We rely on multiple information technology systems and networks that are maintained internally and by third-party vendors, and failure or breach of these systems could significantly impede operations. In addition, our systems and networks, as well as those of our vendors, banks and counterparties, may receive and store personal or proprietary information in connection with human resources operations, customer offerings, and other aspects of our business. A cyber-attack or material network breach in the security of these systems could include the exfiltration, or other unauthorized access or disclosure, of proprietary information or employee and customer information, as well as disrupt our operations or damage our information technology infrastructure or those of third parties.
For example, in July 2021, we detected a security incident that resulted in the encryption of certain of our information technology systems. Promptly upon discovery of the incident, we launched an investigation with the assistance of an outside cybersecurity firm, notified law enforcement, and took steps to address the incident and restore full operations. As a result of our investigation of the incident, we do not believe any personal information belonging to customers was involved. However, we believe that an unauthorized third party exfiltrated and/or accessed certain employee personal identifying information ("PII") and/or protected health information ("PHI") relating to employee health insurance plans and human resources information, residing on some of the affected systems. We were able to continue to serve our customers without interruption. We do not believe that this incident had a material adverse effect on our business, operations or financial results. However, we cannot be certain that that similar cyber-attacks will not occur in the future. Any future cyber-attacks or incidents may have a material adverse effect on our business, operations or financial results.
It is our view that cyber-attacks are increasing in their frequency, levels of persistence, and sophistication and intensity. Furthermore, because the techniques used to obtain unauthorized access to, or to disrupt, information technology systems change frequently, we may be unable to anticipate these techniques or implement security measures that would prevent them. We may also experience security breaches that may remain undetected for an extended period. In addition, the information technology controls or legacy third party providers of an acquired business may be inadequate to prevent a future cyber-attack, unauthorized access or other data security breaches. If another cyber-attack were to occur and cause interruptions in our operations, it could have a material adverse effect on our revenues and increase our operating and capital costs, which could reduce the amount of cash otherwise available for distribution. To the extent that a future cyber-attack, security breach or other such disruption results in a loss or damage to the Company's data, or the disclosure of PII, PHI or other personal or proprietary information, including customer or employee information, it could cause significant damage to the Company's reputation, affect relationships with its customers, vendors and employees, lead to claims against the Company, and ultimately harm our business. In addition, we may be required to incur additional costs to mitigate, remediate and protect against damage caused by cyber-attacks, security breaches or other such disruptions in the future. We have paid and may continue to pay significantly higher insurance premiums to maintain cyber insurance coverage, and even if we are able to maintain cyber insurance coverage, it may not be sufficient in amounts and scope to cover all harm sustained by the Company in any future cyber-attack or other data security incident. For more information on management's risk management, strategy, governance and impacts from cybersecurity incidents, see "Item 1C. Cybersecurity."