The computer systems and network infrastructure we use, including those we maintain with our service providers and vendors may be vulnerable to physical theft, fire, power loss, telecommunications failure or a similar catastrophic event, as well as cyberattacks, including through, for example, phishing attempts, brute force attacks, denial of service attacks, viruses or other malicious code, exploiting software vulnerabilities (including "zero-day attacks"), ransomware or other malware and supply chain attacks, and other disruptive problems caused by criminal threat actors. Any damage or failure that causes breakdowns or disruptions in our client relationship management, general ledger, deposit, loan and other systems could damage our reputation, result in a loss of client business, subject us to additional regulatory scrutiny, or expose us to civil litigation and possible financial liability, any of which could have a material adverse effect on us.
Cyberattacks and other technology disruptions could also jeopardize the security of information stored in and transmitted through our computer systems and network infrastructure, and those we maintain with our services providers and vendors. Information security risks have generally increased in recent years in part because of the proliferation of new technologies, the use of the Internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of organized crime, hackers, terrorists, activists, and other external parties. Our operations rely on the secure processing, transmission and storage of confidential information in our computer systems and networks. Although we believe we have appropriate information security procedures and controls in place, our technologies, systems, networks, and our clients' devices may become the target of cyberattacks that could result in the unauthorized release, gathering, monitoring, misuse, loss or destruction of our or our clients' confidential, proprietary and other information, or otherwise disrupt our or our clients' business operations. As cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities. In addition, as the regulatory environment related to information security, data collection and use, and privacy becomes increasingly rigorous, with new and constantly changing requirements applicable to our business, compliance with those requirements could also result in additional costs.
We are under continuous threat of loss due to hacking and cyberattacks especially as we continue to expand client capabilities to utilize internet and other remote channels to transact business. While we are not aware of any material cybersecurity incidents on our computer or other information technology systems, there can be no assurance that we will not be the victim of successful cyberattacks in the future that could cause us to suffer material losses. The occurrence of any cyberattack could result in potential liability to clients, reputational damage, disclosure obligations, the disruption of our operations, and regulatory concerns, all of which could adversely affect our business, financial condition or results of operations.