(Total Views: 631)
Posted On: 08/16/2024 12:47:06 PM
Post# of 148870
Cyber Security in the 10K. So far as I know, and of course I'm too lazy to look it up, this section is new. CYDY has taken multiple steps to "safeguard our information assets," among other things. Stands to reason, in this larcenous cyberized world of ours. It may or may not mean that someone has tried to steal our IP, but it certainly means the company knows it has something to protect.
Quote:
We have established processes for assessing, identifying and managing cybersecurity risks, which are built into our information technology function and are designed to safeguard our information assets and operations from internal and external cyber threats, including protecting employee and patient information from unauthorized access to or attacks on our networks and systems. These processes include physical, procedural and technical safeguards, response plans, regular tests on our systems, incident simulations and routine reviews of our policies and procedures to identify risks and enhance our practices. We also employ processes to identify material risks from cybersecurity threats associated with our use of third-party service providers.
We have engaged external parties, including risk management consultants and computer security firms, to enhance our cybersecurity oversight...
(8)
(0)
Scroll down for more posts ▼