Our efforts to minimize the likelihood and impact of adverse cybersecurity incidents and to protect data and intellectual property may not be successful and our business could be negatively affected by cyber or security threats or other disruptions. We routinely experience various cybersecurity threats to our technology infrastructure, unauthorized attempts to gain access to our company, employee and customer-sensitive information, insider threats and other attacks. Our customers, suppliers, subcontractors and partners experience similar security threats. In addition to cyber threats, we face threats to the security of our facilities and employees, which could materially disrupt our business if carried out. We could also be impacted by the improper conduct of our employees or others working on behalf of us who have access to export controlled or Controlled Unclassified Information ("CUI"), which could adversely affect our business and reputation. The threats we face vary from attacks common to most industries, such as ransomware, to more advanced and persistent threats, highly organized adversaries, including nation state actors, which target us and other defense contractors and other companies. These threats can cause disruptions to our business operations. In addition to cyber threats, our cybersecurity and processing systems, as well as those of our third-party service providers, including cloud service providers, newly acquired companies that have not yet been integrated, and those of our clients which we periodically manage, may experience damage or disruption from a number of causes, including power outages, computer and telecommunication failures, internal design, manual or usage errors, workplace violence or wrongdoing, catastrophic events, natural disasters, and severe weather conditions. These systems may also be damaged, disrupted, or fail entirely as a result of computer viruses or other malicious codes, social-engineering schemes, unauthorized access attempts, and cyber-attacks that could include phishing-attacks, denial-of-service attacks, ransomware, malware, and hacking. If we are unable to protect sensitive information, including complying with evolving information security and data protection/privacy regulations, our customers or governmental authorities could question the adequacy of our threat mitigation and detection processes and procedures. Moreover, depending on the severity of an incident, our customers' data, our employees' data, our intellectual property (including trade secrets and research, development and engineering know-how), and other third-party data (such as subcontractors, suppliers and vendors) could be compromised.
As previously disclosed, on June 11, 2022, we were the target of an organized ransomware attack on our IT systems that, although not ultimately material to our results of operations for the year ended December 31, 2022, and December 31, 2023, or any individual fiscal quarter within those years, the attack led to the temporary disruption of our regular operations and lost revenues in 2022. See Item 7. "Management's Discussion and Analysis of Financial Condition and Results of Operations- Key Factors that Affect Our Business and Our Results-Cybersecurity."
We believe our possession of CUI, confidential or protected client information may put us at a greater risk of being targeted. In addition, we manage and operate supervisory control and data acquisition systems at a number of operations and maintenance, or O&M, client facilities, including water and biogas facilities, and another cyber-attack or other system failure could cause the facility to be shutdown, which could create regulatory compliance issues, cause a contamination event or have other adverse consequences for which we could have liability. Because of the persistence, sophistication and volume of cyber-attacks, we may not be successful in defending against an attack that could have a material adverse effect on us and due to the evolving nature of these security threats, the impact of any future incident cannot be predicted. We also typically work cooperatively with our customers, suppliers, subcontractors, and entities we acquire, who or which are subject to similar threats, to seek to minimize the impact of cyber threats, other security threats or business disruptions. These entities, which are typically outside our control and may have access to our information, have varying levels of cybersecurity expertise and safeguards, and their relationships with government contractors, including us, may increase the likelihood that they are targeted by the same cyber threats we face. The security measures and procedures we, our clients, and third-party service providers have in place to protect sensitive data and other information may not be successful or sufficient to counter data breaches, cyber-attacks, or system failures.
Our systems and those of third parties with whom we do business have been, and will likely continue to be, subject to these types of malicious attacks. To our knowledge, other than as noted above, there has not been a significant breach of our systems, and no attack on our systems has had a direct, material impact on us or our business to date. We cannot, however, predict the extent and severity of any additional future attacks that may occur.