Our computer systems and network infrastructure are subject to security risks and could be susceptible to cyber-attacks, such as denial-of-service attacks, hacking, malware, terrorist activities, or identity theft. Financial services institutions and companies engaged in data processing have reported breaches in the security of their websites or other systems, some of which have involved sophisticated and targeted attacks intended to obtain unauthorized access to confidential information, destroy data, disable or degrade service, or sabotage systems, often through the introduction of computer viruses, malware, ransomware, cyber-attacks, and other means. Denial-of-service attacks have been launched against several large financial services institutions, primarily resulting in inconvenience. Future ransomware and cyber-attacks could be more disruptive and damaging. Hacking and identity theft risks, in particular, could cause serious reputational harm to the Company and the Bank.
The hardware and software we purchase from suppliers to facilitate financial services and perform company operations are also at risk of having embedded malware, viruses, and other methods intended to develop unauthorized access to confidential information. These types of attacks, known as "supply-chain attacks," have become more prevalent and are creating additional risks through the solutions and tools upon which we rely. While we have a third-party risk management program to oversee our vendors and procurement, our ability to successfully mitigate these risks that occur in the hardware and software of these vendors is limited. To the extent we experience supply-chain attacks, our business and reputation could be materially adversely affected.
In addition, we provide our clients with the ability to bank remotely, including online, through their mobile device, and over the telephone. The secure transmission of confidential information over the internet and other remote channels is a critical element of remote banking. Our network could be vulnerable to unauthorized access, computer viruses, malware, phishing schemes, and other internal and external security breaches. We may be required to spend significant capital and other resources to protect against threats, or to alleviate problems caused by security breaches or malicious software. To the extent that our activities or the activities of our clients involve the storage and transmission of confidential information, security breaches, and viruses could expose us to claims, regulatory scrutiny, litigation, and other possible liabilities. Other possible points of intrusion or disruption not within the Company's control include internet service providers, electronic mail portal providers, social media portals, distant-server (cloud) service providers, electronic data security providers, telecommunications companies, and smart phone manufacturers.
Despite efforts to ensure the integrity of our systems, cyber threats are rapidly evolving and we may not be able to anticipate or prevent all such attacks, nor may we be able to implement guaranteed preventive measures against such security breaches. The techniques used by cyber criminals change frequently, may not be recognized until launched or later, and can originate from a wide variety of sources, including outside groups such as external service providers. These risks may increase in the future as we continue to increase our mobile payment and other internet-based product offerings and expand our internal usage of web-based products and applications. Further, targeted social engineering attacks may be sophisticated and difficult to prevent and our employees, clients, or other users of our systems may be fraudulently induced to disclose sensitive information, allowing cyber criminals to gain access to our systems or data of our clients.
In addition, some of our employees work remotely, including while traveling for business, which increases our cybersecurity risk, creates data accessibility concerns, and makes us more susceptible to security breaches or business disruptions.
A successful penetration or circumvention of system security could cause us serious negative consequences, including significant disruption of operations, misappropriation of confidential information, or damage to our computers or systems or to those of our clients and counterparties. A successful security breach could result in violations of applicable privacy and other laws, financial loss to us or to our clients, loss of confidence in our security measures, significant litigation exposure, and harm to our reputation, all of which could have a material adverse effect on our business, financial condition, results of operations, and prospects.