Through our sales channels and electronic communications with customers generally, we collect and maintain confidential information that customers provide to us in order to purchase products or services. We also acquire and retain information about suppliers and employees in the normal course of business. Computer hackers may attempt to penetrate our information systems or our vendors' information systems and, if successful, misappropriate confidential customer, supplier, employee or other business information. In addition, one of our employees, contractors or other third party may attempt to circumvent security measures in order to obtain such information or inadvertently cause a breach involving such information. Loss of information could expose us to claims from customers, suppliers, financial institutions, regulators, payment card associations, employees and other persons, any of which could have an adverse effect on our financial condition and results of operations. We may not be able to adequately insure against cyber risks.
Despite our security measures and those of our third-party service providers, our systems may be vulnerable to interruption or damage from computer hacks, computer viruses, worms or other destructive or disruptive software, process breakdowns, denial of service attacks, malicious social engineering or other malicious activities, or any combination of the foregoing. Our computer systems have been, and will likely continue to be, subject to cyber incidents. A cyber incident is considered to be any adverse event that threatens the confidentiality, integrity or availability of our information resources. More specifically, a cyber incident is an intentional attack or an unintentional event that can include gaining unauthorized access to systems to disrupt operations, corrupt data or steal confidential information. Our three primary risks that could directly result from the occurrence of a cyber incident include operational interruption, damage to our reputation and image and private data exposure. For example, in August 2020, the Company's computer network was the target of a cyber-attack that we believe was orchestrated by a foreign actor. The systems housing confidential vendor, customer and employee data were not breached in this attack. The costs incurred to remedy the breach were not material to the results of the Company, and the increased cost of future mitigating measures are not expected to be material to our results. However, in the future, if we suffer a more significant cyber incident, we may be required to shut off our computer systems, reboot them and reestablish our information from back up sources. In other future incidents, we may be required under various laws to notify any third parties whose data has been compromised. While we have implemented controls and taken other preventative actions to further strengthen our systems against future attacks, these controls and preventative actions may not be effective against future attacks. Any breach of network, information systems, or our data security could result in a disruption of our services or improper disclosure of personal data or confidential information, which could harm our reputation, require us to expend resources to remedy such a security breach or defend against further attacks or subject us to liability under laws that protect personal data, resulting in increased operating costs or loss of revenue.