We depend upon data processing, communication systems, and information exchange on a variety of platforms and networks and over the internet to conduct business operations. In addition, we rely on the services of a variety of vendors to meet our data processing and communication needs. Although we require third party providers to maintain certain levels of security, such providers remain vulnerable to breaches, security incidents, system unavailability or other malicious attacks that could compromise sensitive information. The risk of experiencing security incidents and disruptions, particularly through cyber-attacks or cyber intrusions has generally increased as the number, intensity and sophistication of attempted attacks and intrusions by organized crime, hackers, terrorists, nation-states, activists and other external parties has increased. These security incidents may result in disruption of our operations; material harm to our financial condition, cash flows and the market price of our common stock; misappropriation of assets; compromise or corruption of confidential information; liability for information or assets stolen during the incident; remediation costs; increased cybersecurity and insurance costs; regulatory enforcement; litigation; and damage to our stakeholder and customer relationships.
Moreover, in the normal course of business, we and our service providers collect and retain certain personal information provided by our customers, employees and vendors. If this information gets mishandled, misused, improperly accessed, lost or stolen, we could suffer significant financial, business, reputational, regulatory or other harm. These risks may increase as we continue to increase and expand our usage of web-based products and applications.
These risks require continuous and likely increasing attention and resources from us to, among other actions, identify and quantify potential cybersecurity risks, and upgrade and expand our technologies, systems and processes to adequately address the risk. We provide on-going training for our employees to assist them in detecting phishing, malware and other malicious schemes. Such attention diverts time and resources from other activities and, while we have implemented policies and procedures designed to maintain the security and integrity of the information we and our service providers collect on our and their computer systems, there can be no assurance that our efforts will be effective. Likewise, while we have implemented security measures to prevent unauthorized access to personal information and prevent or limit the effect of possible incidents, we can provide no assurance that a security breach or disruption will not be successful or damaging, or, if any such breach or disruption does occur, that it can be sufficiently or timely remediated.
Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed not to be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk.