We collect and store sensitive data, including intellectual property, our proprietary business information and that of our customers, suppliers and business partners, and personally identifiable information of our customers and employees, on our networks. Maintaining the security of this information is critical to our operations and business strategy, and our customers expect that we will securely maintain their information. Despite our security measures, our information technology and infrastructure may be vulnerable to attacks by hackers resulting from employee error, malfeasance or other disruptions.
On June 5, 2025, we discovered that a threat actor had gained unauthorized access to certain of our information technology ("IT") systems and data (the "Cyber Incident"). As a result of the Cyber Incident and our response to it, certain IT systems and data were unavailable to us for a period of time. We have incurred certain costs and expenditures related to the Cyber Incident. We remain subject to various risks due to the Cyber Incident, including the adequacy of processes during the period of disruption of our IT systems, diversion of management's attention, potential litigation, changes in customer behavior, and regulatory scrutiny.
Our IT systems and infrastructure may be vulnerable to future cyber incidents, attacks by hackers resulting from employee error or malfeasance, or other disruptions. Any future cyber incident or IT breach could compromise our networks and the information stored on them could be accessed, publicly disclosed, lost or stolen. The Cyber Incident or any future cyber incident could result in legal claims or proceedings, liability under personal privacy laws and regulatory penalties, disrupt our operations and the services that we provide to our customers, damage our reputation and cause a loss of confidence in our products and services, any of which could adversely affect our business and competitive position.
Our IT systems, and those of third-party suppliers with whom we contract, require an ongoing commitment of significant resources to maintain, protect and enhance existing systems and develop new systems to keep pace with continuing changes in IT, evolving systems and regulatory standards, and changing threats. These systems could be vulnerable to service interruptions or to security breaches from inadvertent or intentional actions by our employees, third-party vendors and/or business partners, or from cyber-attacks by malicious third parties. We also are subject to other cyber-attacks, including state-sponsored cyber-attacks, industrial espionage, insider threats, computer denial-of-service attacks, computer viruses, ransomware and other malware, payment fraud or other cyber incidents. Any significant breakdown, intrusion, breach, interruption, corruption or destruction of these systems could have a material adverse effect on our business and reputation and could materially adversely affect our results of operations and financial condition.