We are subject to cyber and physical security risks related to our information technology systems, operational technology, network infrastructure, and other technology and facilities used to conduct almost all of our businesses. For example, the operation of our electric generation, transmission and distribution systems are dependent on not only physical interconnection of our facilities but also on communications among the various components of our systems and third-party systems. This reliance on information and communication between and among those components has increased since deployment of the intelligent grid, smart devices and operational technologies across our businesses. Further, certain of the various internal systems we use to conduct our businesses are highly integrated. Consequently, a cyberattack or unauthorized access in any one of these systems could potentially impact the other systems. Similarly, our business operations are interconnected with external networks and facilities. For example, the operation of an efficient deregulated wholesale and retail electric market in Texas mandates communication with ERCOT, and competitive retailers; and our Indiana Electric organization has a similar relationship with MISO. Also, the distribution of natural gas to our customers requires communications with third-party systems. Disruption of those communications, whether caused by physical disruption such as storms or other natural disasters, by failure of equipment or technology or by man-made events, such as cyberattacks or acts of terrorism, may disrupt our ability to conduct operations and control assets.
The sophistication of cybersecurity threats, including those leveraging AI, continues to increase, and the controls and preventative actions we take to reduce the risk of cybersecurity incidents and protect our systems, including the regular testing of our cybersecurity incident response plan, may be insufficient. In addition, new technology that could result in greater operational efficiency, such as our use of AI, may further expose our computer systems to the risk of cybersecurity incidents. Cyberattacks, including phishing attacks and threats from the use of malware, ransomware and viruses or malicious code, and unauthorized access could also result in the loss, or unauthorized use, of confidential, proprietary or critical infrastructure data or security breaches of other information technology systems that could disrupt operations and critical business functions, adversely affect reputation, impact our customers, increase costs and subject us to possible legal claims and liability. While we have implemented and maintain a cybersecurity program designed to protect our information technology, operational technology, and data systems from such attacks, our cybersecurity program does not prevent all breaches or cyberattack incidents. We have experienced an increase in the number of attempts by external parties to access our networks or our company data without authorization. We have also experienced, and expect to continue to experience, cyber intrusions and attacks to our information systems and those of third parties, including vendors, suppliers, contractors and quasi government entities who perform certain services for us or administer and maintain our sensitive information. These prior intrusions and attacks have not had a material impact on our business, results of operations, or financial condition. Because technology is increasingly complex and cyberattacks are increasingly sophisticated and more frequent, there is a risk such incidents could have an adverse effect on us in the future. The risk of a disruption or breach of our operational technology systems, or the compromise of the data processed in connection with our operations, through a cybersecurity breach or ransomware attack, has increased as attempted attacks have advanced in sophistication and number around the world. We are not fully insured against all cybersecurity risks, any of which could adversely affect our reputation and could have an adverse effect on our financial condition, results of operations and cash flows.
We depend on the secure operations of our physical assets to transport the energy we deliver and our information technology to process, transmit and store electronic information, including information and operational technology we use to safely operate our energy transportation systems. Security breaches, attacks on our infrastructure and facilities, including against the Registrants or as a means to harm a third-party by disrupting the transmission and distribution of energy, or acts of terrorism, including by foreign or domestic actors, could expose our business to a risk of loss, misuse or interruption of critical physical assets or information and functions that affect our operations, as well as potential data privacy breaches and loss of protected personal information and other sensitive information, such as Critical Energy Infrastructure Information. Such losses could result in operational impacts, damage to our assets, public or personal safety incidents, impacts to our customers, damage to the environment, reputational harm, competitive disadvantage, regulatory enforcement actions, litigation and a potential adverse effect on our operations, financial condition, results of operations and cash flows. There is no certainty that costs incurred related to actual or thwarted cyberattacks, or for the safeguarding against such security threats, will be recoverable through rates.