Information technology, communication networks, and related systems are essential to the operation of our business. We use these systems to manage our tenant, vendor and customer relationships, internal communications, accounting and record-keeping systems, and many other key aspects of our business. Our operations rely on the secure processing, storage, and transmission of confidential and other information in our computer systems and networks, which also depend on the strength of our procedures and the effectiveness of our internal controls.
A security incident may occur through physical break-ins, breaches of our secure network by an unauthorized party, software vulnerabilities, malware, computer viruses, attachments to emails, employee theft or misuse, social engineering, or inadequate use of security controls. Outside parties may attempt to fraudulently induce our employees to disclose sensitive information or transfer funds via illegal electronic spamming, phishing, spoofing or other tactics. Additionally, cyber attackers can develop and deploy malware, credential theft or guessing tools, and other malicious software programs to gain access to sensitive data or fraudulently obtain assets we hold.
We have implemented security measures to safeguard our systems and data and to manage cyber security risk. We monitor and develop our information technology networks and infrastructure and invest in the development and enhancement of our controls designed to prevent, detect, address, and mitigate the risk of unauthorized access, misuse, computer viruses, and other events that could have a security impact. We conduct periodic security awareness trainings for our employees to educate them on how to identify and alert management regarding phishing emails, spoofed or manipulated electronic communications, and other critical security threats. We have implemented internal controls around our treasury function including enhanced payment authorization procedures, verification requirements for new vendor set-up and vendor information changes and bolstered outgoing payment notification processes and account reconciliation procedures.
While, to date, we are not aware of having experienced a significant security incident or cyber-attack, there can be no assurance that our actions, security measures, and controls designed to prevent, detect, or respond to intrusion; to limit access to data; to prevent loss, destruction, alteration, or exfiltration of business information; or to limit the negative impact from such attacks can provide absolute security against a security incident.
A principal reason that we cannot provide absolute protection from security incidents is that it may not always be possible to anticipate, detect, or recognize threats to our systems, or to implement effective preventive measures against all security incidents due to, among other things, the frequent change in techniques used in cyber-attacks, which may not be recognized until launched, and the wide variety of sources from which a cyber-attack can originate. We may not be able to immediately address the consequences of a security incident due to a cyber-attack.
The extent of a particular cyber-attack and the steps that we may need to take to investigate the attack may not be immediately clear. Therefore, in the event of an attack, it may take a significant amount of time before such an investigation can be completed. During an investigation, we may not necessarily know the extent of the damage incurred or how best to remediate it, and certain errors or actions could be repeated or compounded before they are discovered and remediated, which could further increase the costs and consequences of a cyber-attack.
Even if we are not targeted directly, cyber-attacks on the U.S. government, financial markets, financial institutions, or other businesses, including our tenants, vendors, software creators, cloud providers, and other third parties with whom we do business, could disrupt our normal business operations and networks.
We maintain insurance to protect ourselves against certain losses incurred in the event of a security incident or disruption of our information systems. However, we cannot be certain that the coverage will be adequate to compensate us for all damages that may arise. In addition, we cannot be certain that such insurance coverages will remain available to us in the future on commercially reasonable terms, or at all.