Our businesses are highly dependent on our ability to process, on a daily basis, transactions across numerous and diverse markets and the transactions we process have become increasingly complex. If any of our financial, accounting or other data processing systems do not operate properly or are disabled or if there are other shortcomings or failures in our internal processes, people or systems, we could suffer an impairment to our liquidity, a financial loss, a disruption of our businesses, liability to clients, regulatory intervention or reputational damage. These systems may fail to operate properly or become disabled as a result of events that are wholly or partially beyond our control, including a disruption of electrical or communications services or our inability to occupy one or more of our buildings. The inability of our systems to accommodate an increasing volume of transactions could also constrain our ability to expand our businesses.
Our financial and other data processing systems will rely on access to and the functionality of operating systems maintained by third parties. If the accounting, trading or other data processing systems on which we are dependent are unable to meet increasingly demanding standards for processing and security or if they fail or have other significant shortcomings, we could be adversely affected. Such consequences may include our inability to effect transactions and manage our exposure to risk.
We may be required to expend significant additional resources to modify our protective measures or to investigate and remediate vulnerabilities or other exposures, and we may be subject to litigation and financial losses that are either not insured against or not fully covered through any insurance maintained by us. The increased use of smartphones, tablets and other mobile devices as well as cloud computing may also heighten these and other operational risks. We and our third-party providers are the subject of attempted unauthorized access, computer viruses and malware, and cyberattacks designed to disrupt or degrade service or cause other damage and denial of service. Cyberattacks and other cyber incidents are occurring more frequently, are constantly evolving in nature, are becoming more sophisticated and are being carried out by groups and individuals (including criminal hackers, hacktivists, state-sponsored actors, criminal and terrorist organizations, individuals or groups participating in organized crime and insiders) with a wide range of expertise and motives (including monetization of corporate, payment or other internal or personal data, theft of computing resources, financial fraud, operational disruption, theft of trade secrets and intellectual property for competitive advantage and leverage for political, social, economic and environmental reasons). Such cyberattacks and cyber incidents can take many forms including cyber extortion, denial of service, social engineering, such as impersonation attempts to fraudulently induce employees or others to disclose information or unwittingly provide access to systems or data, introduction of viruses or malware, such as ransomware through phishing emails, website defacement or theft of passwords and other credentials, unauthorized use of computing resources for digital currency mining and business email compromises. There can be no assurance that such unauthorized access or cyber incidents will not occur in the future, and they could occur more frequently and on a larger scale. Legal liability arising from such risks may harm our business. Many aspects of our business involve substantial risks of liability.