A cyber or security attack or other similar incident resulting in a breach, disruption or failure in our or our supply chain's digital environment could adversely affect us. Our operations depend heavily on the continued and secure functioning of our varied digital environment software and hardware that stores, processes and transmits data within the Company and from and to us and our business partners. This digital environment is subject to breach, damage, destruction, disruption, malfunction or failure from, among other things, cyber-attacks and other unauthorized intrusions, power losses, telecommunications failures, earthquakes, fires and other natural disasters.
We are continuously subjected to attempted cyber-attacks, ranging from standard phishing mails to sophisticated campaigns. Our computer and communications systems, databases and users face ongoing threats of malicious software (malware), social engineering, distributed denial of service (DDoS), malicious code, zero-day vulnerabilities and other security threats and system disruptions carried out by different threat actors. For example, in June 2022, our monitoring and protection systems detected a cyber-incident at our U.S. subsidiary involving unauthorized access by a ransomware group to our subsidiary's network that resulted in disclosure of certain personal data and a minimal amount of non-critical business data. The incident was contained through the implementation of various measures, including the immediate shut-down of the network, which was gradually restored. Relevant authorities were notified by our subsidiary. We believe this incident did not have a material impact on the Company.
In particular, we are targeted by experienced and skilled computer programmers and hackers, including those sponsored by or acting for foreign governments or terrorist organizations. Such programmers and hackers attempt to penetrate or circumvent our cyber security defenses, obtain data and damage or disrupt our digital environment in order to, among other things, misappropriate or compromise our intellectual property or other proprietary or protected information or that of our employees, customers and other business partners, prevent us from being able to use such information in our operations or demand that we pay ransom. Our suppliers are also sometimes subject to cyber-attacks, which pose a risk to those of our systems and operations that are dependent on such suppliers.
Governmental and other end users and customers are increasingly requiring us and our supply chain to meet specific computer system cyber protection and information assurance requirements and standards as a pre-condition to receive customer program-related information and enter into business contracts. We devote significant resources to configure, operate, maintain, monitor, upgrade and improve the security of our systems and databases and to meet applicable customer requirements regarding their protection. However, despite our efforts to secure our systems and databases and meet cyber protection and information assurance requirements, such as by adding data security obligations and data breach notification requirements in our agreements with certain third-party service providers, due to the complex and evolving nature of the cyber security risk landscape, we and our suppliers may still face system failures, data breaches, loss of intellectual property and interruptions in our operations, or fail to meet customer requirements, which could have a material adverse effect on our business, reputation, financial condition, results of operations and cash flow. For information about our cybersecurity risk management, strategy and governance, see Item 16K. Cybersecurity.