Operating our business and platform involves the collection, processing, storage and transmission of sensitive, proprietary and confidential information, including personal information of our personnel,customers and their end users, our proprietary and confidential information and the confidential information and confidential intellectual property we collect from our partners, customers and creators.
Cyber-attacks, malicious internet-based activity, online and offline fraud, and other similar activities threaten the confidentiality, integrity, and availability of our sensitive information and information technology systems, and those of the third parties with whom we work. Such threats are prevalent and continue to rise, are increasingly difficult to detect, and come from a variety of sources, including traditional computer "hackers," threat actors, "hacktivists" organized criminal threat actors, personnel (such as through theft, misuse, or accident), sophisticated nation states, and nation-state-supported actors.
During times of war and other major conflicts, we, the third parties with whom we work, and our customers may be vulnerable to a heightened risk of these attacks, including retaliatory cyber-attacks, that could materially disrupt our systems and operations, supply chain, and ability to produce, sell and distribute our services. For example, the increased hostilities and militarization in and around Israel, where a significant part of our Grow Solutions operations is based, may lead to an increase in politically motivated cyber-attacks which could impact our operations and harm our business.
We and the third parties with whom we work are subject to a variety of constantly evolving threats, including but not limited to, computer malware (including as a result of advanced persistent threat intrusions), software bugs and vulnerabilities, malicious code, viruses and worms, social engineering (including through deep fakes, which are increasingly more difficult to identify as fake, spear phishing and ransomware attacks), denial-of-service attacks, credential stuffing attacks, credential harvesting, personnel misconduct or error, supply chain attacks, server malfunctions, software or hardware failures, loss of data or other information technology assets, adware, telecommunications failures, attacks enhanced or facilitated by AI and other similar threats.
Such threats have become more prevalent in our industry in recent years and the emergence of new AI technologies presents risks of further vulnerabilities. For example, attempts by malicious actors to fraudulently induce our personnel into disclosing usernames, passwords or other information that can be used to access our systems have increased and could be successful. Ransomware attacks are becoming increasingly prevalent and severe and can lead to significant interruptions, delays, or outages in our operations, loss of data, loss of income, significant extra expenses and resources to restore data or systems, reputational harm, and the diversion of funds. Extortion payments may alleviate the negative impact of a ransomware attack, but we may be unwilling or unable to make such payments due to, for example, applicable laws or regulations prohibiting payments. Our security measures could also be compromised by personnel, theft or errors, and have been in the past and may in the future be insufficient to prevent harm resulting from security vulnerabilities in our platform or the software or systems on which we rely. Additionally, our remote workforce poses increased risks to our IT assets and data. Future or past business transactions (such as acquisitions or integrations) could expose us to additional cybersecurity risks and vulnerabilities, as our systems could be negatively affected by vulnerabilities present in acquired or integrated entities' systems and technologies. Furthermore, we may discover security issues that were not found during due diligence of such acquired or integrated entities, and it may be difficult to integrate companies into our information technology environment and security program.
We take steps designed to detect, mitigate, and remediate vulnerabilities in our information security systems, platform, and solutions. Investigations into potential incidents and insecure configurations of our services and the software we use are also an integral part of our security program. For example, we detected through our bug bounty program a vulnerability in our product that we released patched versions for in October 2025. However we have not always been, and may in the future not be, able to detect, mitigate, and remediate all such vulnerabilities. Moreover, we have experienced and may in the future experience delays in developing and deploying remedial measures and patches designed to address any identified vulnerabilities. Any such remediation or patching may also be costly, difficult or impractical to implement. This is especially the case where there are multiple platforms or third-party partners involved and/or there is a lack of cooperation from other parties necessary for remediation. Security incidents could also damage our IT systems, our ability to provide our products and services, and our ability to make the financial reports and other public disclosures required of public companies. Additionally, vulnerabilities in our products may cause reputational harm resulting in customer loss, and it also may lead to legal liability if such vulnerabilities are exploited before we are able to release patches. Threat actors have used, and may in the future use, an initial compromise of one part of our environment to gain access to other parts of our environment, or to try to leverage a compromise of our networks or systems to gain access to the networks or systems of third parties with whom we work. They may also try to leverage potential vulnerabilities or other information in our platform or code for future attacks.
