We rely on various information technology networks and systems to process, transmit and store electronic information, including proprietary and confidential data, and to carry out and support a variety of business activities, including manufacturing, research and development, supply chain management, sales and accounting. We have experienced several attempted cyber-attacks of our network. None of the attempted attacks have caused a disruption to our operations or had a material adverse effect on our business or financial results. As a result of the attempts, we have taken further preventive security measures to protect our systems. Despite the preventive security measures we have implemented, we may continue to be vulnerable to attempts by third parties to gain unauthorized access to our networks or sabotage our systems. These attempts, which might be related to criminal hackers, industrial espionage or state-sponsored intrusions, include trying to covertly introduce malware to our computers, networks and systems and impersonating authorized users. Additionally, evolving geopolitical tensions or conflicts have created a heightened risk of cybersecurity attacks. In addition, third party suppliers and service providers that we rely on to manage our networks and systems and who process and store our proprietary and confidential data, including the data of our customers and suppliers, may also be subject to similar attacks. Employees and contractors may also attempt to gain unauthorized access to our systems and steal proprietary and confidential data. Such attempts could result in the misappropriation, theft, misuse, disclosure or loss or destruction of the intellectual property, or the proprietary, confidential or personal information, of Teradyne or our employees, customers, suppliers or other third parties, as well as damage to or disruptions in our information technology networks and systems. These threats are constantly evolving and expanding, such as through the increased use of artificial intelligence in our products and expanding remote work opportunities for our employees, thereby increasing the difficulty of defending against them or implementing adequate preventative measures. Attempts to gain unauthorized access to our information technology networks and systems may be successful, and in some cases, we might be unaware of an incident or its magnitude and effects. A failure in or a breach of our operational or security systems or infrastructure, or those of our suppliers and other service providers, including as a result of cyber-attacks, could have a material adverse effect on our business or financial results, disrupt our business, result in the disclosure or misuse of proprietary or confidential information, damage our reputation, cause losses and increase our costs. We expect to continue to devote significant resources to the security of our information technology networks and systems. Furthermore, our efforts to comply with evolving laws and regulations related to cybersecurity may be costly and any failure to comply could result in investigations, proceedings, investor lawsuits and reputational damage.