A cybersecurity incident is considered to be an unauthorized occurrence, or a series of related unauthorized occurrences, on or conducted through our information systems that jeopardizes the confidentiality, integrity, or availability of our information systems or any information residing therein. While we have not experienced any material cybersecurity incidents in the past, the risk of such an incident, including as a result of computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. As our reliance on technology has increased, so have the risks posed to our systems, both internal and those we have outsourced. Risks that could directly result from the occurrence of a cybersecurity incident include physical harm to occupants of our buildings, physical damage to our buildings, actual cash loss, operational interruption, regulatory investigations, fines and orders, litigation, damage to our relationship and reputation with our tenants, potential errors from misstated financial reports, violations of loan covenants, missed reporting deadlines, and private data exposure, among others. Any or all of the preceding risks could have a material adverse effect on our results of operations, financial condition and cash flows.
Insider or employee cyber and security threats, including as a result of social engineering and phishing attempts, are increasingly a concern for all companies, including ours. We are continuously working to install new networks and to upgrade our existing networks, building operating and information technology systems, and to train employees against phishing, malware and other cyber risks to ensure that we are protected, to the greatest extent possible, against cybersecurity risks and incidents. However, such upgrades, new technology and training may not be sufficient to protect us from all risks.
We are continuously developing and enhancing our controls, processes, and practices designed to protect our systems, computers, software, data, and networks from attack, damage, or unauthorized access. This continued development and enhancement will require us to expend additional resources, including to investigate and remediate any information security vulnerabilities that may be detected. Although we make efforts to maintain the security and integrity of these types of information technology networks and related systems, and despite various measures we have implemented to manage the risk of a security breach or disruption, there can be no assurance that our security efforts and measures will be effective or that attempted security breaches or disruptions would not be successful or damaging. Even the most well protected information, networks, systems and facilities remain potentially vulnerable because the techniques used in such attempted security breaches evolve and generally are not recognized until launched against a target, and in some cases are designed to not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk.
Further, one or more of our tenants could experience a cyber incident which could impact their operations and ability to perform under the terms of their lease with us.