We are heavily reliant upon internal and third party technology systems, networks and applications to view, process, transmit and store information, including sensitive client and proprietary information, and to conduct many of our business activities and transactions with our clients, vendors and other third parties. In addition, in recent years we have increased our use of and reliance on mobile, remote work and cloud technologies. Maintaining the integrity of these systems, networks and technologies is critical to the success of our business operations. We rely on our (and our vendors') information security and cybersecurity infrastructure, policies, procedures and capabilities to protect these systems, networks and applications and the data that reside on or are transmitted through them.
To date, we have not experienced any known material breaches of or interference with our systems, networks or applications, nor to our knowledge have we been materially impacted by a breach of our vendors' systems, networks or applications. However, we routinely encounter and address such threats, and the number and frequency of potential threats or security incidents experienced by us directly, or indirectly via our vendors, has increased in recent years due to, among other factors, an increase in the number of security vulnerabilities, more sophisticated and automated attacks, proliferation of cloud-based solutions, our increased operations in China and Hong Kong and the increase in remote work. Our experiences with cybersecurity and other technology threats have included phishing scams, introductions of malware, attempts at electronic break-ins, brand infringements or impersonations, ransomware and unauthorized payment requests.
Despite the measures we have taken and may in the future take to address and mitigate cybersecurity and other technology risks, which are discussed further in "Item 1C-Cybersecurity" in Part I of this report, we cannot guarantee that our systems, networks and applications, and those of third parties on whom we rely, will not be subject to disruptions, system failures or outages, unauthorized access, ransomware, breaches or other interference. In addition, our third-party service providers and other intermediaries with which we conduct business and transmit data have in the past been, and may in the future be, subject to successful cyberattacks or other data security events, and, despite our service provider oversight processes and practices, we cannot ensure that such third parties, or the service providers to such third parties, have appropriate controls in place to protect the confidentiality of data in the custody of such party or to allow them to continue their business operations, including the provision of their services to us.
Cybersecurity and information security events may result in operational disruptions as well as unauthorized access to or the disclosure, corruption or loss of our proprietary information or our clients' or employees' information. Any such events may result in legal claims, regulatory scrutiny and liability, reputational damage, the incurrence of costs to eliminate or mitigate further exposure, the loss of clients or other damage to our business. Ultimately, such an event may have a material adverse impact on our business, financial condition or results of operations. In addition, required public notification of such incidents could exacerbate the harm to our business, financial condition or results of operations. Even if our and our service providers' technology infrastructure and the confidentiality of sensitive data are successfully protected, we may incur significant expense in connection with our response to any such attacks and the adoption and maintenance of additional security measures. We cannot be certain that future advances in criminal capabilities, the discovery of new vulnerabilities or other developments will not compromise or breach the security measures protecting the networks, systems and applications we use.