For purposes of carrying out its operations, Ternium relies heavily on information systems; and digital technologies have an increasingly significant role across the business. Although we devote significant resources to protect our systems and data, and continually monitor external developments and available information on threats and security incidents, we have experienced and we expect to continue experiencing varying degrees of cyber incidents in the normal conduct of business, and also occasionally experience sophisticated cybersecurity threats including actual or potential unauthorized access to data and systems, loss or destruction of data, computer viruses or other malicious code, phishing, spoofing and/or other cyberattacks. Cybersecurity threats and incidents often arise from numerous sources, many of which fall beyond our control, such as fraud or malice from third parties, including fraud involving business email, failures of computer servers or other accidental technological failure, electrical or telecommunication outages or other damage to its property or assets.
Cybersecurity threats and incidents, such as phishing attacks, attempts to compromise user credentials, attempts to compromise firewall infrastructure, fake websites, impersonation and whaling, continued to increase throughout 2023. The sophistication of these attacks also grew at a fast pace, with issues such as remote work bearing a significant concern for companies in different industries. Microsoft has informed that the manufacturing?sector?was the industry most subject to ransomware attacks in 2023. Experts agree that cyberattacks are increasing in sophistication and frequency and call for a global response to cybersecurity threats, and regulators are placing increased focus on cybersecurity and its effects.
Cyber ecosystem risk is becoming more problematic. According to the World Economic Forum's 2024 Global Cybersecurity Outlook, the gap between organizations that are cyber resilient and those that are not is widening at an alarming rate and this phenomenon is particularly alarming in light of the interconnected nature of the cyber ecosystem. According to data set forth in such Report, 41% of the organizations that suffered a material incident in the past 12 months attributed the incidents to a third party, and 54% of the organizations have insufficient visibility into the vulnerabilities of their supply chain. This raises a significant concern as even resilient companies may be exposed to the vulnerabilities of third-party suppliers, service providers or clients.
In addition, emerging technologies, like generative artificial intelligence (AI), which are becoming available more widely and faster, are expected to exacerbate cyber resilience challenges. Approximately half of executives surveyed at the World Economic Forum's annual meeting on cybersecurity stated that advances in adversarial capabilities (phishing, malware, deepfakes) present the most concerning impact of generative AI on cybersecurity concerns.
The cybersecurity incidents we suffered in 2023 were contained in a timely manner. Four incidents evidenced a high level of sophistication. None of the cybersecurity incidents led to any known breaches of business-critical IT systems and, as such, did not result in any material business impact to Ternium.
In this context, we continue to seek to improve cybersecurity controls, processes and procedures to monitor, detect, evaluate and respond to hacking, malware infection, cybersecurity compromise and other risks. In addition, we carry out cybersecurity awareness and ethical phishing campaigns aimed at protecting us against cyberthreats. Given the rapidly evolving nature of cyber threats, there can be no assurance that the systems and measures that we have put in place to prevent or limit the effects of cyber incidents or attacks and the mitigation actions adopted in connection with such attacks will be sufficient to prevent or detect such incidents or attacks, to avoid a material adverse impact on our systems. While we continue to attempt to mitigate these risks, we remain vulnerable to additional known or unknown threats, including theft, misplacement or loss of data, programming errors, employee errors and/or dishonest behavior that could potentially lead to the compromising of sensitive information, improper use of our systems or networks, as well as unauthorized access, use, disclosure, modification or destruction of such information, systems and/or networks.
If Ternium's systems and measures for protecting against cybersecurity risks are circumvented or breached, this could result in disruptions to its business and operations (including but not limited to, defective products, production downtimes or loss of productivity), access to financial reporting systems, the loss of access to critical data or systems, misuse or corruption of critical data and proprietary information (including intellectual property and customer data), as well as damage to our reputation with customers and the market, failure to meet customer requirements, customer dissatisfaction and/or regulatory fines and penalties (including for inadequate protection of personal data and/or failure to notify the competent authorities for such breach) or other financial costs and losses. ?In addition, failure to adequately and timely monitor and evaluate our hardware and software systems and applications to prevent or manage technology obsolescence risks may result in increased costs, increased operational risk of service failure, loss of technology competitiveness and reputation.
In addition, given that cybersecurity threats continue to evolve, we may be required to devote additional resources in the future to enhance its protective measures or to investigate and/or remediate any cybersecurity vulnerabilities. Ternium does not currently maintain cybersecurity insurance and the insurance it carries for property damage and general liability may not protect Ternium from damages derived from cyber events. Moreover, any investigation of a cyberattack would take time before completion, during which Ternium would not necessarily know the extent of the actual or potential harm or how best to remediate it, and certain errors or actions could be repeated or compounded before duly discovered and remediated (all or any of which could further increase the costs and consequences arising out of any cyberattack).
Furthermore, in response to the increase in the number and sophistication of ransomware attacks, U.S. and other regulatory agencies have implemented regulations to prevent victims from making ransomware payments and to deter third parties from facilitating or processing such payments to cyber actors. This would constrain our ability to deal with ransomware attacks, should they occur.
For information regarding Ternium's cybersecurity risk management and strategy, see Item 16K. "Cybersecurity".