We rely heavily on communications and information systems to conduct our business. Our systems process and maintain information that is confidential, proprietary, personal, or otherwise sensitive, including financial and other confidential business information. We, our customers, and other financial institutions with which we interact, are subject to ongoing, continuous attempts by threat actors, such as organized cybercrime, hackers, and state-sponsored organizations, to penetrate key systems. Information security risks for us and other large financial institutions have increased significantly in recent years, partly due to the proliferation of new technologies, including artificial intelligence, the ubiquity of internet connections, and the increased sophistication and activities of threat actors.
Moreover, developments in our and third parties' use of generative artificial intelligence, as well as the use of mobile and cloud technologies, could heighten these and other operational risks, as certain aspects of the security of such technologies may be complex, unpredictable, or beyond our control. The types of attacks these threat actors use include, but are not limited to, exploiting customer or system vulnerabilities or misconfigurations, denial-of-service, ransomware, compromising business emails, deceiving employees through email phishing or social engineering, and compromising any of our suppliers. Such threats may be difficult to detect over extended periods and could be further exacerbated through threat actors' use of artificial intelligence.
Third parties, including our suppliers and their subcontractors, also present operational and information security risks to us, including security incidents or failures of their own systems and downstream systems. In incidents involving third parties, we may not be informed promptly of any effect on our services or our data, nor be able to participate in any related investigation, notification, or remediation. The possibility of third-party or employee error, failure to follow security procedures, or malfeasance also presents these risks.
As cybersecurity threats continue to evolve, we allocate necessary resources to modify or enhance our defenses and investigate or remediate any information security vulnerabilities. While we and our third-party suppliers have experienced cybersecurity incidents in the past that have not materially impacted our data, customers, or operations, there can be no assurance that future failures, interruptions, or significant security breaches will not occur or that they will be adequately addressed. It is impossible to determine the severity or potential effects of these incidents with any certainty.
System enhancements and updates may also create risks associated with implementing new systems and integrating them with existing ones. Due to the complexity and interconnectedness of information technology systems, the process of enhancing our defenses itself can create a risk of systems disruptions and security issues. We may face additional risks to the extent our hardware and software providers are unable to deliver patches and updates to mitigate vulnerabilities or we are unable to implement patches in a timely manner, particularly when a vulnerability is being actively exploited by threat actors. We have devoted and will continue to devote significant resources to the security of our computer systems, but they may still be vulnerable to these threats and our efforts may subsequently be deemed to have been inadequate by regulators or courts. The occurrence of any failure, interruption or security incident to our information systems or those of our third-party suppliers could interfere with or disrupt our operations and services, damage our reputation, result in a loss of customer business, subject us to additional regulatory scrutiny, expose us to civil litigation and financial liability, or otherwise result in material adverse consequences on us.
For information about how we manage cybersecurity risk, see Part I, Item 1C. Cybersecurity on page 24.