Our computer systems and network infrastructure and those of third parties, on which we are highly dependent, are subject to cybersecurity risks and could be susceptible to cyber-attacks, information security breaches and other similar incidents. Our business relies on the secure processing, transmission, storage, retrieval and other processing of confidential, proprietary, personal and other information in our computer and data management systems and networks, and in the computer and data management systems and networks of third parties. In addition, to access our network, products and services, our customers and other third parties may use personal mobile devices or computing devices that are outside of our network environment and are subject to their own cybersecurity risks.
We, our customers, regulators and other third parties, including other financial services institutions and companies engaged in data processing, have been subject to, and are likely to continue to be the target of, cyber-attacks, information security breaches, and other similar incidents. These may include hacking, terrorist activities, identity theft, computer viruses, malicious or destructive code, phishing attacks, denial of service attacks, ransomware, improper access by employees or third parties, social engineering, attacks on personal email of employees, or other information security breaches or similar incidents that could result in the unauthorized release, gathering, monitoring, misuse, misappropriation, loss, disclosure or destruction of confidential, proprietary, personal and other information of ours, our employees, our customers or of third parties, damage our systems or otherwise materially disrupt our or our customers' or other third parties' network access or business operations. As cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any cyber-attacks, information security breaches or vulnerabilities or other similar incidents. Despite efforts to ensure the integrity of our systems and implement controls, processes, policies and other protective measures, we may not be able to anticipate or detect all cyber-attacks, information security breaches or other similar incidents, nor may we be able to implement guaranteed preventive measures against such security breaches. Cyber threats are increasing and rapidly evolving, and we may not be able to anticipate or prevent all such attacks and could be held liable for any security breach or loss.
Cybersecurity risks for banking organizations have significantly increased in recent years, in part because of the proliferation of new technologies and the use of the internet and telecommunications technologies to conduct financial transactions. For example, cybersecurity risks may increase in the future as we continue to increase our mobile payment and other internet-based product offerings and expand our internal usage of web-based products and applications and as artificial intelligence tools are increasingly used for purposes of cyber-attacks, information security breaches, and other similar incidents, including for targeted social engineering attacks. In addition, cybersecurity risks have significantly increased in recent years in part due to the increased sophistication and activities of organized crime affiliates, terrorist organizations, hostile foreign governments, disgruntled employees, service providers, activists and other external parties, including those involved in corporate espionage. Even the most advanced internal control environment may be vulnerable to compromise. For example, targeted social engineering attacks and "spear phishing" attacks are becoming more sophisticated and are extremely difficult to prevent. In such an attack, an attacker will attempt to fraudulently induce colleagues, customers or other users of our systems to disclose sensitive information in order to gain access to its data or that of its clients. Persistent attackers may succeed in penetrating defenses given enough resources, time, and motive. The techniques used by cyber criminals change frequently and may not be recognized until launched or until well after a breach has occurred.
The risk of a security breach caused by a cyber-attack at a service provider or by unauthorized service provider access has also increased in recent years. Additionally, the existence of cyber-attacks, information security breaches, or other similar incidents at third-party service providers with access to our confidential, proprietary, personal and other information may not be disclosed to us in a timely manner. While we have processes in place to monitor our third-party service providers' data and information security safeguards, we do not control such service providers' day to day operations and a successful cyber-attack, information security breach, or other similar incident at one or more of such third-party service providers is not within our control. The occurrence of any such cyber-attacks, information security breaches, or other incidents could damage our reputation, result in a loss of customer business, and expose us to additional regulatory scrutiny, civil litigation, and possible financial liability, any of which could have a material adverse effect on our financial condition and results of operations. Further, in some instances we may be responsible for the failure of such third parties to comply with government regulations.
We also face indirect technology, cybersecurity and operational risks relating to the customers, clients and other third parties with whom we do business or upon whom we rely to facilitate or enable our business activities, including, for example, financial counterparties, regulators, and providers of critical infrastructure such as internet access and electrical power. As a result of increasing consolidation, interdependence and complexity of financial entities and technology systems, a technology failure, cyber-attack, information security breach or other similar incident that significantly degrades, deletes or compromises the systems or data of one or more financial entities could have a material impact on counterparties or other market participants, including us. This consolidation, interconnectivity and complexity increases the risk of operational failure, on both individual and industry-wide bases, as disparate systems need to be integrated, often on an accelerated basis. Any third-party technology failure, cyber-attack, information security breach, or other similar incident could, among other things, adversely affect our ability to effect transactions, service our clients, manage our exposure to risk or expand our business. In addition, we, our employees, and our customers are increasingly transitioning our and their computing infrastructure to cloud-based computing, storage, data processing, networking and other services, which may increase our cybersecurity risk.
Cyber-attacks, information security breaches, and other similar incidents, whether directed at us or third parties, may result in a material loss or have material consequences. Furthermore, the public perception that a cyber-attack on our systems has been successful, whether or not this perception is correct, may damage our reputation with customers and third parties with whom we do business. Hacking or other unauthorized disclosure of personal information and identity theft risks, in particular, could cause serious reputational harm. A successful penetration or circumvention of system security could cause us serious negative consequences, including our loss of customers and business opportunities, significant business disruption to our operations and business, misappropriation or destruction of our confidential, proprietary, personal or other information and/or that of our customers or other third parties, or damage to our or our customers' and/or third parties' computers or systems, and could result in a violation of applicable data privacy and cybersecurity laws and other laws, litigation exposure, regulatory fines, penalties or intervention, loss of confidence in our security measures, reputational damage, reimbursement or other compensatory costs, additional compliance costs, and could adversely impact our results of operations, liquidity and financial condition. We may not be insured against all types of losses as a result of cyber-attacks, information security breaches and other similar incidents, and our insurer may deny coverage as to any future claim or insurance coverage may not be available on reasonable terms, or at all, or may be inadequate to cover all losses resulting from such incidents.
Although to date we have not experienced any material losses related to cyber-attacks, information security breaches, or other similar incidents, there can be no assurance that we will not suffer such losses in the future.