As a financial institution, we are susceptible to fraudulent activity, information security breaches and cybersecurity-related incidents that may be committed against us, our clients or third-parties with whom we interact and that may result in financial losses or increased costs to us or our clients, disclosure or misuse of confidential information belonging to us or personal or confidential information belonging to our clients or misappropriation of assets and litigation. The occurrence of any of these could lead to litigation, cause reputational harm or cause customers to lose confidence in the Company's ability to safeguard their information. Our industry has seen increases in electronic fraudulent activity, hacking, security breaches, sophisticated social engineering and cyber-attacks.
Our business is highly dependent on the security and efficacy of our infrastructure, computer and data management systems, as well as those of third parties with whom we interact or on whom we rely. Our business relies on the secure processing, transmission, storage and retrieval of confidential, proprietary and other information in our computer and data management systems and networks and in the computer and data management systems and networks of third parties. In addition, to access our network,products and services, our customers and other third-parties may use personal mobile devices or computing devices that are outside of our network environment and are subject to their own cybersecurity risks. All of these factors increase our risks related to cyber-threats and electronic disruptions.
While we invest in systems and processes that are designed to detect and prevent security breaches and cyber-attacks and we conduct periodic tests of our security systems and processes, we may not succeed in anticipating or adequately protecting against or preventing all security breaches and cyber-attacks from occurring. Even the most advanced internal control environment may be vulnerable to compromise. Targeted social engineering attacks are becoming more sophisticated and are extremely difficult to prevent. Additionally, the existence of cyber-attacks or security breaches at third-parties with access to our data, such as vendors, may not be disclosed to us in a timely manner. As cyber-threats continue to evolve, we may be required to expend significant additional resources to continue to modify or enhance our protective measures or to investigate and remediate any information security vulnerabilities or incidents.
As is the case with non-electronic fraudulent activity, cyber-attacks or other information or security breaches, whether directed at us or third-parties, may result in a material loss or have material consequences. Furthermore, the public perception that a cyber-attack on our systems has been successful, whether or not this perception is correct, may damage our reputation with customers and third parties with whom we do business. A successful penetration or circumvention of system security could cause negative consequences, including loss of customers and business opportunities, disruption to our operations and business, misappropriation or destruction of our confidential information and/or that of our customers, or damage to our customers' and/or third-parties' computers or systems, and could expose us to additional regulatory scrutiny and result in a violation of applicable privacy laws and other laws, litigation exposure, regulatory fines, penalties or intervention, loss of confidence in our security measures, reputational damage, reimbursement or other compensatory costs, additional compliance costs.