XML 24 R11.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2024
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity Risk Management and Strategy

 

The Company recognizes that cybersecurity risks present a dynamic and evolving challenge. We are committed to safeguarding our systems, networks, and data from unauthorized access, disruption, or damage that could adversely affect our operations, customers, or stakeholders.

 

We maintain a multi-layered cybersecurity program designed to identify, assess, mitigate, and monitor material risks related to information technology systems and data. Key components of our program include:

 

  · Continuous Monitoring: Ongoing monitoring of our networks and systems for vulnerabilities, intrusions, and other malicious activity;
     
  · Third-Party Tools and Assessments: Engagement of independent security experts and use of advanced technologies, including firewalls, endpoint detection and response (EDR), encryption, and secure cloud infrastructure.
     
  · Employee Awareness and Training: Regular training programs to enhance employee awareness of phishing, data security, and incident response protocols;
     
  · Incident Response and Recovery: A documented cybersecurity incident response plan addressing identification, containment, remediation, recovery, and notification procedures.

 

We align our cybersecurity controls with industry standards and frameworks, including principles derived from the NIST Cybersecurity Framework.

 

Impact of Cybersecurity Risks on Business

 

To date, we have not identified or experienced a cybersecurity incident that has materially affected our business strategy, results of operations, or financial condition. However, like other public companies, we are subject to ongoing cyber threats from both internal and external sources, including malicious actors, criminal organizations, and nation-state actors. Any future incident could have a material adverse impact. We continue to allocate resources to strengthen our controls, implement new technologies, and partner with third-party experts to further mitigate risk and protect our digital assets.

Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Processes Integrated [Text Block] The Company recognizes that cybersecurity risks present a dynamic and evolving challenge. We are committed to safeguarding our systems, networks, and data from unauthorized access, disruption, or damage that could adversely affect our operations, customers, or stakeholders.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] To date, we have not identified or experienced a cybersecurity incident that has materially affected our business strategy, results of operations, or financial condition. However, like other public companies, we are subject to ongoing cyber threats from both internal and external sources, including malicious actors, criminal organizations, and nation-state actors. Any future incident could have a material adverse impact. We continue to allocate resources to strengthen our controls, implement new technologies, and partner with third-party experts to further mitigate risk and protect our digital assets.
Cybersecurity Risk Board of Directors Oversight [Text Block] Governance and Oversight

 

Board Oversight:

 

The Board of Directors, through its Audit Committee, provides oversight of cybersecurity and information security risk. The Audit Committee reviews cybersecurity risks and management’s related strategies at least annually, or more frequently as circumstances warrant. Cybersecurity risk is also considered in the context of the Company’s broader enterprise risk management framework and strategic planning.

 

Management Oversight:

 

Day-to-day responsibility for cybersecurity risk management rests with our Compliance Officer, who coordinates with third-party cybersecurity consultants and internal IT personnel. The Compliance Officer is responsible for implementing and enforcing cybersecurity protocols, overseeing incident detection and response activities, and ensuring appropriate remediation and recovery. Management provides periodic reports to the Board regarding risk assessments, identified threats, mitigation activities, and any cybersecurity incidents.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] The Board of Directors, through its Audit Committee, provides oversight of cybersecurity and information security risk. The Audit Committee reviews cybersecurity risks and management’s related strategies at least annually, or more frequently as circumstances warrant. Cybersecurity risk is also considered in the context of the Company’s broader enterprise risk management framework and strategic planning.
Cybersecurity Risk Management Positions or Committees Responsible [Flag] true
Cybersecurity Risk Management Positions or Committees Responsible [Text Block] The Compliance Officer is responsible for implementing and enforcing cybersecurity protocols, overseeing incident detection and response activities, and ensuring appropriate remediation and recovery. Management provides periodic reports to the Board regarding risk assessments, identified threats, mitigation activities, and any cybersecurity incidents.