Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | |||||||||||||||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Line Items] | |||||||||||||||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Our Board oversees our comprehensive cybersecurity program. Our cybersecurity program is managed by our Chief Financial Officer in collaboration with a specialized third-party service provider. Our Chief Financial Officer has over ten years’ experience managing information technology (“IT”), including cybersecurity, and is the designated Chief Information Officer under our Information Resources Policy. As of the date of this Annual Report on Form 10-K, we know of no cybersecurity incident that has or is likely to materially affect us, our business strategy, our results of operations, or our financial condition. We employ a robust, multi-layer approach to identify and mitigate cybersecurity risks, such as anti-virus and content filtering to protect against malware and inappropriate content, weekly patch management, network firewall monitoring to detect and prevent unauthorized access, off-site email back-ups to safeguard data integrity and availability, endpoint threat detection and threat hunting to identify and respond to potential threats, and multi-factor authentication and security hardening to reinforce system defenses. In December 2023, we conducted a thorough cybersecurity assessment with our third-party service provider. Based on their recommendations, we implemented several cybersecurity enhancements in 2024. To date and to our knowledge, no external entity has successfully breached our systems. If a breach were to be discovered, our Chief Financial Officer would promptly inform our Chief Executive Officer, who would then communicate the details to our Board. |
||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | In addition to our cybersecurity program, we have implemented operational improvements intended to streamline business processes, reduce certain risks, and fuel growth. Led by a Senior Engineer, our third-party service provider proactively assesses security, risk, and productivity to ensure optimal coverage and investment in the rapidly changing IT industry. Our IT partner’s responsible IT architecture program aims to: | ||||||||||||||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||||||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | Our Board oversees our comprehensive cybersecurity program. Our cybersecurity program is managed by our Chief Financial Officer in collaboration with a specialized third-party service provider. Our Chief Financial Officer has over ten years’ experience managing information technology (“IT”), including cybersecurity, and is the designated Chief Information Officer under our Information Resources Policy. As of the date of this Annual Report on Form 10-K, we know of no cybersecurity incident that has or is likely to materially affect us, our business strategy, our results of operations, or our financial condition. We employ a robust, multi-layer approach to identify and mitigate cybersecurity risks, such as anti-virus and content filtering to protect against malware and inappropriate content, weekly patch management, network firewall monitoring to detect and prevent unauthorized access, off-site email back-ups to safeguard data integrity and availability, endpoint threat detection and threat hunting to identify and respond to potential threats, and multi-factor authentication and security hardening to reinforce system defenses. In December 2023, we conducted a thorough cybersecurity assessment with our third-party service provider. Based on their recommendations, we implemented several cybersecurity enhancements in 2024. To date and to our knowledge, no external entity has successfully breached our systems. If a breach were to be discovered, our Chief Financial Officer would promptly inform our Chief Executive Officer, who would then communicate the details to our Board. | ||||||||||||||||||||||||
Cybersecurity Risk Board of Directors Oversight [Text Block] |
In addition to our cybersecurity program, we have implemented operational improvements intended to streamline business processes, reduce certain risks, and fuel growth. Led by a Senior Engineer, our third-party service provider proactively assesses security, risk, and productivity to ensure optimal coverage and investment in the rapidly changing IT industry. Our IT partner’s responsible IT architecture program aims to:
This program also helps to identify system gaps and provides solutions to align us with best practices and security measures against any cybersecurity threats. |
||||||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | ||||||||||||||||||||||||
Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |