We face various cybersecurity risks related to our businesses on a day-to-day basis. We rely heavily on financial, accounting, communication and other data processing systems to securely process, transmit, and store sensitive and confidential client information, and communicate among our locations around the world and with our staff, clients, partners, and vendors. We also depend on third-party software and programs, as well as cloud-based storage platforms as part of our operations. These systems, including the systems of third parties on whom we rely, may fail to operate properly or become disabled as a result of tampering or a breach of our network security systems or otherwise, including for reasons beyond our, or their, control. In addition, we are also exposed to fourth-party cybersecurity risk from vendors, suppliers or attackers of our third-party vendors. The increased use of mobile technologies, artificial intelligence and remote working arrangements heighten these and other operational risks.
In addition, as we operate in a financial services industry, we are susceptible to attempts to gain unauthorized access of client, customer or other confidential information. We are also at risk for denial-of-service, distributed denial-of-service and/or other cyber-attacks involving the theft, dissemination and destruction of corporate information or other assets, which could result from an employee's, contractor's or other third party vendor's failure to follow data security procedures or as a result of actions by third parties, including actions by governments. Phishing attacks and email spoofing attacks are becoming more prevalent and are often used to obtain information to impersonate employees or clients in order to, among other things, direct fraudulent bank transfers or obtain valuable information. Fraudulent transfers resulting from phishing attacks or email spoofing of our employees could result in a material loss of assets, reputational harm or legal liability, and in turn materially adversely affect our business. Although cyber-attacks have not, to date, had a material impact on our operations, breaches of our, or third-party, network security systems on which we rely could involve attacks that are intended to obtain unauthorized access to and disclose our proprietary information or our client's proprietary information, destroy data or disable, degrade or sabotage our systems, often through the introduction of computer viruses, cyber-attacks and other means, and could originate from a wide variety of sources, including state actors or other unknown third parties outside the firm.
There can be no assurance that we, or the third parties on whom we rely, will be able to anticipate, detect or implement effective preventative measures against frequently changing cyber threats. We expect to incur significant costs in maintaining and enhancing appropriate protections to keep pace with increasingly sophisticated methods of attack. In addition to the implementation of data security measures, we require our employees to maintain the confidentiality of the proprietary information we hold. If an employee's failure to follow proper data security procedures results in the improper release of confidential information, or our systems are otherwise compromised, do not operate properly or are disabled, we could suffer a disruption of our business, financial losses, liability to clients, regulatory sanctions and damage to our reputation. See Item 1C. "Cybersecurity" for further information regarding our cybersecurity practices, policies and procedures.