As a financial institution, we are susceptible to fraudulent activity, operational and informational security breaches and cybersecurity incidents that are committed against us or our customers, employees, third-party vendors and others, which may result in financial losses or increased costs, disclosure or misuse of our information or customer information, misappropriation of assets, data privacy breaches, litigation or reputational damage. Related risks for financial institutions have increased in recent years in part because of proliferation and use of new and existing technologies to conduct financial transactions and transmit data, as well as the increased sophistication and unlawful or clandestine activities of organized crime, state-sponsored and other hackers, terrorists, activists, and other malicious external parties to engage in fraudulent activity such as phishing or check, electronic or wire fraud, unauthorized access to our controls and systems, denial or degradation of service attacks, malware and other dishonest acts. Within the financial services industry, the commercial banking sector has generally experienced, and will continue to experience, increased electronic fraudulent activity, security breaches and cybersecurity-related incidents. The nature of our industry sector exposes us to these risks because our business and operations include the protection and storage of confidential and proprietary corporate and personal information, including sensitive financial and other personal data, and any breach thereof could result in identity theft, account or credit card fraud or other fraudulent activity that could involve their accounts and business with us. The risk to our organization may be further elevated over the near term because of recent geopolitical events in Eastern Europe and Asia, which may result in increased attacks against U.S. critical infrastructure, including financial institutions.
Our computer systems, software and networks are subject to ongoing cyber incidents such as unauthorized access; loss or destruction of data (including confidential client information); account takeovers; unavailability of service; computer viruses or other malicious code; cyber-attacks; and other events. While we have experienced and continue to experience various forms of these cyber incidents in the past, we have not been materially impacted by them. Cyber incidents may not occur again, and they could occur more frequently and on a more significant scale.
Our business and operations rely on the secure processing, transmission, protection and storage of confidential, private and personal information by our computer operation systems and networks, as well as our online banking or reporting systems used by customers to effect certain financial transactions, all of which are either managed directly by us or through our third-party data processing vendors. The secure maintenance and transmission of confidential information, and the execution of transactions through our systems, are critical to protecting us and our customers against fraud and security breaches and to maintain customer confidence. To access our products and services, our customers may use personal computers, smartphones, tablet PCs, and other mobile devices that function beyond our control systems. Although we believe we have invested in, and plan to continue investing in, maintaining and routinely testing adequate operational and informational security procedures and controls, we rely heavily on our third-party vendors, technologies, systems, networks and our customers' devices, all of which are the target of cyber-attacks, computer viruses, malicious code, unauthorized access, hackers or information security breaches that have resulted in and could again in the future result in the unauthorized release, gathering, monitoring, misuse, loss, theft or destruction of our confidential, proprietary and other information or that of our customers, or that could disrupt our operations or those of our customers or third parties. Even though we invest in, maintain and routinely test our operational and informational security procedures and controls, we may fail to anticipate or sufficiently mitigate security breaches, or we may experience data privacy breaches, that could result in losses to us or our customers, damage to our reputation, incurrence of significant costs, business disruption, our inability to grow our business and exposure to regulatory scrutiny or penalties, litigation and potential financial liability, any of which could adversely affect our business, financial condition, results of operations or capital position.
Our computer systems could be vulnerable to unforeseen problems other than cybersecurity related incidents or other data security breaches, including the potential for infrastructure damage to our systems or the systems of our vendors from fire, power loss, telecommunications failure, physical break-ins, theft, natural disasters or similar catastrophic events. Any damage or failure that causes interruptions in operations may compromise our ability to perform critical functions in a timely manner (or may give rise to perceptions of such compromise) and could increase our costs of doing business, or have a material adverse effect on our results of operations results as well as our reputation and customer or vendor relationships.
In addition, some of the technology we use in our regulatory compliance, including our mortgage loan origination and servicing technology, as well as other critical business activities such as core systems processing, essential web hosting and deposit and processing services, as well as security solutions, are provided by third party vendors. If those providers fail to update their systems or services in a timely manner to reflect new or changing regulations, or if our personnel operate these systems in a non-compliant manner, our ability to meet regulatory requirements may be impacted and may expose us to heightened regulatory scrutiny and the potential for monetary penalties. These vendors are also sources of operational and informational security risk to us, including from interruptions or failures of their own systems, cybersecurity or ransomware attacks, capacity constraints or failures of their own internal controls. Such third parties are targets of cyber-attacks, computer viruses, malicious code, unauthorized access, hackers, ransomware attacks or information security breaches that have compromised and could again in the future compromise the confidential or proprietary information of HomeStreet and our customers.