We face various cybersecurity risks, including but not limited to penetration of our information technology systems and platforms by ill-intentioned third parties, infiltration of malware (such as computer viruses) into our systems, contamination (whether intentional or accidental) of our networks and systems by third parties with whom we exchange data, unauthorized access to confidential customer and/or proprietary data by persons inside or outside our organization, cyberattacks causing systems degradation or service unavailability that may result in business losses, and risks associated with the use of emerging technologies such as artificial intelligence.
In addition, we may be subject to potential fraud and theft by cybercriminals, who are becoming increasingly sophisticated, seeking to gain unauthorized access to or exploit weaknesses that may exist in our systems. We continuously monitor and develop our networks and information technology infrastructure. We also conduct annual tests to prevent, detect, address and mitigate the risk of unauthorized access, misuse, computer viruses and other events that could have an impact on our security. However, we cannot guarantee that these measures will be effective in protecting us against cyberattacks and other breaches related to our information technology systems. Techniques used to gain unauthorized, improper or illegal access to our systems, our data or our customers' data, to disable or degrade service, or to sabotage systems, due to constant evolution, can be difficult to detect quickly and are often not known until used on a target. Unauthorized parties may attempt to gain access to our systems or facilities through various means, including, among others, hacking into our systems or those of our customers, partners or vendors, or attempting to fraudulently induce our employees, customers, partners, vendors or other users of our systems to disclose usernames, passwords, financial information or other sensitive information, which may in turn be used to access our information technology systems. Certain efforts by third parties to access our information technology systems may be supported by significant financial and technological resources, making them even more sophisticated and difficult to detect. We have seen in recent years computer systems of businesses and organizations being targeted not only by cyber criminals, but also by rogue activists and states. Cyberattacks can cause the loss of significant amounts of customer data and other confidential information, as well as significant levels of liquid assets (including cash). In addition, cyberattacks could cause the shutdown of our information technology systems, including systems used to service our customers. We may also be subject to the effects of cyberattacks against critical infrastructure in Brazil and other countries in which we operate, and we have limited ability to protect our technology systems against such attacks.
If we fail to effectively manage our cybersecurity risk, for example, by failing to update our systems and processes in response to new threats, this could harm our reputation and adversely affect our operating results, financial condition and prospects through the payment of customer compensation, regulatory penalties and fines and/or the loss of assets. Furthermore, upon a failure to comply with applicable laws and regulations, we may be ordered to change our business practices, policies or systems in a manner that adversely impacts our operating results.
Moreover, critical infrastructures that our information technology systems rely on in Brazil and other countries in which we operate may be the target of cyberattacks, which could negatively affect our ability to service our customers.
Further, we store highly confidential information on our information technology systems, including personal data, financial information, and other types of information related to our products and customers. If our servers or the servers of the third parties on which our data is stored are the subject of a physical or electronic break-in, computer virus or other cyber risks, our confidential information could be stolen, rendered unavailable, devalued or destroyed. Any security breach involving the misappropriation, loss or other unauthorized disclosure or use of confidential information of our suppliers, customers, or others, whether by us or a third party, could (i) subject us to civil and criminal penalties, (ii) have a negative impact on our reputation or (iii) expose us to liability to our suppliers, customers, other third parties or government authorities.
We cannot assure you that our information technology systems will not be attacked in the future, that we will be able to adequately protect the confidential information we maintain. If we are the victim of successful cyberattacks or experience cybersecurity incidents in the future, we could incur substantial costs and suffer other negative consequences, such as remediation costs (liabilities for stolen assets or information or repairs of system damage, among others), increased cybersecurity protection costs, lost revenue from unauthorized use of proprietary information or the failure to retain or attract customers after an attack, as mentioned above, litigation and legal risks, increased insurance, reputational damage affecting the trust of our customers and investors, as well as damage to our competitiveness, stock price, and long-term shareholder value. Any failure by us to adequately protect our information technology systems and the confidential data which we hold could have a material adverse effect on our business, financial condition and results of operations. Importantly, even when a failure or disruption to our systems or facilities is resolved in a timely manner or an attempted cyber incident or other security breach is successfully prevented or thwarted, substantial resources are typically expended to do so, and we may be required to take actions that could negatively affect customer satisfaction or behavior and could pose a threat to our reputation.
On March 11, 2020, our subsidiaries and jointly controlled companies suffered a cyberattack by ransomware that caused a partial and temporary interruption of our operations, as widely disclosed by the Company at that time. Following the incident, we have taken certain additional precautionary measures to reduce cyber risks. We cannot assure you that our security frameworks and measures will be successful in preventing future cyberattacks. In addition, we expect that the cost to obtain cyber liability insurance in the future should we wish to do so (we do not currently have cyber liability insurance) will be higher than they would otherwise have been as a result of this incident.
Any of the above developments could adversely affect our business, as well as its financial condition, results of operations and reputation. See "Item 16K. Cybersecurity" for additional information regarding our cybersecurity risk management.