Although we have several processes and procedures in place designed to manage and mitigate cybersecurity risk, our business is still subject to certain risks. We depend on our own and third party information systems, including cloud-based systems and managed service providers, to store, process and protect our information and support our business activities. We also use third party systems to support employee data processing for our global workforce and to support customer business activities, such as transmitting payment information, providing mobile monitoring services, and capturing operational data. Additionally, some of our products contain integrated hardware and software and offer the ability to connect to networks. While we have measures in place that are designed to protect these systems, these systems have been and are expected to continue to be the target of cyber attacks. Although we conduct security assessments and periodic re-assessments of third party partners and other service providers, our systems may also experience vulnerabilities from third-party or open source software code that may be incorporated into our own or our vendors' systems. Any prolonged system disruption in our systems or third-party services could negatively impact the coordination of our sales, planning, and manufacturing activities, which could harm our business.
Our business has both an increasing reliance on systems and an increasing digital footprint as a result of changing technologies, connected devices and digital offerings, as well as expanded remote work policies. If these technologies, systems, products or services are damaged, cease to function properly, are compromised due to employee or third-party contractor error, user error, malfeasance, system errors, or other vulnerabilities, or are subject to cybersecurity attacks, such as those involving denial of service attacks, unauthorized access, malicious software, ransomware, or other intrusions, including by criminals, nation states or insiders, our business may be adversely impacted. The impacts could include production downtimes, operational delays, and other impacts on our operations and ability to provide products and services to our customers; compromise of confidential, proprietary or otherwise protected information, including personal information and customer confidential data; destruction, corruption, or theft of data or intellectual property; manipulation, disruption, or improper use of these technologies, systems, products or services; financial losses from fraudulent transactions, remedial actions, loss of business or potential liability; adverse media coverage; legal claims or legal proceedings, including regulatory investigations, actions and fines; and damage to our reputation. We regularly assess our threat landscape and monitor our systems and other technical security controls, maintain information security policies and procedures, including a breach response plan, ensure maintenance of backup and protective systems, and have a team of security personnel managing our efforts and initiatives. However, there has been a rise in the number of cyberattacks targeting confidential business information generally and in the manufacturing industry specifically, as well as an increase in cyberattacks targeting managed service providers, by both state-sponsored and criminal organizations. Moreover, there has been a rise in the number of cyberattacks that depend on human error or manipulation, including phishing attacks or schemes that use social engineering to gain access to systems or perpetuate wire transfer or other frauds.
These trends increase the likelihood of such events occurring as well as the costs associated with protecting against such events. It is possible for vulnerabilities in our systems to remain undetected for an extended period of time up to and including several years. We attempt to mitigate these risks by employing a number of measures, including employee training, systems monitoring and other technical security controls, vulnerability scanning, risk assessments, a breach response plan, maintenance of backup and protective systems, and security personnel. Notwithstanding those measures, our systems, networks, products and services remain potentially vulnerable to known or unknown cybersecurity attacks and other threats, any of which could have a material adverse effect on our consolidated results of operations, financial condition and cash flows. We continuously monitor and develop our systems to protect our technology infrastructure and data from misappropriation or corruption. However, a cybersecurity attack could persist for an extended period of time before being detected, and, following detection, it could take considerable time for us to obtain full and reliable information about the extent, amount and type of information compromised. During the course of an investigation, we may not know the full impact of the event and how to remediate it, and actions, decisions and mistakes that are taken or made may further increase the negative effects of the event on our business, results of operations and reputation. While we maintain insurance coverage that is intended to address certain aspects of cybersecurity risks, such insurance coverage may not cover all losses or all types of claims that arise. As cyber threats continue to evolve, cybersecurity and data protection laws and regulations continue to develop in the U.S. and globally, and our business continues to move towards increased online connectivity within our information systems and through more Internet-enabled products and offerings, we expect to expend additional resources to continue to build out our compliance programs, strengthen our information security, data protection and business continuity measures, and investigate and remediate vulnerabilities. For additional information on our cybersecurity risk management, strategy and governance, see Item 1C. "Cybersecurity."