In the conduct of our business, we collect, use, transmit, store, and report data on information systems owned by the Company or support or hosted by third parties, and interact with customers, vendors, and employees. Increased global information technology (IT) security threats and, in some instances, more sophisticated and targeted computer crime pose a risk to the security of our systems and networks, as well as those of third parties who we rely on, and risk the confidentiality, availability, and integrity of our data and systems. We protect our sensitive, confidential, or proprietary information as well as personal data, our facilities, and IT systems, but we and third parties upon whom we rely to host or protect our data, facilities, and IT systems may be vulnerable to cybersecurity threats and future cybersecurity incidents. In the conduct of our business, we also are in the process of preparing for a Level 2 Cybersecurity Maturity Model Certification (CMMC), including by engaging an external third party to audit our information security standards against CMMC requirements. Despite our security measures, the IT systems and infrastructure of the Company and third parties who host or secure our data may be vulnerable to customer viruses, cyber-attacks, harmful malware or ransomware, denial-of-services attacks and other attacks, which may affect business continuity and threaten the availability, confidentiality and integrity of our systems and information. Cybersecurity incidents can also include employee or personnel failures, fraud, phishing or other social engineering attempts or other methods to cause confidential information, payments, account access or access credentials, or other data to be transmitted to an unintended recipient. Cybersecurity threat actors also may attempt to exploit vulnerabilities through in software including that is software commonly used by companies in cloud-based services and bundled software. Any such threat or incident could compromise our networks and those of third parties and the information stored there could be accessed, publicly disclosed, lost, or stolen. A cybersecurity incident and any attacks impacting our systems or data could interrupt or damage our operations or harm our reputation, resulting in a loss of sales, operating profits, and assets, including major disruptions to business operations, loss of intellectual property, release of confidential information, alteration or corruption of data or systems, costs related to remediation or the payment of ransom, and litigation including individual claims or consumer class actions, commercial litigation, administrative, and civil or criminal investigations or actions, regulatory intervention and sanctions or fines, investigation and remediation costs and possible prolonged negative publicity. The Company has taken steps to protect our computer systems and data; however, there is always a risk of successful intrusions or attacks, and any intrusions or attacks could pose a risk of undetected data loss or theft that could later be used to harm the Company.
These cybersecurity threats exist with respect to the IT systems of our lenders, suppliers, consultants, advisers, and other third parties with whom we conduct business. Cyber attacks, vulnerabilities, and disruptions impacting those systems could result in the loss, theft, or disclosure of confidential, proprietary, or personal information or intellectual property and could also interrupt or damage our operations, harm our reputation, and subject us to legal claims. Although we maintain a cyber insurance policy,there is no guarantee that such coverage will be sufficient to address costs, liabilities and damages we may incur in connection with a cybersecurity incident or that such coverage will continue to be available on commercially reasonable terms or at all.