Significant disruptions of our information technology systems or breaches of information security could adversely affect our business. We rely upon information technology systems to operate many parts of our business. We routinely collect, store and transmit large amounts of sensitive or confidential information, including data from the results of our testing and inspections.
We deploy and operate various technical and procedural controls to maintain the confidentiality and integrity of such sensitive or confidential information. Furthermore, as we automate more of our inspection process and procedures, including through the use of MISTRAS Digital, we become more vulnerable to security breaches and other system disruptions. In addition, we rely on third parties for significant elements of our information technology infrastructure and, as a result, we are managing many independent vendor relationships with third parties who may or could have access to our confidential information. The size and complexity of our information technology and information security systems, and those of our third-party vendors with whom we contract (and the large amounts of confidential information that is present on them), make such systems potentially vulnerable to service interruptions or to security breaches from inadvertent or intentional actions by our employees or vendors, or from attacks by malicious third parties. Such attacks are of ever-increasing levels of sophistication and expertise, including organized criminal groups, "hacktivists" and others. Due to the nature of some of these attacks, there is a risk that they may remain undetected for a period of time. While we have invested in the protection of data and information technology, there can be no assurance that our efforts will prevent service interruptions or security breaches. Any such interruption or breach of our systems could adversely affect our business operations and/or result in the loss of critical or sensitive confidential information, and could result in financial, legal, business and reputational harm to us. We maintain cyber liability insurance. However, this insurance may not be sufficient to cover the financial, legal, business or reputational losses that may result from an interruption or breach of our systems. The occurrence or perception of security breaches in connection with our asset protection solutions or our customers' concerns about internet security or the security of our solutions, whether warranted or not, would likely harm our reputation and business, inhibit market acceptance of our asset protection solutions and cause us to lose customers, any of which would harm our financial condition and results of operations.
In addition, much of our computer and communications hardware is located at a single facility. We have a back-up data-center and storage in a different geographic area. Should a natural disaster or some other event occur that damages our primary data center or significantly disrupts its operation, such as human error, fire, flood, power loss, telecommunications failure, break-ins,terrorist attacks, acts of war and similar events, we could suffer temporary interruption of key functions and capabilities before the back-up facility is fully operational.