A cybersecurity incident in our own systems or the systems of our third-party providers may compromise the confidentiality, integrity, or availability of our own internal data, the availability of our products, and websites designed to support our customers or our customer data.
Computer hackers, ransom attacks, foreign governments, or cyber terrorists may attempt to or succeed in penetrating our network security and our website. The discovery of wide-scale cybersecurity intrusions into U.S. government and private company computer networks by alleged Russian state actors underscores the ongoing threat posed by sophisticated and foreign state-sponsored attacks. The frequency of ransomware and malware attacks has also been increasing over time. Unauthorized access and theft to our proprietary business information or customer data or rendering them unusable for our use through encryption, may be accomplished through break-ins, sabotage, theft of IoT data streams and transmissions, breach of our secure network by an unauthorized party, computer viruses, computer denial-of-service attacks, employee theft or misuse, ransomware attacks, breach of the security of the networks of our third-party providers, or other misconduct. Additionally, outside parties may attempt to fraudulently induce employees or users to disclose sensitive or confidential information to gain access to data.
Despite our efforts to maintain the security and integrity of our systems, it is impossible to eliminate this risk. Because the techniques used by computer hackers who may attempt to penetrate and sabotage our network security or our website change frequently, they may take advantage of weaknesses in third-party technology or standards of which we are unaware or that we do not control and may not be recognized until long after they have been launched against a target. We may be unable to anticipate or counter these techniques. It is also possible that unauthorized access to customer data or confidential information may be obtained through inadequate use of security controls by customers, vendors, or business partners. Efforts to prevent hackers from disrupting our service or otherwise accessing our systems are expensive to develop, implement, and maintain. Such efforts require ongoing monitoring and updating as technologies change and efforts to overcome security measures become more sophisticated and may limit the functionality of, or otherwise adversely impact our service offering and systems. A cybersecurity incident affecting our systems may also result in the theft of our intellectual property, proprietary data, or trade secrets, potentially compromising our competitive position, reputation, and operating results. We also may be required to notify regulators about any actual or perceived personal data breach(es) (including the European Union Lead Data Protection Authority) as well as the individual(s) who are affected by the incident within strict time periods.
The systems we rely upon also remain vulnerable to damage or interruption from a number of other factors, including access to the internet, the failure of our network or software systems, or significant variability in visitor traffic on our product websites, earthquakes, floods, fires, power loss, telecommunication failures, computer viruses, human error, and similar events or disruptions. Some of our systems are not fully redundant, and our disaster recovery planning is not sufficient for all eventualities. Our systems are also subject to intentional acts of vandalism. Despite any precautions we may take, the occurrence of a natural disaster, a decision by any of our third-party hosting providers to close a facility we use without adequate notice for financial or other reasons, or other unanticipated problems at our hosting facilities could cause system interruptions and delays, and result in loss of critical data and lengthy interruptions in our services.
We rely on our information systems and those of third parties for activities such as processing customer orders, delivery of products, hosting and providing services and support to our customers, billing and tracking our customers, hosting and managing our customer data, and otherwise running our business. Any disruptions or unexpected incompatibilities in our information systems and those of the third parties upon which we rely could have a significant impact on our business.
An increasing portion of our revenue comes from subscription solutions and other hosted services in which we store, retrieve, communicate, and manage data that is critical to our customers' business systems. Disruption of our systems that support these services and solutions could cause disruptions in our customers' systems and in the businesses that rely on these systems. Any such disruptions could harm our reputation, create liabilities for our customers, hurt demand for our services and solutions, and adversely impact our business, financial condition, and results of operations.