We rely on several centralized information technology systems throughout our Company to provide products, keep financial records, process orders, manage inventory, process shipments to customers and operate other critical functions. In addition, we currently generate a growing portion of our revenue through sales on our e-commerce platform. We manage our website and e-commerce platform internally and as a result any compromise of our security or misappropriation of proprietary information could have a material adverse effect on our business, financial condition and results of operations. We rely on encryption and authentication technology licensed from third parties to provide the security and authentication necessary to effect secure Internet transmission of confidential information, such as credit and other proprietary information. In 2024, we received ISO 27001:2022 certification, the most advanced information security standard published by the International Organization for Standardization (ISO), the world's largest developer of voluntary international standards, and the International Electrotechnical Commission. Even though our information security management system received ISO 27001:2022 certification, our, and our partners' or suppliers', information technology systems have been and may still be susceptible to damage, disruptions or shutdowns due to power outages, hardware failures, computer viruses, cyberattacks such as phishing, social engineering, ransomware, denial-of-service and other malware attacks, telecommunication failures, user errors, catastrophes or other unforeseen events. Additionally, some actors are using artificial intelligence ("AI") technology to launch more automated, targeted and coordinated attacks. Our, or our partners' or suppliers' information technology systems also may experience interruptions, delays or cessations of service or produce errors in connection with system integration, software upgrades or system migration work that takes place from time to time. If we were to experience a prolonged system disruption in the information technology systems that involve our interactions with customers or suppliers, including negatively impacting our order fulfillment and order entry on our e-commerce platform, it could result in the loss of sales and customers and significant incremental costs, which could adversely affect our business.
In addition, security breaches of our, or our partners' or suppliers', information technology systems could result in the misappropriation or unauthorized disclosure of confidential information belonging to us or to our employees, partners, customers or suppliers, including trade secrets or other intellectual property, proprietary business information, and personal information. Cybersecurity incidents, including phishing attacks and attempts to misappropriate or compromise confidential or proprietary information or sabotage enterprise IT systems are becoming increasingly frequent. While we have not, to our knowledge, experienced any material system failure, accident, or security breach to date, because techniques used to obtain unauthorized access to or to sabotage systems are constantly evolving and generally are not recognized until they are launched against a target, we cannot be sure that our continued data protection efforts and investment in information technology will prevent significant breakdowns, data leakages, breaches in our systems or the systems of our third party contractors and collaborators, or other cyber incidents in the future that could have a material adverse effect upon our reputation, business, operations, or financial condition. If such an event were to occur, it could materially disrupt our operations and programs, the development of our product candidates and production and shipment of our products. Any event that leads to unauthorized access, use, or disclosure of personal information, including personal information regarding our partners, suppliers or employees, could require us to comply with federal or state breach notification laws and foreign law equivalents, subject us to mandatory corrective action, and otherwise subject us to liability under laws and regulations that protect the privacy and security of personal information and harm our reputation. We would also be exposed to a risk of litigation and potential liability, which could materially adversely affect our business, results of operations and financial condition. In addition, the costs related to significant security breaches or disruptions could be material and exceed the limits of the cybersecurity insurance we maintain against such risks. As a result of any cyber incident, we could incur significant legal and financial exposure and reputational damages that could have a material adverse effect on our business.
Threats involving the misuse of access to our network, systems, and information by our current or former employees, contractors, vendors, or partners, whether intentional or unintentional, also pose a risk to the security of our network, systems, and information and data. For example, we are subject to the risk that employees may inadvertently share confidential information with unintended third parties, or that departing employees may take, or create their own information based on, our confidential information upon leaving the Company. In addition, any such insiders may be the victims of social engineering attacks that enable third parties to access our network, systems, and information using an authorized person's credentials. We and our network, systems, and information are also vulnerable to malicious acts by insiders, including leaking, modifying, or deleting confidential information, or performing other acts that could materially interfere with our operations and business. While we provide regular training to our employees regarding cybersecurity threats and best practices, we cannot ensure that such training or other efforts will prevent unauthorized access to or sabotage of our network, systems, and information.
In addition, we and our third-party providers are at heightened risk of theft or cyber attack of technology, data, and intellectual property through direct intrusion by private parties or foreign actors, including those affiliated with or controlled by nation-state actors. This includes attacks which could materially disrupt our systems and operations, supply chain, and ability to produce, sell and distribute our products and services. If any theft affects or attack our technology, data, or intellectual property, our efforts to protect and enforce our intellectual property rights around the world may be inadequate to obtain a significant commercial advantage from our intellectual property, and we may be at heightened risk of losing our proprietary intellectual property rights around the world, including outside of such countries, to the extent such theft, attack or intrusion destroys the proprietary nature of our intellectual property. While we implement security measures designed to reduce these risks, there is no guarantee these measures will be adequate to safeguard all systems and networks. Any failure to maintain performance, reliability, security and availability of our systems and networks may result in accidental or unlawful destruction, damage, loss, unavailability, alteration, impairment, misuse, unauthorized disclosure of, or unauthorized access to our data, including personal or proprietary information.