In the normal course of business, we (directly or through third parties) collect, store, share, process and retain sensitive and confidential information regarding our clients. We also rely heavily upon electronic infrastructure that we own or that we obtain via license or other contractual arrangements with third parties. This infrastructure is essential in the conduct of our business, including for allowing our clients to access and transfer funds, initiate and pay loans and leases, communicating with our client service teams, and a variety of other activities that form the foundation of modern financial services businesses. There have been a number of recent and well-publicized incidents involving various types of cybersecurity lapses, and many of these have had substantial impacts upon targeted businesses and on clients of even some of the world's most prominent cybersecurity firms. One of the most recent events resulted in a widespread failure of a large cybersecurity platform, some of the consequences of which are ongoing and may not be fully known or estimable. Similarly, extremely sophisticated criminal and nation-state organizations routinely target and exploit information technology networks, data systems, and other critical infrastructure. Some of the most common types of threats targeting financial institutions include:
- Ransomware Attacks. These threats ordinarily involve intrusions into networks or data storage systems by actors who render the platform inoperable or that obtain or obstruct access to sensitive data, whereupon the malefactor notifies the platform's owner and demands cash payment in exchange for a complex code that "unlocks" the malware. Another variant of this practice demands a ransom in exchange for a promise not to make sensitive data, such as client information, available to unauthorized sources.
- Cloud Services Attacks. Because financial institutions are highly reliant on data that is stored in "cloud" servers, and on services that use cloud-based software platforms, malefactors often seek to "hijack" these services, either by rendering them inaccessible or by misusing or damaging information or programs that depend on these systems.
- Artificial Intelligence-Based Attacks. As we experience an unprecedented growth in the development of artificial intelligence, various hostile actors and criminals are actively developing means by which this technology can be used to exploit computer networks. This technology can be used to manipulate a business' processes to produce erroneous or unreliable results, to perpetrate ransomware or cloud-based attacks, or to destroy or render unusable a company's systems or data.
- Phishing. A longstanding but still highly effective threat known as "phishing" involves tricking an unwitting employee, client or vendor into disclosing passwords, encryption keys, or other sensitive information that allows a threat actor to access networks or data systems, where the actor can engage in a ransomware attack, install a worm or virus, or engage in fraudulent activity.
We devote significant resources and management focus to ensure the integrity of our systems against cybercriminals and similar actors, as well as against threats from fires and other natural disasters; power or telecommunications failures; acts of terrorism or wars or other catastrophic events; breaches, physical break-ins or errors resulting in interruptions and unauthorized disclosure of confidential information, through information security and business continuity programs. Likewise, we have made, and we continue to make, substantial investments in systems that are intended to protect against these vulnerabilities, including real-time threat detection and warning, security programs and protocols, backup and alternative-access systems, virus and malware protection programs, and a wide variety of other protective measures.
Notwithstanding these efforts, cybersecurity measures are, by their nature, largely reactive, and threats are constantly evolving. We expect that the development of AI-based technology will cause a rapid expansion in both the number and the sophistication of these threats. While we believe we maintain state-of-the-art defensive measures, we routinely experience attempts to exploit our networks and systems, and we must continue investing in increasingly sophisticated (and concomitantly expensive) technology to counteract these threats. Further, if our systems cannot timely detect and mitigate vulnerabilities, or cannot promptly respond to threats, we may experience damage to or interruptions in the availability of our computer networks, or we may experience a loss of data, unauthorized use or disclosure of client information, or a loss of client funds as a result of unauthorized access to client accounts.
Furthermore, enhancements and upgrades to our infrastructure or computer systems may be time-consuming, may entail significant costs, and may themselves create risks associated with implementing new systems and integrating them with existing ones. Due to the complexity and interconnectedness of our systems, the process of enhancing our infrastructure and operating systems, including their security measures and controls, also can create an inherent risk of system disruptions and security issues. Similarly, we may not be able to timely recover critical business processes or operations that have been disrupted, which may further increase any associated costs and consequences of such disruptions. Although we have enterprise incident response processes, business continuity plans and other safeguards in place to help provide operational resiliency, our business operations may be adversely affected by significant and widespread disruption to our physical infrastructure or computer systems that support our businesses and clients.
Additionally, as financial institutions and technology systems become more interconnected and more complex, any operational incident at a third party, such as a vendor or client, may increase our operational risks, including from information breaches or loss, breakdowns, disruptions or failures of their own systems or infrastructure, or any deficiencies in the performance of their responsibilities. These risks are increased to the extent we rely on a single-source vendor or provider.
We also must meet stringent and increasingly complex regulatory requirements regarding our use of third-party service providers, and any failure by our third-party service providers to meet their obligations to us or to comply with applicable laws, rules, regulations, or internal policies could result in the Company becoming subject to fines, penalties, or business restrictions, as well as to increased costs to remediate any actual or perceived deficiencies and potentially to legal and other costs associated with defending against such regulatory sanctions. Disruptions or failures in the physical infrastructure, controls or operating systems that support our businesses and clients, failures of the third parties on which we rely to adequately or appropriately provide their services or perform their responsibilities, or our failure to effectively manage or oversee our third-party relationships, could result in business disruptions, loss of revenue or clients, legal or regulatory proceedings, remediation and other costs, violations of applicable privacy and other laws, reputational damage, client harm, or other adverse consequences, any of which could materially adversely affect our results of operations or financial condition. Further, new and evolving SEC regulations, as well as federal and state banking and consumer privacy laws and regulations, could require us to provide notices of security breaches. Such failures could result in increased regulatory scrutiny, legal liability, a loss of confidence in the security of our systems or an adverse perception of our products and services.
The access by unauthorized persons to, or the improper disclosure by us or our third-party vendors of, confidential information regarding our clients or our own proprietary information, software, methodologies and business secrets, failures or disruptions in our communications, information and technology systems, or our failure to adequately address them, could negatively affect our client relationship management, online banking, accounting or other systems. We cannot assure readers that such breaches, failures or interruptions will not occur or, if they do occur, that they will be adequately addressed by us or the third parties on which we rely. Our insurance may not fully cover all types of losses.
Accordingly, any failures or interruptions of our communications, information and technology systems could damage our reputation, result in a loss of client business, subject us to additional regulatory scrutiny or expose us to civil litigation and possible financial liability, any of which could have a material adverse effect on our business, financial condition or results of operations.