We rely on our information technology systems and our operational technology systems to process, transmit and store information, such as employee, customer and vendor data, and to conduct almost all aspects of our business, including safely operating our pipelines and storage facilities, recording and reporting commercial and financial transactions and receiving and making payments. We also rely on systems hosted by third parties, with respect to which we have limited visibility and control, and that have access to or store certain of our employee, customer and vendor data. The security of these networks and systems is critical to our operations and business strategy.
Although we take proactive steps to protect us, our systems and our data from cyberattacks, such as implementing multiple layers of security, segregated systems and user access, antivirus tools, vulnerability scanning, monitoring and patch management, regular employee training, phishing tests, penetration tests, internal risk assessments, independent third-party assessments, tabletop exercises to test our incident response plan, enhanced cyber diligence of vendors and physical security measures, all companies are at risk of a cyberattack. The number and sophistication of reported cyberattacks by both state-sponsored and criminal organizations continue to increase, across industries and around the world, including attacks on operators of critical infrastructure assets, such as pipelines, as well as the third parties that provide technology services for critical infrastructure, in some cases with considerable negative impact on targeted companies' ability to conduct business.
Like other companies, we recognize that, despite our security measures, we remain subject to cybersecurity incidents due to attacks from a variety of external threat actors, internal employee error or malfeasance and cybersecurity incidents suffered by our service providers, vendors or customers. In addition, some of our employees and those of our service providers, vendors and customers may travel or work from home or other remote-work locations, where cybersecurity protections may be less robust and cybersecurity procedures and safeguards may be less effective. Moreover, certain attacker techniques and goals, such as surveillance, intelligence gathering or extended reconnaissance, may remain undetected for an extended period of time, which can increase the breadth and negative impact of an incident. A significant failure, compromise, breach or interruption in our systems or those of third parties critical to our operations could result in a disruption of our operations; physical damage to our assets or the environment; physical, financial, or other harm to employees or others; safety incidents; damage to our reputation; loss of customers or revenues; increased costs for remedial actions; and potential litigation or regulatory fines. Failures, interruptions and similar events that result in the loss or improper disclosure of information maintained in our systems and networks or those of our vendors, including personnel, customer and vendor information, have in the past and may in the future require reporting under relevant contractual obligations and laws and regulations protecting personal data and privacy and could also subject us to litigation or other liability under relevant contractual obligations, laws and regulations. Our financial results could also be adversely affected if our systems are breached or an employee, vendor or customer causes our systems to fail, either as a result of inadvertent error or deliberate tampering with or manipulation of our systems.
Due to the continued acceleration of cyberattacks, generally and against our industry, regulatory actions by federal, state and local governmental agencies in the United States and in Mexico have increased. Evolving laws and regulations governing cybersecurity and data privacy and protection pose increasingly complex compliance challenges. Although we believe that we have robust cybersecurity procedures and other safeguards in place, we cannot guarantee their effectiveness, and a significant failure, compromise, breach or interruption in our systems or those of our customers or vendors could have a material effect on our operations and the operations of our customers and vendors. As threats continue to evolve and cybersecurity and data privacy and protection laws and regulations continue to develop, we have spent and expect to continue spending additional resources to continue to enhance our cybersecurity, data protection, business continuity and incident response measures, to investigate and remediate any vulnerabilities to, or consequences of, cyber incidents, as well as on regulatory compliance.