security systems and infrastructure, and present significant reputational, legal and regulatory costs.
Our business is highly dependent on the security, controls and efficacy of our infrastructure, computer and data management systems, as well as those of our customers, suppliers, and other third parties. To access our network, products and services, our employees, customers, suppliers, and other third parties, including downstream service providers, the financial services industry and financial data aggregators, with whom we interact, on whom we rely or who have access to our customers' personal or account information, increasingly use personal mobile devices or computing devices that are outside of our network and control environments and are subject to their own cybersecurity risks. Our business relies on effective access management and the secure collection,processing, transmission, storage and retrieval of confidential, proprietary, personal and other information in our computer and data management systems and networks, and in the computer and data management systems and networks of third parties.
Information security risks for financial institutions have significantly increased in recent years, especially given the increasing sophistication and activities of organized computer criminals, hackers, and terrorists and our expansion of online and digital customer services to better meet our customer's needs. These threats may derive from fraud or malice on the part of our employees or third-party providers or may result from human error or accidental technological failure. These threats include cyber-attacks, such as computer viruses, malicious or destructive code, phishing attacks, denial of service attacks, or other security breach tactics that could result in the unauthorized release, gathering, monitoring, misuse, loss, destruction, or theft of confidential, proprietary, and other information, including intellectual property, of ours, our employees, our customers, or third parties, damages to systems, or otherwise material disruption to our or our customers' or other third parties' network access or business operations, both domestically and internationally.
While we maintain an Information Security Program that continuously monitors cyber-related risks and ultimately ensures protection for the processing, transmission, and storage of confidential, proprietary, and other information in our computer systems and networks, as well as a vendor management program to oversee third party and vendor risks, there is no guarantee that we will not be exposed to or be affected by a cybersecurity incident. For example, as previously disclosed, one of our third-party vendors was the victim of a security incident in April 2023 involving a set of data that included some information on FirstBank's mortgage loan business. In response to learning of the incident, we promptly launched our own internal investigation, which confirmed that our own systems were not compromised, and any operational and financial impact was minimal. Our vendor has indicated (and we have no evidence to the contrary) that to date there is no evidence that there has been any actual or attempted misuse of information. The
Corporation has not incurred any material expenses related to the incident and does not expect any future impact.
Cyber threats are rapidly changing, and future attacks or breaches could lead to other security breaches of the networks, systems, or devices that our customers use to access our integrated products and services, which, in turn, could result in unauthorized disclosure,release, gathering, monitoring, misuse, loss or destruction of confidential, proprietary, and other information (including account data information) or data security compromises. As cyber threats continue to evolve, we may be required to expend significant additional resources to modify or enhance our protective measures, investigate, and remediate any information security vulnerabilities or incidents and develop our capabilities to respond and recover. The full extent of a particular cyberattack, and the steps that the
Corporation may need to take to investigate such attack, may not be immediately clear, and it could take considerable additional time for us to determine the complete scope of information compromised, at which time the impact on the Corporation and measures to recover and restore to a business-as-usual state may be difficult to assess. These factors may also inhibit our ability to provide full and reliable information about the cyberattack to our customers, third-party vendors, regulators, and the public.
A successful penetration or circumvention of our system security, or the systems of our customers, suppliers, and other third parties,could cause us serious negative consequences, including significant operational, reputational, legal, and regulatory costs and concerns.
Any of these adverse consequences could adversely impact our results of operations, liquidity, and financial condition. In addition,our insurance policies may not be adequate to compensate us for the potential costs and other losses arising from cyber-attacks,failures of information technology systems, or security breaches, and such insurance policies may not be available to us in the future on economically reasonable terms, or at all. Insurers may also deny us coverage as to any future claim. Any of these results could harm our growth prospects, financial condition, business, and reputation.