Our business could be negatively impacted by cybersecurity events and other disruptions. We face various cybersecurity threats, including threats to our IT infrastructure and attempts to gain unauthorized access to our proprietary or classified information, denial-of-service attacks, as well as threats to the physical security of our facilities and employees, and threats from terrorist acts. In addition, we face cybersecurity threats from entities and persons that may seek to target us through our customers, suppliers and other third parties with whom we do business. Many of these cybersecurity threats are increasingly sophisticated and constantly evolving. Accordingly, we maintain information security staff, policies and procedures for managing risk to our information systems, and we review and update our policies, procedures and practices in light of evolving threats. We conduct employee training on cybersecurity to mitigate persistent and continuously evolving cybersecurity threats. However, there can be no assurance that any such actions, including the timeliness of our efforts to review, update or implement policies, procedures and practices in light of evolving threats, or the safeguards put in place by our customers, suppliers and other parties on which we rely, will be sufficient to detect, prevent and mitigate cybersecurity breaches or disruptions, or the unauthorized release of sensitive information or corruption of data.
A cyber incident is considered to be any adverse event that threatens the confidentiality, integrity or availability of our information resources. These incidents may be an intentional attack or an unintentional event and could involve gaining unauthorized access to our information systems for purposes of misappropriating assets, stealing confidential information, corrupting data or causing operational disruption. The result of these incidents may include disrupted operations, misstated or unreliable financial data, liability for stolen assets or information, increased cybersecurity protection and insurance costs, litigation and damage to our investor relationships. As our reliance on technology increases, so will the risks posed to our information systems, both internal and those we outsource. There is no guarantee that any processes, procedures and internal controls we have implemented or will implement will prevent cyber intrusions, which could have a negative impact on our financial results, operations, business relationships or confidential information.
Additionally, remote work has become more common among our employees and employees of our third-party service providers and has increased risks to our IT systems and our confidential, proprietary, and sensitive data and that of our third-party service providers as more of those employees utilize network connections, computers, and devices outside of the employer's premises or network, including working at home, while in transit, and in public locations. Those employees working remotely could expose us and other third-party service providers to additional cybersecurity risks and vulnerabilities as their systems could be negatively affected by vulnerabilities present in external systems and technologies outside of their control.