Our business, like other companies in our industry, has become increasingly dependent on digital technologies, including technologies that are managed by third-party service providers on whom we rely to help us collect, host or process information. Such technologies are integrated into our business operations. Use of the internet and other public networks for communications, services, and storage, including "cloud" computing, exposes all users (including our business) to cybersecurity risks.
While we and our third-party service providers commit resources to the design, implementation, and monitoring of our information systems, there is no guarantee that our security measures will provide absolute security. Despite these security measures, we may not be able to anticipate, detect, or prevent cyberattacks, particularly because the methodologies used by attackers change frequently or may not be recognized until launched, and because attackers are increasingly using techniques designed to circumvent controls and avoid detection. We and our third-party service providers may therefore be vulnerable to security events that are beyond our control, and we may be the target of cyber-attacks, as well as physical attacks, which could result in information security breaches and significant disruption to our business.