We depend upon our ability to process, record, and monitor our client transactions on a continuous basis. As client, public and regulatory expectations regarding operational and information security have increased, our operational systems and infrastructure must continue to be safeguarded and monitored for potential failures, disruptions and breakdowns. Our business, financial, accounting and data processing systems, or other operating systems and facilities, may stop operating properly or become disabled or damaged as a result of a number of factors, including events that are wholly or partially beyond our control. For example, there could be electrical or telecommunications outages; natural disasters such as earthquakes, tornadoes, hurricanes and floods; disease pandemics; events arising from local or larger scale political or social matters, including terrorist acts; and, as described below, cyber-attacks. Although we have business continuity plans and other safeguards in place, our business operations may be adversely affected by significant and widespread disruption to our physical infrastructure or operating systems that support our business and clients.
Information security risks for financial institutions have generally increased in recent years in part because of the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of organized crime, hackers, terrorists, activists, and other external parties. Threat actor organizations are becoming more formal and now frequently include specialized "departments" within an organization. These "departments" may act together to sell access to interested parties, which install malware and infiltrating data. This increases cybersecurity risk as indicators of an attack may spread across multiple detection platforms and originate from disparate sources. Our business relies on our digital technologies, computer and email systems, software, and networks to conduct its operations. In addition, to access our products and services, our clients may use personal smartphones, tablet PC's, personal computers and other devices that are beyond our control systems. Although we have information security procedures and controls in place, our technologies, systems, and networks, and our clients' devices, may become the target of cyberattacks or information security breaches that could result in the unauthorized release, gathering, monitoring, misuse, loss, or destruction of our or our clients' confidential, proprietary, and other information, or otherwise disrupt our or our clients' or other third parties' business operations. We may be subject to increasingly more risk related to cybersecurity for our Internet Branch as we expand our suite of online direct banking products, acquire new or outsource some of our business operations, expand our internal usage of web-based products and applications, and otherwise attempt to keep pace with rapid technological changes in the financial services industry.
We rely on external infrastructure, proprietary information technology and third-party systems and services to conduct business, including customer service, marketing and sales activities, customer relationship management, producing financial statements and technology/data centers. In addition, we store and process confidential and proprietary business information on both company-owned and third-party and/or vendor managed systems, including cloud service providers. We increasingly rely on the internet in order to conduct business and may be adversely impacted by outages in critical infrastructure such as electric grids, undersea cables, satellites or other communications used by us or our third parties. This reliance includes consumer access to the internet and communications systems due to more work taking place outside of corporate locations. A security breach in the systems of our third-party service providers can create a gateway for unauthorized access to our network, potentially compromising the integrity and confidentiality of our data and systems. The failure of our or any third party's information technology, infrastructure or other internal and external systems, for any reason, could disrupt our operations, result in the loss of business and adversely impact our profitability. Any compromise of the security of our or any third party's systems that results in the disclosure of personally identifiable customer or employee information could damage our reputation, deter customers from purchasing or using our products and services, expose us to litigation, increase regulatory scrutiny and require us to incur significant technical, legal and other expenses. We may also be adversely impacted by successful cyberattacks of our partners, third-party vendors and others in our supply chain with whom we conduct business or share information.
Financial services companies are regularly targeted by cyber criminals, resulting in unauthorized access to confidential information, theft of funds from online accounts, disruption or degradation of service or other damage. These attacks may take a variety of forms, including web application attacks, denial of service attacks, ransomware, other malware, and social engineering, including phishing. As automation and machine intelligence technologies progress, attackers are adopting this technology to speed up their reconnaissance and attacks while reducing their costs. This improved efficiency and tooling means that a lower-skilled adversary is able to perform more attacks at a higher complexity level than in the past. Economic and political instability offers a fertile ground for adversaries to recruit new talent. This could be either people looking for financial gains amid job losses and high inflation, politically motivated actors driven by state conflicts or internal political unrest, or other personal reasons. In addition, the reengineering and reuse of prior attack methodologies is made easier by advances in these technologies.
Information security incidents may also occur due to the failure to control access to, and use of, sensitive systems or information by our workforce. Employee risk exposure remains high as cybersecurity awareness training must be continuously refined and updated as technology advances and threat actors become increasingly more sophisticated. Additionally, there is a potential increase in this threat due to the increase in remote work. The failure of our controls (such as policies, procedures, security controls and monitoring, automation and backup plans) designed to prevent, or limit the effect of, failure, inadvertent use or abuse could result in disruptions or breaches beyond our control. Although to date we have not experienced any material losses relating to cyber-attacks or other information security breaches, there can be no assurance that we will not suffer such losses in the future. Our risk and exposure to these matters remains heightened because of the evolving nature of these threats. As a result, cyber security and the continued development and enhancement of our controls, processes and practices designed to protect our systems, computers, software, data and networks from attack, damage or unauthorized access remain a focus for us. As technology evolves, we can increase our ability to detect and prevent cyber-attacks through automation and the implementation of security controls which leverage machine learning and artificial intelligence. As threats continue to evolve, we may be required to expend additional resources to continue to modify or enhance our protective measures or to investigate and remediate information security vulnerabilities. Additionally, information security vulnerabilities can pose increased cyber-risk as they can be combined and chained together more easily with machine learning technology.
Disruptions or failures in the physical infrastructure or operating systems that support our business and clients, or cyberattacks or security breaches of the networks, systems or devices that our clients use to access our products and services could result in significant legal and financial exposure, client attrition, regulatory fines, penalties or intervention, reputational damage, reimbursement or other compensation costs and/or additional compliance costs, a loss of confidence in the security of our systems, any of which may not be covered by insurance and could materially and adversely affect our financial condition or results of operations.
Operational risks, including risks associated with Flushing Bank's dependence on its operational systems, its ability to maintain appropriately staffed workforces and the competence, integrity, health and safety of its employees, are of primary concern. The legal and regulatory risks related to safeguarding personal information and the harm that could be caused by a successful cyber-attack affecting Flushing Bank are proactively monitored and addressed according to current regulations and bank policies. Additionally, Flushing Bank monitors and addresses risks associated with its risk management framework and its models and estimations with monthly reports to the board of directors. Flushing Bank coordinates these activities to ensure that potential adverse effects of failing to comply with heightened regulatory and other standards for the oversight of the cyber and risk management programs are significantly reduced.