computer viruses, cyber-attacks, distributed denial of service ("DDOS"), and other cybersecurity risks.
We and our employees are the target of phishing attempts and compromised links, and our IT Systems are the target of attempts at unauthorized access, a small number of which have been successful in accessing non-critical areas of our IT Systems. Our customer-facing network firewall regularly suppresses cyber-attacks and our network routinely manages DDOS attacks. Although none of the incidents, individually or in the aggregate, have materially impacted our operations or business, we cannot guarantee material incidents will not occur in the future. An attack on or security breach of our network could result in theft Confidential Information, the interruption, degradation, or cessation of services, an inability to meet our service level commitments or our financial reporting obligations, and potentially compromise customer data stored on or transmitted over our network.
Cyber-attacks are expected to accelerate on a global basis in frequency and magnitude as threat actors are becoming increasingly sophisticated in using techniques and tools – including artificial intelligence – that circumvent security controls, evade detection and remove forensic evidence. As a result, we may be unable to detect, investigate, remediate or recover from future attacks or incidents, or avoid a material adverse impact to our IT Systems, Confidential Information or business. Moreover, as cyber warfare becomes a tool in asymmetric conflicts between the United States and other nations, we, as a US provider, may be targeted with increasing frequency. We cannot guarantee that our security measures will not be circumvented, thereby resulting in security events, network failures or interruptions that could impact our network security or availability and have a material adverse effect on our business, our ability to meet our financial reporting obligations, financial condition and operational results.
We may be required to expend significant resources to protect against such threats, and may experience a reduction in revenues, litigation (including class action lawsuits), and a diminution in goodwill, caused by a compromise of our cybersecurity. Although our customer contracts limit our liability, affected customers and third parties may seek to recover damages from us under various legal theories. We cannot guarantee that any costs and liabilities incurred in relation to an attack or incident will be covered by our existing insurance policies or that applicable insurance will be available to us in the future on economically reasonable terms or at all. In response to past attacks, we have implemented further controls and taken and planned for other preventative actions to further strengthen our systems against future attacks. However, we cannot assure you that such measures will provide absolute security, that we will be able to react in a timely manner, or that our remediation efforts following any past or future attacks will be successful. There can also be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully implemented, complied with or effective in protecting our IT Systems and Confidential Information. Any adverse impact to the availability, integrity or confidentiality of our IT Systems or Confidential Information can result in legal claims or proceedings (such as class actions), regulatory investigations and enforcement actions, fines and penalties, negative reputational impacts that cause us to lose existing or future customers, and/or significant incident response, system restoration or remediation and future compliance costs. Any or all of the foregoing could materially adversely affect our business, operating results, and financial condition.