We rely heavily on information technology systems in all aspects of our operations including our restaurant point-of sale systems, financial systems, marketing programs, employee engagement, supply chain management, cyber-security, and various other processes and transactions. This reliance has grown since the onset of the COVID-19 pandemic as we have had to rely to a greater extent on systems such as online ordering, contactless payments, online reservations, and systems supporting a remote workforce. Our ability to effectively manage and run our business depends on the reliability and capacity of our information technology systems, including technology services and systems for which we contract from third parties. These systems and services may be insufficient to effectively manage and run our business. These systems and our business needs will continue to evolve and require upgrading and maintenance over time, consequently requiring significant future commitments of resources and capital.
We cannot provide assurance, however, that the measures we take to secure and enhance these systems will be sufficient to protect our information technology systems and prevent cyber-attacks, system failures or data or information loss. Cyber-attacks, malicious internet-based activity and online and offline fraud are prevalent and continue to increase. In addition to traditional computer "hackers," threat actors, personnel (such as through theft or misuse), sophisticated nation-states and nation-state supported actors now engage in attacks. We continue to be subject to a variety of evolving threats, including but not limited to social engineering, such as phishing, malicious code (such as viruses and worms), malware (including as a result of advanced persistent threat intrusions), denial-of-service attacks (such as credential stuffing), personnel misconduct or error, supply-chain attacks, software bugs, server malfunctions and large-scale, complex automated attacks that can evade detection for long periods of time. Ransomware attacks, including those perpetrated by organized criminal threat actors, nation-states and nation-state supported actors, are becoming increasingly prevalent and severe and can lead to significant interruptions in our operations, loss of data and income, reputational harm and diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting such payments.
In the past, we have experienced the negative impacts of a breach of a service providers' network. Any breach of our or our service providers' networks, or other vendor systems, may result in the loss of confidential business and financial data, misappropriation of our consumers', users' or employees' personal information or a disruption of our business. Any of these outcomes could have a material adverse effect on our business, including unwanted media attention, impairment of our consumer and customer relationships, damage to our reputation, resulting in lost sales and consumers, fines, lawsuits, government enforcement actions (for example, investigations, fines, penalties, audits and inspections) or significant legal and remediation expenses. We also may need to expend significant resources to protect against, respond to and/or redress problems caused by any breach. Additionally, if third parties on which we rely experience cybersecurity incidents, we may not become aware of such incidents in a timely manner, which may impact our ability to mitigate their impacts, which may exacerbate the risks described above.
In addition, the increased use of employee-owned devices for communications as well as work-from-home arrangements, such as those initially implemented in response to the COVID-19 pandemic, present additional operational risks to our information technology systems, including, but not limited to, increased risks of cyber-attacks. Our software or information technology systems, or that of third parties upon who we rely to operate our business, may have material vulnerabilities and, despite our efforts to identify and remediate these vulnerabilities, our efforts may not be successful or we may experience delays in developing and deploying remedial measures designed to address any such identified vulnerabilities. It may be expensive and time-consuming to remediate material vulnerabilities, and our operations, reputation, sales and financial performance may be adversely impacted if we are not able to successfully and promptly remediate such vulnerabilities. Further, like other companies in the restaurant industry, we have in the past experienced, and we expect to continue to experience, cyber-attacks, including phishing attacks, and other attempts to breach or gain unauthorized access to, our systems. However, despite the precautions we take to mitigate the risks of such events, an attack on our enterprise information technology system, or those of third parties with which we do business, could result in theft or unauthorized disclosure of our proprietary or confidential information or a breach of confidential customer, supplier or employee information. Such events could impair our ability to conduct our operations or cause disruptions to our supply chain, which could have an adverse impact on revenue and harm our reputation. Additionally, such an event could expose us to regulatory sanctions or penalties, lawsuits or other legal action or cause us to incur legal liabilities and costs, which could be significant, in order to address and remediate the effects of an attack and related security concerns. The insurance coverage we maintain may be inadequate to cover claims or liabilities relating to a cybersecurity attack.
We also use information technology systems to process financial information and results of operations for internal reporting purposes and to comply with regulatory financial reporting, legal and tax requirements. If these systems suffer severe damage, disruption or shutdown and our business continuity plans, or those of our vendors, do not effectively resolve the issues in a timely manner, we could experience delays in reporting our financial results, which could result in lost revenues and profits, as well as reputational damage. Furthermore, we depend on information technology systems and personal information collection for digital marketing, digital commerce, consumer engagement and the marketing and use of our digital products and services. We also rely on our ability to engage in electronic communications throughout the world between and among our employees as well as with other third parties, including customers, suppliers, vendors, and consumers. Any interruption in?information technology systems may impede our ability to engage in digital commerce and result in lost revenues, damage to our reputation, and loss of users.
Moreover, these technology services and systems, communication systems, and electronic data could be subject or vulnerable to damage or interruption from earthquakes, terrorist attacks, floods, fires, power loss, telecommunications failures, computer viruses, loss of data, data breaches, or other attempts to harm our systems. A failure of these systems to operate effectively, problems with transitioning to upgraded or replacement systems, or any other failure to maintain a continuous and secure information technology network for any of the above reasons could result in interruption and delays in Guest services, adversely affect our reputation, and negatively impact our results of operations.