During the course of business, we obtain and transmit confidential customer, employee, vendor and Company information through our information technology systems. The protection of customer, employee, vendor and Company data is critical. Although we have implemented systems and procedures that are designed to protect customer, employee, vendor and Company information, prevent data loss and other security breaches, and otherwise identify, assess, and analyze cybersecurity risks, these measures may not be effective. Development and maintenance of these systems is costly and requires ongoing monitoring and updating as technologies change and efforts to overcome security measures increase and become more sophisticated.
We face an evolving threat landscape in which cybercriminals, among others, employ an increasingly complex array of techniques designed to access personal data and other information, including, for example, the use of fraudulent or stolen access credentials, malware, ransomware, phishing, denial of service, supply chain and other types of attacks. Our and our suppliers' and service providers' information technology systems also may be damaged or disrupted, or personal or sensitive information compromised, from a number of other causes, including power outages, system failures, catastrophic events, or employee inadvertence.
While, to the best of our knowledge, we have not experienced any material misappropriation, loss or other unauthorized disclosure of confidential or personally identifiable information as a result of a security breach or cyber attack that could materially increase financial risk to the Company or our customers, such a security breach or cyber attack could adversely affect our business and operations, including by damaging our reputation and our relationships with our customers, employees and shareholders, exposing us to litigation, fines, penalties or remediation costs and inhibiting our ability to accept debit and credit cards as forms of payment. Further, because many of our corporate and showroom employees are maintaining hybrid office and remote work schedules, our business may be more vulnerable to cybersecurity breach attempts due to offsite working by employees, increased use of public Wi-Fi and use of office equipment off premises. In addition, this period of uncertainty could result in an increase in phishing and other scams, fraud, money laundering, theft and other criminal activity.
Our efforts to protect customer, employee, vendor and Company information may also be adversely impacted by data security or privacy breaches that occur at our third-party vendors or unrelated third parties whose information technology systems we use directly or indirectly. While we believe we are diligent in selecting vendors, systems and procedures to enable us to maintain the integrity of our systems, we recognize that there are inherent risks and we cannot assure that any future interruptions, shutdowns or unauthorized breaches or disclosures will not occur.
The regulatory environment surrounding information security and privacy is demanding, with the frequent imposition of new and changing requirements, such as the GDPR and CCPA. With a heightened degree of public awareness and scrutiny regarding information security and privacy, customers have a high expectation that companies will adequately protect their personal information from cyber attack or other security breaches. See Item 1C: Cybersecurity for further discussion.