Our business is dependent upon information systems and other digital technologies to control our plants, pipelines and other assets, process transactions, and summarize and report results of operations.
Cybersecurity risks have grown due to the proliferation of new technologies, increasingly sophisticated cyber attacks, and financially-motivated cybercrime, as well as international and domestic political factors, including geopolitical tensions, armed conflicts, civil unrest, sabotage, terrorism, and state-sponsored or other cyber espionage. Human error or malfeasance can also contribute to cyber incidents, which may occur internally or externally and at any point in our supply chain. Because of the critical nature of our infrastructure and our use of information systems and other digital technologies to control our assets, we face a heightened risk of cybersecurity incidents, such as ransomware, theft, misplaced or lost data, programming errors, phishing attacks, denial-of-service attacks, acts of vandalism, computer viruses, malware, hacking, malicious attacks, software vulnerabilities, employee errors and/or malfeasance, or other attacks, security or data breaches, or other cybersecurity incidents. Cyber threat actors have attacked, and continue to threaten to attack, energy infrastructure, including our assets. Government agencies have warned that attacks targeting critical infrastructure - including pipelines, utilities, and power generation facilities - are increasing in sophistication, magnitude, and frequency. These risks may escalate during periods of heightened geopolitical tensions.
We have experienced an increase in unauthorized attempts to access our systems and company data, and expect this trend to continue. While we invest heavily in security measures to prevent unwanted intrusions and to protect our systems and data, whether such data is housed internally or by external third parties, we and our third-party vendors have experienced, and expect to continue to experience, cyber attacks of varying degrees, including denial-of-service attacks. To date, these attacks have not, to our knowledge, had a material adverse impact on our business, operations or financial results, but future incidents could.
We expect that our technology systems, as well as those of our vendors or other service providers, will continue to be targeted, which could compromise our data and systems, and access thereto by us, our customers or others. Such events could disrupt our operations, impair our ability to correctly record, process and report transactions, or result in the loss of information. There is no certainty that our business continuity measures will completely eliminate the risk of disruption or adverse business effects. Furthermore, we and some of our third-party service providers (who may in turn also use third-party service providers) collect, process or store sensitive data in the ordinary course of our business, including personal information of employees, customers, landowners, and investors, as well as intellectual property or other proprietary business information. These risks are heightened following the Acquisitions, which increase the attack surface and the volume of personal customer information processed.
Consequences of a significant cyber incident could include revenue loss, repair, remediation or restoration costs, regulatory action, fines and penalties, litigation, breach of contract or indemnity claims, cyber extortion or ransomware payments, implementation costs for additional security measures, loss of customers, customer dissatisfaction, reputational harm, or other adverse consequences, costs or financial loss. Regardless of the method or form of cyber attack or incident, any or all of the above could materially adversely affect our reputation, business, operations or financial results.
New and changing cybersecurity legislation, regulations and orders have been implemented or are proposed, resulting in additional regulatory oversight and compliance requirements, which require internal and external resources and increase costs. The potential impacts of future cybersecurity-related legislation, regulations or orders on our business remain uncertain and cannot be reliably predicted.
A cyber attack may occur and remain undetected for an extended period, representing an inherent risk that we must continually manage. Investigations of cyber attacks or other security incidents are often unpredictable and typically take time to complete before full and reliable information becomes available. In this period, we may lack visibility into the damage or the optimal corrective approach, allowing issues to persist or escalate and driving up both costs and risks. Remediation efforts may not be successful. Failure to implement, maintain and upgrade adequate safeguards could materially and adversely affect our results of operations, cash flows, and financial condition. Recent rulemakings may require disclosure of cybersecurity incidents before investigations or remediations are complete, adding complexity and risk. As cyber attacks continue to evolve, we may need to invest significant additional resources to strengthen protections and address vulnerabilities.
Media reports about a cyber attack or other significant security incident, whether accurate or not, or our failure to make adequate or timely disclosures to the public, regulators, law enforcement, or affected individuals could negatively impact our operating results and result in other adverse consequences, including reputational harm, damage to our competitiveness, strained relationships with customers, partners, suppliers, investors, and other stakeholders. Such circumstances could also lead to operational disruption, increased remediation and protection costs, significant litigation or regulatory action, fines or penalties, all of which could materially adversely affect our business, operations, reputation or financial results.