Over time, in response to financial markets crises, global economic recessions, and social and environmental issues, regulatory initiatives were adopted in the United States and elsewhere. Such initiatives addressed for example, the regulation of banks and other major financial institutions and environmental and global-warming matters. These initiatives impact all of our businesses, albeit in varying ways. Increased regulatory compliance costs could have a significant negative impact on our operating businesses, as well as on the businesses in which we have a significant, but not controlling economic interests. We cannot predict whether such initiatives will have a material adverse impact on our consolidated financial position, results of operations and/or cash flows. Data privacy regulations have recently been enacted in various jurisdictions in the U.S. and throughout the world. These regulations address numerous aspects related to the security of personal information that is stored in our information systems, networks and facilities. Failure to comply with these regulations could result in reputational damage and significant penalties.
We rely on technology in virtually all aspects of our business. Like those of many large businesses, certain of our information systems have been subject to computer viruses, malicious codes, unauthorized access, phishing efforts, denial-of-service attacks and other cyber attacks and we expect to be subject to similar attacks in the future as such attacks become more sophisticated and frequent. A significant disruption or failure of our technology systems could result in service interruptions, safety failures, security events, regulatory compliance failures, an inability to protect information and assets against unauthorized users, and other operational difficulties. Attacks perpetrated against our systems could result in the loss of assets and critical information and expose us to remediation costs and reputational damage. Although we have taken steps intended to mitigate these risks, including business continuity planning, disaster recovery planning and business impact analysis, a significant disruption or cyber intrusion could adversely affect our results of operations, financial condition and liquidity. Additionally, if we are unable to acquire, develop, implement, adopt or protect rights around new technology, we may suffer a competitive disadvantage, which could also have an adverse effect on our results of operations, financial condition and liquidity. Cyber attacks could further adversely affect our ability to operate facilities, information technology and business systems, or compromise confidential customer and employee information. Political, economic, social or financial market instability or damage to or interference with our operating assets, customers or suppliers from cyber attacks may result in business interruptions, lost revenues, higher commodity prices, disruption in fuel supplies, lower energy consumption, unstable markets, increased security, repair or other costs, or may materially adversely affect us in ways that cannot be predicted at this time. Any of these risks could materially affect our consolidated financial results. Furthermore, instability in the financial markets resulting from terrorism, sustained or significant cyber attacks, or war could also have a material adverse effect on our ability to raise capital. We share these risks with all businesses.
As technology continues to advance and more businesses move their operations online, there has been a significant increase in cyber attacks targeting small businesses. According to the National Cyber Security Alliance, 43% of cyber-attacks are aimed at small businesses, and 60% of these companies go out of business within six months after an attack.
One of the main reasons small businesses are targeted is their lack of proper cybersecurity measures. Many small business owners believe that they are not at risk because they are not as large or high-profile as big corporations. However, this misconception makes them an easy target for cybercriminals who see them as vulnerable and less likely to have strong security defenses in place.