We maintain information and applications necessary to conduct our business in data centers, on our networks and with third-party cloud services, including confidential and proprietary information, as well as personally identifiable information regarding our customers and employees. Our information technology infrastructure may be vulnerable to attacks by hackers or breached due to employee error, malfeasance, or other disruptions which creates the risk that our digital information could be stolen or tampered with or that our business operations could be materially and adversely impacted. This risk is heightened now that most of our office-based employees work remotely several days a week.
We maintain systems designed to prevent and monitor for such intrusion, tampering, and theft, and we continue to enhance and update these technologies as security threats evolve and become more sophisticated. We also obtain assurances from outsourced service providers regarding the sufficiency of their security procedures and, where appropriate, assess the protections employed by these third parties. Despite these efforts, there can be no assurance that we will successfully identify an incident of intrusion, tampering or theft in a timely manner or at all, and in advance of it impacting the Company, and any such impact could be material. Further, our costs to maintain and upgrade our security systems could increase significantly as cybersecurity threats increase.
Despite our efforts to secure and monitor our information technology systems, the possibility of intrusion, tampering, and theft cannot be eliminated entirely. We have from time to time experienced cybersecurity breaches, such as "phishing" attacks, business email compromises, employee or insider error, brute force attacks, unauthorized parties gaining access to our information technology systems, and similar incidents. To date these incidents have not had a material impact on our business, but there can be no assurance that future incidents will not cause material impacts. The techniques used to obtain unauthorized access, disable or degrade service, or sabotage systems change frequently and often are not recognized until launched against a target. Additionally, there can be no assurance that the actions we and our outsourced providers take will prevent a breach of, or attack on the information technology systems which support the day-to-day operation of our business or house our confidential, proprietary and personally identifiable information.
Any such intrusion, tampering or theft (and any resulting disclosure or use of confidential, proprietary or personally identifiable information) could compromise our network, the network or data center of a third-party hosting key operating systems or data, or to whom we have disclosed confidential, proprietary or personally identifiable information, or a third-party cloud service provider. Any of these impacts could result in a disruption to our information technology infrastructure, interruption of our business operations, violation of applicable privacy and other laws or standards, significant legal and financial exposure beyond the scope or limits of any insurance coverage (including legal claims and proceedings and regulatory enforcement actions and penalties), increased operating costs associated with remediation activities, and a loss of confidence in our security measures, all of which could harm our reputation with our customers, end-users, employees and other stakeholders and materially adversely affect our business and results of operations. Contractual provisions with third parties, including cloud service providers, may limit our ability to recover these losses.
In the event a significant cybersecurity event is detected, we maintain disclosure controls and procedures that are designed to enable us to promptly analyze the impact on our business, respond expediently, appropriately and effectively and repair any damage caused by such incident, as well as consider whether such incident should be disclosed publicly. The Company also employs technology designed to detect potential incidents of intrusion, tampering and theft before they impact the Company, and we continue to enhance and update these technologies. However, there can be no assurance that we will successfully identify such an incident in a timely manner or at all, and in advance of it impacting the Company, and any such impact could be material.