In addition, as computer malware, viruses, and computer hacking, fraudulent use attempts, phishing and other cyberattacks have become more prevalent, including attacks by state-sponsored organizations or sophisticated groups of hackers, we face increased risk from these activities to maintain the performance, reliability, security and availability of our subscription offerings and related services and technical infrastructure to the satisfaction of our customers, which may harm our reputation and our ability to retain existing customers and attract new customers.
Our corporate culture has contributed to our success, and if we cannot maintain this culture as we grow, we could lose the innovation, creativity and entrepreneurial spirit we have worked hard to foster, which could harm our business.
We believe that our culture has been and will continue to be a key contributor to our success. From August 1, 2019 to March 31, 2023, we increased the size of our workforce by 90 employees. If we do not continue to maintain our corporate culture as we grow, we may be unable to foster the innovation, creativity and entrepreneurial spirit we believe we need to support successful growth. Further, many of our existing employees may be able to receive significant proceeds from sales of ordinary shares in the public markets as a result of the completion of the Business Combination, which could lead to employee attrition and disparities of wealth among our employees that adversely affects relations among employees and our culture in general. Our transition from a private company to a public company may result in a change to our corporate culture, which could harm our business.
Risks Related to Our Technology and Intellectual Property
Real or perceived errors, failures or bugs in our software could adversely affect our business, results of operations, financial condition and growth prospects.
Our software is complex, and therefore, undetected errors, failures or bugs have occurred in the past and may occur in the future. Our software is used in IT environments with different operating systems, system management software, applications, devices, databases, servers, storage, middleware, custom and third-party applications and equipment and networking configurations, which may cause errors or failures in the IT environment into which our software is deployed. This diversity increases the likelihood of errors or failures in those IT environments. Despite testing by us, real or perceived errors, failures or bugs may not be found until our customers use our software. Real or perceived errors, failures or bugs in our products could result in negative publicity, loss of or delay in market acceptance of our software and harm our brand, weakening of our competitive position, claims by customers for losses sustained by them or failure to meet the stated service-level commitments in our customer agreements. In such an event, we may be required, or may choose, for customer relations or other reasons, to expend significant additional resources in order to help correct the problem. Any errors, failures or bugs in our software could impair our ability to attract new customers, retain existing customers or expand their use of our software, which would adversely affect our business, results of operations and financial condition.
If our security measures, or those of our service providers or customers, are breached or unauthorized parties otherwise obtain access to our or our customers’ data or software, our products and services may be perceived as not being secure, customers may reduce or terminate their use of our products and services and we may face claims, litigation, regulatory investigations, significant liability and reputational damage.
We collect, use, store, transmit and process data as part of our business operations, including personal data for our customers in and across multiple jurisdictions. We also use third-party service providers to collect, use, store, transmit, maintain and otherwise process such information. Increasingly, a variety of cyber threats have become more prevalent in our industry and our customers’ industries.
With our employees and many employees of third-party service providers working remotely due to, among other things, the COVID-19 pandemic, these threats have grown. Security incidents could result in unauthorized access to, damage to, misuse of, disclosure of, modification of, destruction of or loss of our data or customer data (including personal data), software or systems, or disrupt our ability to provide our products and services. Any actual or perceived security incident could interrupt our operations, harm our reputation and brand, result in significant remediation and cybersecurity protection costs, result in lost revenue, lead to regulatory investigations and orders, litigation, disputes, indemnity obligations, damages for breach of contract, penalties for violation of applicable laws and regulations and other legal risks, increase our insurance premiums, and result in any other financial exposure.
We have taken steps to protect the data on our systems and IT infrastructure, but no security measures can protect against all anticipated risks with certainty, and our security measures or those of our customers or third-party service providers could be breached as a result of third-party action, employee or user errors, technological limitations, defects or vulnerabilities in our systems or offerings or those of our third-party service providers, malfeasance, fraud, computer malware, viruses, cyber incidents, or from