Our operations depend on our ability to protect our network from interruption or damage resulting from unauthorized access or entry, computer viruses or malware or other events beyond our control, and our ability to detect any such events. In the past, we have been subject to distributed denial-of-service ("DDOS cyberattacks"), and have been subject to other forms of attacks by hackers intent on bringing down our services or accessing confidential information. Although these attempts were not successful in penetrating our network, we may be subject to other DDOS and other forms of attacks in the future, undetected or otherwise. Recent developments in the threat landscape include use of AI and machine learning, as well as an increased number of cyber extortion and ransomware attacks, with higher financial ransom demand amounts and increasing sophistication and variety of ransomware techniques and methodology. For example, the industry has experienced an increase in cyber-attack activity has been observed in connection with Russia's invasion of Ukraine. We cannot assure you that our backup systems, regular data backups, physical, technological and organizational security protocols and measures and other procedures that are currently in place, or that may be in place in the future, will be adequate to detect or prevent unauthorized access to our systems, significant damage, system interruption, degradation or failure, or data loss or to respond to a cyberattack once launched. Additionally, hackers may attempt to directly gain access to a customer's on-premise appliance, or their mobile phone, which may delay or interrupt services, or may subject our customers to further security risks, including in relation to any connected household devices a customer might have now or in the future, such as our connected smart security sensors and our partner's connected devices or to our network more generally. Also, our services are web-based, and the amount of data we store for our users on our servers has been increasing as our business has grown.
Despite our ongoing efforts to enhance security measures, our infrastructure and those of third parties we rely upon may be vulnerable to hackers, phishing, computer viruses, worms, ransomware other malicious software programs or similarly disruptive problems caused by our customers, employees, consultants or other internet users who attempt to invade public and private data networks. In some cases, we do not have in place disaster recovery facilities for certain ancillary services, such as email delivery of messages. Currently, a majority of our customers authorize us to bill their credit or debit card accounts directly for all transaction fees that we charge. We rely on encryption and authentication technology to ensure secure transmission of confidential information, including customer credit and debit card numbers. Despite our efforts to encrypt and secure transmission of confidential customer information, hackers with sufficiently sophisticated technology or methods may still be able to infiltrate our systems to gain unauthorized access to payment card information. Further, advances in computer capabilities, new discoveries in the field of cryptography or other developments may result in a compromise or breach of the technology we use to protect transaction data. In addition, because the techniques used to obtain unauthorized access to the information systems change frequently, and may not be recognized until launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures.
Third parties may attempt to fraudulently induce employees, consultants or customers into disclosing sensitive information, such as user names, passwords, customer proprietary network information ("CPNI"), intellectual property or other information in order to gain access to our customers' data or to our data. CPNI includes information such as the phone numbers called by a customer, the frequency, duration, and timing of such calls, and any services purchased by the customer, such as call waiting, call forwarding and caller ID, in addition to other information that may appear on a customer's bill. In addition, because the techniques used to obtain unauthorized access, or to sabotage systems, change frequently and generally are not recognized until launched against a target, we may be unable to anticipate these techniques or to implement adequate preventative measures. In addition, as noted above, due to political uncertainty and military actions associated with Russia's invasion of Ukraine, we and our vendors, business partners, and contractors may also be vulnerable to heightened risks of cyber-attacks, including from or affiliated with nation-state actors, which could materially disrupt our systems and operations, supply chain, and ability to produce, sell and distribute our services and products. Any compromise or perceived compromise of our security could damage our reputation, and could subject us to significant liability, as well as regulatory action, including financial penalties, which would materially adversely affect our brand, results of operations, financial condition, business and prospects.
See "Risks Related to Security, IT Systems and Intellectual Property" for further risks related to security breaches.