As discussed under Item 1C, Cybersecurity, we rely extensively and increasingly on information technologies and infrastructure to manage our business, develop new business opportunities and digital products, and process business transactions, and our business operations depend on the availability, integrity and secure processing, storage, and transmission of confidential and sensitive information digitally and through interconnected systems, including those of our vendors, service providers and other third parties. The incidence of malicious technology-related events, such as cyberattacks, computer hacking, computer viruses or other destructive or disruptive software, phishing attacks and other attempts to gain access to confidential or personal data, denial of service or ransomware attacks or other malicious activities, is on the rise worldwide and highlights the need for continual and effective cybersecurity awareness and education. We, our clients and our vendors are increasingly the target of hackers and other threat actors, denial of service attacks and malicious code, which can result in the unauthorized access, misuse, loss, or destruction of data (including confidential and sensitive data), unavailability of services and supply chain disruptions, or other adverse events.
Our business, which increasingly involves the collection, use and transmission of customer data, including personal information, makes us and our agencies attractive targets for malicious third-party attempts to access this data. Power outages, equipment failure, natural disasters (including extreme weather), terrorist activities or human error also affect our systems and can result in disruption of our services or loss or improper disclosure of personal data, business information, including intellectual property, or other confidential information. We utilize in-house and third-party services, including third-party "cloud" computing services, to perform key operational functions, including the storage, transfer or processing of data. System failures or network disruptions or breaches in such in-house or third-party systems could adversely affect our business operations, financial condition and reputation or expose us to increased risk of litigation or regulatory enforcement action.
The threat landscape is constantly evolving. Cybersecurity incidents or data breaches affecting the confidentiality, integrity, or availability of the information we process, our data systems, or those operated on our behalf by third-party service providers adversely affect our ability to manage our risk exposure and could significantly harm our business. We operate in many respects on a decentralized basis, with a large number of agencies and legal entities, and the resulting size, diversity and disparity of our technology systems and complications in implementing standardized technologies and procedures increases our vulnerability to such breakdowns, malicious intrusions or attacks.
Data privacy or cybersecurity breaches, or any failure to maintain the confidentiality of sensitive information, by employees and others poses the risk that sensitive data, such as personal information, strategic plans and trade secrets, could be exposed to third parties or to the general public. Breaches or breakdowns that result in a loss of our or our clients' or vendors' proprietary information expose us to legal liability and can be expensive to remedy. We consider the ethical treatment of data to be a business strength, and so the damage to our reputation and business from any such breach could be significant and costly. Efforts to develop, implement and maintain security measures are costly, may not be successful in preventing these events from occurring and require ongoing monitoring and updating as technologies and cyberattack techniques change frequently, or are not recognized until successful and efforts to overcome security measures become more sophisticated. We operate worldwide, and the legal rules governing data transfers are often complex, conflicting, unclear or ever-changing. Increased privacy and cybersecurity requirements increase our operating and compliance costs and can negatively impact our business or financial condition.
Furthermore, as part of our response to the challenges of the COVID-19 pandemic, modified processes, procedures and controls were required to respond to the changes in our business environment as a significant number of our employees have continued to work from home for at least a portion of the work week. The increase in remote working of our employees exacerbates risks related to the increased demand for information technology resources, malicious technology-related events, including cyberattacks and phishing attacks, and improper dissemination of personal, proprietary or confidential information.