We derive almost all of our revenues from the purchase of recruitment products, packages, services and employment advertising offered on our Dice and ClearanceJobs websites. As a result, our operations depend on our ability to maintain and protect our website services, most of which are housed within AWS. System failures, including network, software or hardware failures, which cause interruption or an increase in response time of our services, could substantially decrease usage of our services and could reduce the attractiveness of our services to both our customers and professionals. An increase in the volume of queries conducted through our services could strain the capacity of the software or hardware we employ. This could lead to slower response times or system failures and prevent users from accessing our websites for extended periods of time, thereby decreasing usage and attractiveness of our services. Our technology operations are dependent in part on our ability to protect our operating systems against, among other events:
- physical damage from acts of God;- terrorist attacks or other acts of war;- power loss;- telecommunications failures;- network, hardware or software failures;- physical and electronic break-ins;- cyber security attacks;- computer viruses or worms;- identity theft;- phishing attempts; and - similar events.
Although we maintain insurance against fires, floods, cyber-attacks, and general business interruptions, the amount of coverage may not be adequate in any particular case. Furthermore, the occurrence of any of these events could result in interruptions, delays or cessations in service to users of our services, which could materially impair or prohibit our ability to provide our services and significantly impact our business.
Additionally, overall Internet usage could decline if any well-publicized compromise of security occurs or if there is a perceived lack of security of personal and corporate information stored within our systems to facilitate hiring and recruitment business processes. "Hacking" involves efforts to gain unauthorized access to information or systems or to cause intentional malfunctions or loss or corruption of data, software, hardware or other computer equipment, and online job boards, in particular, have been targeted by hackers who seek to gain unauthorized access to job seeker and customer data for purposes of implementing "phishing" or other schemes. Despite our implementation of numerous security measures; including access controls, network security, information security risk management processes, software development security, cryptography, operational security, business continuity and disaster recovery, and physical security, our websites, servers, databases and other systems as well as those of our customers may be vulnerable to computer hackers, physical or electronic break-ins, sabotage, computer viruses, worms, phishing attacks and similar disruptions from unauthorized tampering with our computer systems.
Our systems, like the systems of many other websites, have been targeted in the past in cyber-attacks and hacks and will continue to be subject to such attacks. While such targets and hacks have not had material impacts on our results of operations and financial condition in the past, we cannot guarantee that similar attacks will not have such material impacts in the future. Because the techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently, such techniques often are not recognized until launched against a target and may originate from less regulated and remote areas around the world, we may be unable to proactively address these techniques or to implement adequate preventative measures. We will continue to review and enhance our security measures in an attempt to prevent unauthorized and unlawful intrusions, although in the future it is possible we may not be able to prevent all intrusions, and such intrusions could result in our network security or computer systems being compromised and possibly result in the misappropriation or corruption of proprietary or personal information or cause disruptions in our services. We might be required to expend significant capital and resources to protect against, remediate or alleviate problems caused by such intrusions. We may also not have a timely remedy against a hacker who is able to penetrate our network security.
Our networks could also be affected by viruses or malware or other similar disruptive problems, and we could inadvertently transmit these viruses or malware to our users or other third parties. Our hardware and back-up systems could fail causing our services to be interrupted. Our customers may fall prey to successful phishing attacks and inadvertently give unauthorized access to view our candidate profiles. Any of these occurrences, and negative publicity arising from any such occurrences, could harm our business or give rise to a cause of action against us. Our general business interruption insurance policies have limitations with respect to covering interruptions caused by computer viruses or hackers. While we have insurance we have not added specific insurance coverage to protect against these risks. Our activities and the activities of third party contractors involve the storage, use and transmission of proprietary and personal information, including personal information collected from professionals who use our websites. Accordingly, security breaches could expose us to a risk of loss or litigation and possibly liabilities. We cannot assure that contractual provisions attempting to limit our liability in these areas will be successful or enforceable, or that other parties will accept such contractual provisions as part of our agreements. Any security breaches or our inability to provide users with continuous access to our networks could materially impact our ability to provide our services as well as materially impact the confidence of our customers in our services, either of which could have a material adverse effect on our business.
The SEC has adopted new rules that require us to provide greater disclosures around cybersecurity risk management, strategy and governance, as well as disclose the occurrence of material cybersecurity incidents. We cannot predict or estimate the amount of additional costs we will incur in order to comply with these rules or the timing of such costs. These rules and regulations may also require us to report a cybersecurity incident before we have been able to fully assess its impact or remediate the underlying issue. Efforts to comply with such reporting requirements could divert management's attention from our incident response and could potentially reveal system vulnerabilities to threat actors. Failure to timely report incidents under these or other similar rules could also result in monetary fines, sanctions, or subject us to other forms of liability. This regulatory environment is increasingly challenging and may present material obligations and risks to our business, including significantly expanded compliance burdens, costs and enforcement risks.