The computer systems and network infrastructure we, and our vendors, use may be vulnerable to physical theft, fire, power loss, telecommunications failure or a similar catastrophic event. Additionally, security breaches, denial of service attacks, viruses, ransomware, and other disruptive problems caused by cyber criminals. Any damage or failure that causes breakdowns or disruptions in our client relationship management, general ledger, deposit, loan and other systems could damage our reputation, result in a loss of client business, subject us to additional regulatory scrutiny, or expose us to civil litigation and possible financial liability, any of which could have a material adverse effect on us.
Compromised computers, phishing and other disruptions could also jeopardize the security of information stored in and transmitted through our network infrastructure. A cybersecurity breach of our information systems could lead to fraudulent activity such as identity theft, losses on the part of our banking customers, additional security costs, negative publicity and damage to our reputation and brand. In addition, our customers could be subject to scams that may result in the release of sufficient information concerning themselves or their accounts to allow unauthorized access to their accounts or our systems (e.g., "phishing" and "smishing"). Claims for compensatory or other damages may be brought against us because of a breach of our systems or fraudulent activity. If we are unsuccessful in defending against such resulting claims, we may be forced to pay damages, which could materially and adversely affect our financial condition and results of operations.
Information security risks have generally increased in recent years in part because of the proliferation of new technologies, use of the internet and telecommunications technologies to conduct financial transactions, increase in remote working, and the increased sophistication and activities of organized crime, hackers, nation state supported organizations, terrorists, and other external parties. The methods used to obtain unauthorized access, disable or degrade service or sabotage systems change frequently and often are not recognized until launched against a target. We may be unable to anticipate these techniques or to implement adequate preventative measures. Further, computer viruses or malware could infiltrate our systems and disrupt our delivery of services making our applications unavailable. Although we utilize several preventative and detective security controls in our network, they may be ineffective in preventing computer viruses or malware that could damage our relationships with our merchant customers, cause a decrease in transactions by individual cardholders, or cause us to be in non-compliance with applicable network rules and regulations. In addition, a significant incident of fraud or an increase in fraud levels generally involving our products could result in reputational damage to us, which could reduce the use of our products and services. Such incidents of fraud could also lead to regulatory intervention, which could increase our compliance costs. Compliance with the various complex laws and regulations is costly and time consuming, and failure to comply could have a material adverse effect on our business. Additionally, increased regulatory requirements on our services may increase our costs, which could materially and adversely affect our business, financial condition and results of operations. Accordingly, account data breaches and related fraudulent activity could have a material adverse effect on our future growth prospects, business, financial condition and results of operations.
Our operations rely on the secure processing, transmission and storage of confidential information in our computer systems and networks. Although we believe we have robust information security procedures and controls, our encryption software, systems, vendors, and our customers' devices themselves may become the target of cyber-attacks or information security breaches. Such events could result in the unauthorized release, gathering, monitoring, misuse, unavailability, loss, or destruction of our or our customers' confidential, proprietary and other information, or otherwise disrupt our or our customers' business operations. As cyber threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities.
We are under continuous threat of loss due to organized cyber-attacks involving unauthorized access, computer hackers, computer viruses, malicious code, and other security problems and system disruptions as we continue to expand client capabilities to utilize internet and other remote channels to transact business. We have invested and intend to continue to devote significant resources to the security of our computer systems, but they may still be vulnerable to these threats. A user who circumvents security measures can misappropriate confidential or proprietary information, including information regarding us, our personnel and/or our clients, or cause interruptions or malfunctions in operations. The occurrence of any cyber-attack or information security breach could result in significant potential liabilities to customers and other third- parties, reputational damage, the disruption of our operations and regulatory concerns, all of which could materially and adversely affect our business, financial condition or results of operations. The harm to our business could be even greater if such an event occurs during a period of disproportionately heavy demand for our products or services or traffic on our systems or networks.