In the ordinary course of business, we rely on electronic communications and information systems to conduct our business and to store sensitive data, including financial information regarding customers. Our electronic communications and information systems infrastructure, as well as the systems infrastructure of the third-party vendors we use to meet our data processing and communication needs, could be susceptible to cyberattacks, such as denial of service attacks, hacking, terrorist activities, or identity theft. Financial services institutions and companies engaged in data processing have reported breaches in the security of their websites or other systems, some of which have involved sophisticated and targeted attacks intended to obtain unauthorized access to confidential information, destroy data, disable or degrade service, or sabotage systems, often through the introduction of computer viruses or malware, cyber-attacks and other means. Denial of service attacks have been launched against a number of large financial services institutions. Hacking and identity theft risks, in particular, could cause serious reputational harm. Notwithstanding the strength of defensive measures, cybersecurity threats and the tactics, techniques, and procedures used in cyberattacks change, develop, and evolve rapidly and continuously, including from growth in third-party services that facilitate or carry out cyberattacks and from emerging technologies, including artificial intelligence, which may be used to enhance the tactics, techniques, and procedures described above and facilitate new cyber threats. Although to date we have not experienced any material losses relating to cyberattacks or other information security breaches, there can be no assurance that we will not suffer such losses in the future. A failure or circumvention of our security systems could have a material adverse effect on our business operations and financial condition.
We regularly assess and test our security systems and disaster preparedness, including back-up systems, but the risks are ongoing. As a result, cybersecurity and the continued enhancement of our controls and processes to protect our systems, data and networks from attacks, unauthorized access or significant damage remain a priority. Accordingly, we may be required to expend additional resources to enhance our protective measures or to investigate and remediate any information security vulnerabilities or exposures. Any breach of our system security could result in disruption of our operations, unauthorized access to confidential customer information, significant regulatory costs, litigation exposure, and other possible damages, loss, or liability. Such costs or losses could exceed the amount of available insurance coverage, if any, and would adversely affect our earnings. Also, any failure to prevent a security breach or to quickly and effectively deal with such a breach could negatively impact customer confidence, damaging our reputation and undermining our ability to attract and keep customers.