The Company depends on the accuracy, reliability, and proper functioning of its information technology systems, networks and online sites, including systems maintained by third-party vendors with which we do business (collectively, "IT Systems"). The Company relies on these IT Systems to effectively manage many aspects of its business, including underwriting, policy acquisition, claims processing and handling, accounting, reserving and actuarial processes and policies, and to maintain its policyholder data. We and our providers face various and evolving cybersecurity risks that threaten the confidentiality, integrity and availability of our IT Systems and data, including personal information, that we process. These risks include the risk of a cyber incident, which has generally increased as the number, intensity and sophistication of attempted attacks by threat actors have increased globally, especially given the use of more advanced hacking tools and techniques and the use of artificial intelligence, including by computer hackers, state-sponsored actors, information service interruptions and cyber terrorists, opportunistic hackers and hacktivists, as well as through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human or technological error, and as a result of bugs, misconfigurations or exploited vulnerabilities in software or hardware. Techniques used in cyber incidents evolve frequently, may originate from less regulated and remote areas of the world and be difficult to detect and may not be recognized until launched against a target. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, making it impossible for us to entirely eliminate this risk.
Like many companies, we have been, and expect to continue to be, the target of cyber incidents. While these incidents have not had a material impact to date, as our reliance on technology increases, so do the risks of a security incident. For example, unauthorized parties, whether within or outside the Company, may disrupt or gain access to our IT Systems, or those of third parties with whom we do business, through human error, misfeasance, fraud, trickery, or other forms of deceit, including break-ins, use of stolen credentials, social engineering, phishing, computer viruses or other malicious codes, and similar means of unauthorized and destructive tampering. Though we have adopted cybersecurity measures, such measures cannot provide absolute security, and there can be no assurance that our cybersecurity risk management program and processes, including our policies, controls or procedures, will be fully complied with or effective in protecting our systems and information.
The failure of hardware or software that supports the Company's information technology systems, the loss of data contained in the systems, or any delay or failure in the full deployment of the Company's information technology systems could disrupt its business and could result in decreased premiums, increased overhead costs, and inaccurate reporting, all of which could have a material adverse effect on the Company's business, financial condition, and results of operations.
In addition, despite system redundancy, the implementation of security measures, and the existence of a disaster recovery plan for the Company's information technology systems, these systems are vulnerable to damage or interruption from:
- earthquake, fire, flood and other natural disasters;- terrorist attacks and attacks by computer viruses, hackers, phishing, ransomware, or other exploits;- power loss in areas not covered by backup power generators;- unauthorized access; and - computer systems, internet, telecommunications or data network failure.
An actual or perceived IT System failure, accident, or security breach could result in a material disruption to the Company's business and result in the theft, misuse, loss, corruption or improper use or disclosure of data, including personal information or confidential business information. In addition, substantial costs may be incurred to remedy the damages caused by these disruptions. Following implementation of IT Systems, the Company may from time to time install new or upgraded business management systems. To the extent that a critical system fails or is not properly implemented and the failure cannot be corrected in a timely manner, the Company may experience disruptions to the business that could have a material adverse effect on the Company's results of operations. This could result in government investigations, lawsuits (including class actions), enforcement actions and other legal and financial liability, and/or loss of confidence in the availability and security of our products and services, all of which could seriously harm our reputation and brand and impair our ability to attract and retain clients. Cyberattacks could also compromise our own trade secrets and other sensitive information and result in such information being disclosed to others and becoming less valuable, which could negatively affect our business. Although the Company seeks to mitigate the impact and severity of potential cyber threats through cyber insurance coverage, not every risk or liability can be insured, and for risks that are insurable, the policy limits and terms of coverage reasonably obtainable in the market may not be sufficient to cover all actual losses or liabilities incurred. In addition, disputes with insurance carriers, including over policy terms, reservation of rights, applicability of coverage (including exclusions), compliance with provisions (including notice) and/or insolvency of insurance carriers, may significantly affect the amount or timing of recovery.