The proper functioning and security of our information systems is critical to the operation and reputation of our business. This includes the systems that support and operate our Safety io and MSA+ platforms. Our information systems may be vulnerable to damage or disruption from natural or man-made disasters, computer viruses, power losses or other system or network failures. In addition, hackers, cyber-criminals and other persons could attempt to gain unauthorized access to our information systems with the intent of harming the Company, harming our information systems or obtaining sensitive information such as intellectual property, trade secrets, financial and business development information, and customer- and vendor-related information. To date, we have not experienced any known material breaches or material losses related to cyber-attacks. If our information systems or security fail, or if there is any compromise or breach of our security, it could disrupt our operations and/or result in a violation of applicable privacy and other laws, legal and financial exposure, remediation costs, negative impacts on our customers' willingness to transact business with us, or a loss of confidence in our security measures, which could have an adverse effect on our business, our reputation and our consolidated results of operations and financial condition.
From time to time, we have experienced attempts on our computer systems by unauthorized outside parties. Because the techniques used by computer hackers and others to access or sabotage networks continually evolve and generally are not recognized until launched against a target, we may be unable to anticipate, prevent or detect these attacks. As a result, the impact of any future incident cannot be predicted, including the failure of our information systems or misappropriation of our technologies and/or processes. Any such system failure or loss of such information could harm our competitive position or cause us to incur significant costs to remedy the damages caused by the incident. We have taken steps and incurred costs to further strengthen the security of our computer systems and continue to assess, maintain and enhance the ongoing effectiveness of our information security systems. While we attempt to mitigate the aforementioned risks by employing a number of measures, including employee training, monitoring of our networks and systems, and maintenance of backup and protective systems, our systems, networks, facilities, business partners and associates remain potentially vulnerable to advanced persistent threats. We cannot assure that ongoing improvements to our infrastructure and cybersecurity programs will be sufficient to prevent or limit the damage from any future cyber-attack or disruption to our information systems. It is therefore possible that we may suffer a cyber attack with a material breach or material loss, unauthorized parties may gain access to personal information in our possession and we may not be able to identify any such incident in a timely manner.