We rely on third parties to provide critical services that help us deliver our solutions and operate our business. In the course of providing their services, these third parties may support or operate critical business systems for us or store or process personal, sensitive, proprietary and/or confidential information on our behalf. Our ability to monitor these third parties' information security practices is limited and these third-party providers may not have adequate security measures, and have experienced and could experience in the future security incidents that compromise the confidentiality, integrity or availability of the systems they operate for us or the information they process on our behalf. Supply chain attacks are increasing in frequency, and we cannot guarantee that third parties' infrastructure in our supply chain or that of the third parties with whom we work have not been compromised. Certain of our third party suppliers have experienced and may in the future experience attacks that could impact us. Such occurrences could adversely affect our business to the same degree as if we had experienced these occurrences directly and we may not have recourse to the responsible third parties for the resulting liability we incur.
We employ a shared responsibility model where our customers are responsible for using, configuring and otherwise implementing security measures related to our platform, services and products in a manner that meets applicable cybersecurity standards, complies with laws, and addresses their information security risk. As part of this shared responsibility security model, we make certain security features available to our customers that can be implemented at our customers' discretion, or identify security areas or measures for which our customers are responsible. For example, our customers are responsible for implementing multi-factor authentication to access their accounts. In certain cases where our customers choose not to implement, or incorrectly implement, those features or measures, misuse our services, or otherwise experience their own vulnerabilities, policy violations, credential exposure or security breaches, even if we are not the cause of a resulting customer security issue or incident, our customer relationships reputation, and revenue may be adversely impacted.
Because there are many different cybercrime and hacking techniques and such techniques continue to evolve, we have in the past been and may in the future be unable to anticipate attempted security breaches, react in a timely or effective manner or implement adequate preventative measures. While we have developed systems and processes designed to protect the integrity, confidentiality and security of our and our customers' confidential, proprietary, and personal information under our control or under the control of third parties with whom we work, we cannot assure you that any security measures that we or our third-party service providers have implemented has been or will in the future be effective against current or future security threats. Security breaches and other incidents have occurred in the past, and may occur in the future, resulting in unauthorized, unlawful or inappropriate access to, inability to access, disclosure of or loss of sensitive, proprietary or confidential information.
A security breach or other security incident, or the perception that one has occurred, could result in a loss of customer confidence in the security of our platform and damage to our reputation and brand, reduce demand for our solutions, disrupt normal business operations, require us to incur material costs to investigate and remedy the incident and prevent recurrence, expose us to litigation, regulatory enforcement action, fines, penalties and damages and adversely affect our business, financial condition and results of operations. These risks are likely to increase as we continue to grow and process, store and transmit an increasingly large volume of data.
We have contractual and legal obligations to notify relevant stakeholders of security breaches or to take other actions, such as providing credit monitoring and identifying theft protection services. Most jurisdictions have enacted laws requiring companies to notify individuals, regulatory authorities and others of security breaches involving certain types of data. In addition, our agreements with certain customers and partners may require us to notify them in the event of a security breach. Such mandatory disclosures are costly, could lead to negative publicity and may cause our customers to lose confidence in the effectiveness of our security measures.
A security breach could lead to claims by our customers, their end users or other relevant parties that we have failed to comply with contractual obligations to implement specified security measures. As a result, we could be subject to legal action or our customers could end their relationships with us. We cannot assure you that the limitations of liability in our contracts would be enforceable or adequate or would otherwise protect us from liabilities or damages. Security breaches could similarly result in enforcement actions by government authorities alleging that we have violated laws requiring us to maintain reasonable security measures.
Additionally, we cannot be certain that our insurance coverage will be adequate for data security liabilities actually incurred, will cover any indemnification claims against us relating to any incident, will continue to be available to us on economically reasonable terms, or at all, or that any insurer will not deny coverage as to any future claim. The successful assertion of one or more large claims against us that exceed available insurance coverage, or the occurrence of changes in our insurance policies, including premium increases or the imposition of large deductible or co-insurance requirements, could adversely affect our reputation, business, financial condition and results of operations.
In addition, we continue to expend significant costs to seek to protect our platform and solutions and to introduce additional security features for our customers, and we expect to continue to have to expend significant costs in the future. Any increase in these costs will adversely affect our business, financial condition and results of operations.