Cyber threats are rapidly evolving, and those threats and the means for obtaining access to information in digital and other storage media are becoming increasingly sophisticated. Cyber threats and cyber-attackers, including ransomware attacks, can be sponsored by countries or sophisticated criminal organizations or be the work of single "hackers" or small groups of "hackers."
We invest in industry standard security technology to protect the Company's data and business processes against risk of data security breach and cyber-attack. Our data security management program includes identity, trust, vulnerability and threat management business processes as well as adoption of standard data protection policies. We measure our data security effectiveness through industry accepted methods. We are continuously installing new and upgrading existing information technology systems. We use employee awareness training around phishing, malware, and other cyber risks to ensure that the Company is protected, to the greatest extent possible, against cyber risks and security breaches. We are regularly the target of attempted cyber and other security threats and must continuously monitor and develop our information technology networks and infrastructure to prevent, detect, address and mitigate the risk of unauthorized access, misuse, computer viruses and other events that could have a security impact. Insider or employee cyber and security threats are increasingly a concern for all companies, including ours. Additionally, we certify our major technology suppliers and any outsourced services through accepted security certification standards.
Nevertheless, as cyber threats evolve, change and become more difficult to detect and successfully defend against, one or more cyber-attacks might defeat our or a third-party service provider's security measures in the future and could result in the leak of personal information of customers, employees or business partners. Employee error or other irregularities may also result in a failure of our security measures and a breach of information systems. Moreover, hardware, software or applications we use may have inherent defects of design, manufacture or operations or could be inadvertently or intentionally implemented or used in a manner that could compromise information security. A security breach and loss of information may not be discovered for a significant period of time after it occurs. While we have no knowledge of a material security breach to date, any compromise of data security could result in a violation of applicable privacy and other laws or standards, the loss of valuable business data, or a disruption of our business. In addition, the costs to eliminate or alleviate network security problems, bugs, viruses, worms, malicious software programs and security vulnerabilities could be significant, and our efforts to address these problems may not be successful and could result in potential theft, loss, destruction or corruption of information we store electronically, as well as unexpected interruptions, delays or cessation of service, any of which could cause harm to our business operations.
Moreover, a security breach involving the misappropriation, loss or other unauthorized disclosure of sensitive or confidential information could give rise to unwanted media attention, materially damage our customer relationships and reputation, and result in litigation or fines, fees, or potential liabilities, which may not be covered by our insurance policies, each of which could have a material adverse effect on our business, results of operations and financial condition.