We rely extensively on computer systems to manage our business, and our business is at risk from and may be impacted by cybersecurity attacks, data breaches and other system disruptions. These risks could include attempts to gain unauthorized access to our computer systems, data and the data of third parties retained within our systems through malware, computer viruses, attachments to e-mails, persons inside our Company or persons with access to systems inside our Company, and other significant disruptions of our information technology networks and related systems. Our business is also at risk from and may be impacted by our computer systems malfunctioning or being subject of a significant disruption.
The risk of a cybersecurity breach or disruption, particularly through a cyber-incident, including by computer hackers, foreign governments and cyber terrorists, has generally increased as the number, intensity and sophistication of attempted attacks and intrusions from around the world have increased. Although we employ a number of measures to prevent, detect and mitigate these threats, even the most well-protected information, networks, systems and facilities remain potentially vulnerable because the techniques and tools (including artificial intelligence) used in such attempted security breaches evolve and generally are not recognized until launched against a target and, in some cases, are designed to not be detected and, in fact, may not be detected. Accordingly, we may be unable to anticipate these techniques or to implement adequate security barriers or other preventative measures, and thus it is impossible for us to entirely mitigate this risk.
Moreover, our risk exposure extends beyond our internal systems. Cybersecurity events or disruptions impacting our vendors, sub-processors and service providers could impact our data and operations or the data of third parties retained within our system via unauthorized access to information or disruption of services.
Our computer systems are essential to our day-to-day operations and, in some cases, may be critical to the operations of certain of our tenants. A successful cybersecurity attack or system disruption could have severe consequences, including: (i) disrupt the proper functioning of our networks and systems, and therefore our operations and/or those of certain of our tenants; (ii) result in the unauthorized access to, and destruction, loss, theft, misappropriation or release of proprietary, confidential, sensitive or otherwise valuable information of ours or others, which others could use to compete against us or for disruptive, destructive or otherwise harmful purposes and outcomes; (iii) result in misstated financial reports, violations of loan covenants or missed reporting deadlines; (iv) result in our inability to properly monitor our compliance with the rules and regulations regarding our qualification as a REIT; (v) divert significant management resources to remedy any damages and restore systems; (vi) subject us to claims for breach of contract, damages, credits, penalties or termination of leases or other agreements; (vii) subject us to legal liability or regulatory actions stemming from data breaches or disruptions; or (viii) damage our reputation among our tenants, investors and stakeholders.
While we continuously work to strengthen our defenses, the evolving nature of cyber threats makes it impossible to entirely eliminate this risk. A successful cybersecurity attack or disruption could materially and adversely affect our business, financial performance, and reputation.