Substantially all aspects of our business operations rely on digital technology. We use computers, mobile devices, social networking and other online platforms to connect with our employees, customers, vendors, as well as other individuals and third parties. These uses give rise to cybersecurity risks, including security breach, ransomware, espionage, system disruption, theft and/or inadvertent, accidental, unlawful, unauthorized access, loss, alteration, destruction and/or release of information. Our business necessitates the processing, collection, use, storage and transmission of numerous classes of sensitive and/or confidential information and intellectual property, including individuals' personal information, private and sensitive employment-related personal information, and financial and strategic information about the Company and other businesses. In addition to our own safeguarding efforts, we also rely on third parties to process, collect and store sensitive data, including a Payment Card Industry compliant third party to protect our customers' credit card information.
We are regularly the target of attempted cyber intrusions, and we anticipate continuing to be subject to such attempts as cyber intrusions become increasingly sophisticated and more difficult to predict and protect against. Geopolitical conflicts also increase the risk of cyber incidents. As such, we commit substantial resources to continuously monitor and further develop our networks and infrastructure to prevent, detect, and address the risk of unauthorized access, misuse, computer viruses and other events. Our security programs and measures do not prevent all intrusions. Cyber intrusions require a significant amount of time and effort to assess and remedy, and our incident response efforts may not be effective in all cases. Although we believe that the probability of occurrence of a significant cybersecurity incident is less than likely, if such an incident were to occur, the impact on the Company could be substantial. The Company experienced a cyber intrusion in the first quarter of 2021 that was promptly detected, and the third-party software vulnerability was quickly remediated. There was no impact to the Company's operations, services or financial statements. A subsidiary of WMI was named as a defendant in a class action lawsuit related to this incident. The parties have agreed to a settlement that is currently pending final court approval, and such settlement will not have a material adverse effect on the Company's business, financial condition, results of operations or cash flows; however, assessing and responding to this intrusion required a significant amount of time and management attention. While the magnitude of future cyber intrusions that result in a theft, destruction, loss, misappropriation, or release of sensitive and/or confidential information or intellectual property, or material interference with our information technology systems or the technology systems of third parties on which we rely cannot be predicted, such incidents could result in material business disruption, direct financial loss, negative publicity, brand damage, alleged violation of privacy laws, loss of customers, potential regulatory enforcement or private litigation liability and competitive disadvantage. We maintain insurance for cyber incidents; however, due to policy terms, limits and exclusions, such insurance may not apply in all cases, and it may not be adequate to cover all liabilities incurred.
As the Company pursues its strategy to grow through acquisitions and to pursue new initiatives that improve our operations and cost structure, the Company is also expanding and improving its information technologies, resulting in a larger technological presence, utilization of "cloud" computing services, and corresponding exposure to cybersecurity risk. Certain new technologies, such as use of autonomous vehicles, remote-controlled equipment, virtual reality, automation and AI, present new and significant cybersecurity safety risks that must be analyzed and addressed before implementation. If we fail to assess and identify cybersecurity risks associated with acquisitions and new initiatives, we may become increasingly vulnerable to such risks.
Increased state, federal and international laws and regulations related to cybersecurity protections and disclosures will require additional resources for compliance, and any inability, or perceived inability, to adequately address new requirements could subject us to regulatory enforcement, private litigation, public criticism, disrupt our operations, cause us to lose customers, result in additional costs and legal liability, damage our reputation, and otherwise harm our business.