We rely on information technology and systems, including the Internet, commercially available software, and other applications, to process, transmit, store, and safeguard information and to manage or support a variety of our business processes, including financial transactions and maintenance of records, which may include personal identifying information and other valuable or confidential information. If we experience material failures, inadequacies, or interruptions or security failures of our information technology, we could incur material costs and losses. Further, third-party vendors could experience similar events with respect to their information technology and systems that impact the products and services they provide to us or to our customers. We rely on commercially available systems, software, tools, and monitoring, as well as other applications and internal procedures and personnel, to provide security for processing, transmitting, storing, and safeguarding confidential information such as personally identifiable information related to our employees and others, information regarding financial accounts, and information regarding customers and vendors. We take various actions, and we incur significant costs, to maintain and protect the operation and security of our information technology and systems, including the data maintained in those systems. However, it is possible that these measures will not prevent the systems' improper functioning or a compromise in security, such as in the event of a cyberattack or the improper disclosure of information. Security breaches, computer viruses, attacks by hackers, online fraud schemes, and similar breaches can create significant system disruptions, shutdowns, fraudulent transfer of assets, or unauthorized disclosure of confidential information. For example, in April 2019, we became aware that we had been a victim of criminal fraud commonly referred to as "business email compromise fraud." The incident involved the impersonation of one of our officers and improper access to his email, wherein the transfer by us of funds to a third-party account almost occurred.
Despite any defensive measures we take to manage threats to our business, our risk and exposure to these matters remain heightened because of, among other things, the evolving nature of such threats in light of advances in computer capabilities, new discoveries in the field of cryptography, new and sophisticated methods used by criminals including phishing, social engineering, or other illicit acts, or other events or developments that we may be unable to anticipate or fail to adequately mitigate. Any failure to maintain the security, proper function and availability of our information technology and systems, or certain third-party vendors' failure to similarly protect their information technology and systems that are relevant to our operations, or to safeguard our business processes, assets, and information could result in financial losses, interrupt our operations, damage our reputation, cause us to be in default of material contracts, and subject us to liability claims or regulatory penalties, any of which could materially and adversely affect us.