Our vulnerability to cyber-attacks is heightened by several features of our operations, including (i) our material reliance on our owned and leased networks to conduct our operations, (ii) our transmission of large amounts of data over our systems and (iii) our processing and storage of sensitive customer data.
As further described in Item 1C of this annual report, cyber-attacks on our systems may stem from a variety of sources and take many forms. Cyber-attacks can put at risk personally identifiable customer data or protected health information, thereby implicating stringent domestic and foreign data protection laws. These threats may also arise from failure or intrusions of systems owned, operated or controlled by other unaffiliated operators, upon whom we are materially reliant to operate our business. Various other factors could intensify these risks, including, (i) our maintenance of information in digital form stored on servers connected to the Internet, (ii) our use of open and software-defined networks, (iii) the challenges of operating and maintaining our complex multi-continent network composed of legacy and acquired properties, which is more difficult to safeguard than newer fully-integrated networks, (iv) growth in the size and sophistication of our customers and their service requirements, (v) increased use of our network due to greater demand for data services, (vi) our increased incidence of employees working from remote locations and (vii) the increased difficulty of defending against attacks that use AI-generated social engineering, increasingly malicious code and increasingly sophisticated phishing techniques.
As a critical infrastructure service provider, we and our customers are constant targets of cyber-attacks. The number of these attacks against us increased in 2023. Despite our efforts to prevent these events, some of these attacks have resulted in security incidents. On March 27, 2023, we filed with the U.S. Securities and Exchange Commission a Current Report on Form 8-K announcing two cybersecurity incidents, including one that involved a sophisticated threat actor that had accessed our internal information technology systems. Since filing that report, we have taken the measures described therein to assess, contain and remediate both incidents, including working with outside forensic firms. Based on information known to us at this time, we continue to believe that these incidents have neither had nor are likely to have a material adverse impact on our ability to serve our customers or our business, operations or financial results.
We believe the importance of our network to global internet data flows will continue to make it a target to a wide range of threat actors, including nation state actors and other advanced persistent threat actors. Moreover, the risk of incidents is likely to continue to increase due to several factors, including (i) the increasing sophistication of cyber-attacks, (ii) the wider accessibility of cyber-attack tools and (iii) growing threats from Chinese, Russian and other state actors due to heightened geopolitical tensions. It should also be noted that defenses against cyber-attacks currently available to us and others are unlikely to prevent intrusions by a highly-determined, highly-sophisticated threat actor. Consequently, you should assume that we will continue to experience cyber incidents in the future. Thus far, none of our past security incidents have had a material adverse effect on us, and we continue to take steps designed to limit our cyber risks. Nonetheless, we cannot assure you that future cyber incidents or events will not ultimately have a material adverse impact on our ability to serve our customers or our business, operations or financial results.
Although we maintain insurance coverage that may, subject to policy terms and conditions (including self-insured deductibles, coverage restrictions and monetary coverage caps), cover certain aspects of our cyber risks, such insurance coverage may be unavailable or insufficient to cover our losses.
Cyber-attacks could (i) disrupt the proper functioning of our networks and systems, which could in turn disrupt the operations of our customers, (ii) result in the destruction, loss, theft, misappropriation or release of proprietary, confidential, sensitive, classified or otherwise valuable information of ours, our employees, our customers or our customers' end users, (iii) require us to notify customers, regulatory agencies or the public of data incidents, (iv) damage our reputation or result in a loss of business, (v) require us to provide credits for future service to our customers or to offer expensive incentives to retain customers, (vi) subject us to claims by our customers or regulators for damages, fines, penalties, license or permit revocations or other remedies, (vii) result in the loss of industry certifications or (viii) require significant management attention or financial resources to remedy the resulting damages or to change our systems. Any or all of the foregoing developments could have a material adverse impact on us.