Our products and services systems and our internal corporate information technology ("IT") systems (our products, services and internal corporate IT systems collectively referred to as our "IT Systems") have in the past been, and will in the future be, subject to numerous and evolving cybersecurity risks that threaten the confidentiality, integrity, and availability of our IT Systems and the data stored therein. These actual and potential risks include diverse threat actors, such as state-sponsored organizations and opportunistic hackers and hacktivists, as well as diverse attack vectors, such as social engineering/phishing, malware (including ransomware), malfeasance by insiders, human, or technological error, and as a result of malicious code embedded in open-source software, or misconfigurations, "bugs" or other vulnerabilities in our IT Systems, or the commercial software that is integrated into our (or our suppliers' or service providers') IT Systems, products, or services. Cyberattacks are expected to accelerate on a global basis in frequency and magnitude as threat actors are becoming increasingly sophisticated in using techniques and tools-including AI-that circumvent security controls, evade detection, and remove forensic evidence. As a result, we may be unable to detect, investigate, remediate, or recover from future attacks or incidents, or to avoid a material adverse impact to our IT Systems or our business. Moreover, the continued integration of AI into our products and business processes, as well as the use of AI by our third party providers, may bring about unknown and currently unmanaged risks that could cause a material adverse impact to our IT Systems, business operations and data security, including risks associated with the consequences of inadvertent or unauthorized access to, or use of, customer information.
We rely on our IT Systems, which are maintained both internally and externally by third parties, to operate our business, including to process, on a daily and time sensitive basis, a large number of complicated transactions. Any information security breach in our IT Systems has the potential to impact our customer information and sensitive company information, including our financial reporting capabilities, which could result in the potential loss of business and our ability to accurately report financial results. If any of the IT Systems fail to operate properly or become disabled even for a brief period, we could miss a critical filing period or lose control of customer data, either of which could result in financial loss, a disruption of our business, liability to customers, or regulatory intervention. Remote and hybrid working arrangements at our company (and at many third-party providers) increase the risks associated with our IT Systems due to the challenges associated with managing remote computing assets and security vulnerabilities that are present in many non-corporate and home networks.
Like other software providers, we operate with our customers on a shared responsibility model. In most instances, our customers administer access to the data of their employees. While we provide certain security and data management capabilities and encourage customers and their employees to implement certain security controls in connection with use of our products and services, they may not implement controls sufficient to protect their confidential information. To the extent they do not take advantage of those capabilities and implement sufficient security controls, customers and their employees may suffer a cybersecurity attack on their own systems and allow a malicious actor access to confidential information held in our IT Systems. Even if such a breach is unrelated to our security programs or practices, it could cause us reputational harm and require us to incur significant costs to adequately assess and respond.
We have acquired and continue to acquire companies with cybersecurity vulnerabilities and/or unsophisticated security measures built into their products and services, which exposes us to additional cybersecurity, operational, and financial risks, and have and will continue to demand significant resources to attempt to mitigate those risks.
As we retire our legacy products like our bureau payroll services or sunset certain acquired products, we decrease investments in maintaining those systems, which creates the potential for a security breach of those systems.
For example, in 2009, an alleged criminal hack into a discontinued U.S. payroll application led to us becoming subject to a 20-year consent order with the U.S. Federal Trade Commission ("FTC") that became final in June 2011. In connection with the order, we are required to have portions of our security program, which apply to certain segments of our U.S. business,reviewed by an independent third party on a biennial basis. Maintaining, updating, monitoring, and revising an information security program in an effort to ensure that it remains reasonable and appropriate in light of changes in security threats, changes in technology, and security vulnerabilities that arise from legacy systems is time-consuming and complex, and is an ongoing effort. While we have taken and continue to take steps to ensure compliance with the consent order, if we are determined to be out of compliance with the consent order, or if any new breaches of security occur, the FTC may take enforcement actions or other parties may initiate a lawsuit. Any such resulting fines and penalties could have a material adverse effect on our liquidity and financial results, and any reputational damage therefrom could adversely affect our relationships with our existing customers and our ability to attain new customers.
Because we make extensive use of third party suppliers and service providers in our IT Systems, such as cloud services that support our internal and customer-facing operations, successful cyberattacks that disrupt or result in unauthorized access to third party IT systems can materially impact our operations and financial results. We and certain of our third-party providers regularly experience cyberattacks and other incidents, and we expect such attacks and incidents to continue in varying degrees. For example, in July 2024, a software update by CrowdStrike Holdings, Inc., a cybersecurity technology company, caused widespread crashes of Windows systems into which it was integrated, including certain Windows systems that may have been used by our third-party service providers, vendors, and customers. As of the date of this report, we have not experienced any material impacts as a result of the CrowdStrike software update. Though we rely on a third-party service to monitor suppliers and service providers for potential cybersecurity incidents, such monitoring itself cannot prevent such incidents and we could, in the future, experience similar third-party software-induced interruptions to our operations. Any adverse impact to the availability, integrity or confidentiality of our IT Systems could result in legal claims or proceedings (such as class actions), regulatory investigations and enforcement actions, fines and penalties, negative reputational impacts that cause us to lose existing or future customers, and/or significant incident response, system restoration or remediation and future compliance costs. Any or all of the foregoing could materially adversely affect our business, results of operations, and financial condition. Finally, we cannot guarantee that any costs and liabilities incurred in relation to an attack or incident will be covered by our existing insurance policies or that applicable insurance will be available to us in the future on economically reasonable terms or at all.