We depend on information technology systems for significant elements of our operations, including the storage of data and retrieval of critical business information, and within our supply chain. We also depend on our information technology infrastructure for digital marketing activities and for electronic communications among our locations, personnel, customers, and suppliers. Although our information systems are protected with robust backup systems, including physical and software safeguards and remote processing capabilities, our information technology systems and those of our supply chain are vulnerable to damage from a variety of sources, including network failures, malicious human acts, and natural disasters. Moreover, despite network security and back-up measures, some of our servers are potentially vulnerable to physical or electronic break-ins, computer viruses, and similar disruptive problems. In addition, certain software used by us is licensed from, and certain services related to our information systems are provided by, third parties who could choose to discontinue their relationship with us. Failures or disruptions to our information technology systems or those used by our third-party service providers could prevent us from conducting our general business operations, and adversely affect our ability to process orders, maintain proper levels of inventories, collect accounts receivable, pay expenses, and maintain the security of our company and customer data. Any disruption or loss of information technology systems on which critical aspects of our operations depend could have an adverse effect on our business, results of operations, and financial condition.
For example, on May 30, 2021, we were the target of an organized cybersecurity attack (the "Cyberattack"), affecting some of the servers supporting our North American and Australian information technology systems. JBS USA's backup servers were not affected. JBS USA and PPC's operations in North America and Australia were affected. PPC's operations in Mexico and the United Kingdom were not impacted and conducted business as normal. Upon learning of the intrusion, we contacted federal officials and activated our cybersecurity protocols, including voluntarily shutting down all affected systems to isolate the intrusion, limit the potential infection and preserve core systems. Restoring systems critical to production was prioritized. In addition, the encrypted backup servers, which were not affected by the Cyberattack, allowed for a return to full operations within two days. As of June 3, 2021, JBS USA and PPC had resumed production at all of their facilities. Our response, IT systems and encrypted backup servers allowed for a rapid recovery from the Cyberattack. As a result, the loss of food produced was limited to less than one day of production. We are not aware of any evidence that any customer, supplier or employee data had been compromised or misused as a result of the Cyberattack. Since the Cyberattack, we have been working to improve our cybersecurity posture in order to minimize our risk and attack surface. We have identified good practices we had in place before the Cyberattack, and we have identified and completed items and actions that were needed to remediate.
Further, we store highly confidential information on our information technology systems, including information related to our products. If our servers or the servers of the third party on which our data is stored are attacked by a physical or electronic break-in, computer virus or other malicious human action, our confidential information could be stolen or destroyed. Any security breach involving the misappropriation, loss or other unauthorized disclosure or use of confidential information of our suppliers, customers, or others, whether by us or a third party, could disrupt our operations, subject us to civil and criminal penalties, have a negative impact on our reputation, expose us to liability to our suppliers, customers, other third parties or government authorities and increase our cyber-security protection and remediation costs. Any of these developments could have an adverse impact on our business, financial condition and results of operations. In addition, if our supply chain cybersecurity is compromised as a result of third-party action, employee error, malfeasance, stolen or fraudulently obtained log-in credentials or otherwise, our business may be harmed and we could incur significant liabilities. We mitigate this risk by having a diversified supply chain. There can be no assurance that we will be able to prevent all of the rapidly evolving forms of increasingly sophisticated and frequent cyber-attacks. Moreover, our efforts to address network security vulnerabilities may not be successful, resulting potentially in the theft, loss, destruction or corruption of information we store electronically, as well as unexpected interruptions, delays or cessation of service, any of which would cause harm to our business operations. The vulnerability of our systems and our failure to identify or respond timely to cyber incidents could have an adverse effect on our operations and reputation and expose us to liability or regulatory enforcement actions.