high match confidence
Sentence-level differences:
- Reworded sentence: "Increased global cybersecurity vulnerabilities, threats, computer viruses, ransomware and phishing attacks and more sophisticated and targeted cyber-related attacks, as well as cybersecurity and other information technology failures resulting 24 24 24 Table of Contents Table of Contents from human error and technological errors, pose a risk to the security of Hologic and its customers, business partners' and suppliers' products, systems and networks and the confidentiality, availability and integrity of data on these products, systems and networks."
- Reworded sentence: "While we attempt to mitigate these risks, we remain potentially vulnerable to additional known or unknown threats, and we cannot assure that the impact from such threats will not be material."
- Reworded sentence: "Despite our implementation of certain controls to protect our systems and sensitive, confidential or personal data or information, we may be vulnerable to material security breaches, theft, misplaced, lost or corrupted data, employee errors and/or malfeasance (including misappropriation by departing employees) that could potentially lead to the compromising of sensitive, confidential or personal data or information, improper use of our systems, software solutions or networks or those of our customers, business partners or suppliers, unauthorized access, use, disclosure, modification or destruction of information, defective products, production downtimes and operational disruptions."
- Reworded sentence: "Although we have experienced occasional cybersecurity incidents and/or attempted breaches of our computer systems, to date we do not believe any of these breaches have had a material effect on our business strategy, results of operations, or financial condition."
Current (2024):
Increased global cybersecurity vulnerabilities, threats, computer viruses, ransomware and phishing attacks and more sophisticated and targeted cyber-related attacks, as well as cybersecurity and other information technology failures resulting 24 24 24 Table of Contents Table of…
Read full text
Increased global cybersecurity vulnerabilities, threats, computer viruses, ransomware and phishing attacks and more sophisticated and targeted cyber-related attacks, as well as cybersecurity and other information technology failures resulting 24 24 24 Table of Contents Table of Contents from human error and technological errors, pose a risk to the security of Hologic and its customers, business partners' and suppliers' products, systems and networks and the confidentiality, availability and integrity of data on these products, systems and networks. As the perpetrators of such attacks become more capable, as cybercrime becomes commoditized, and as critical infrastructure is increasingly becoming digitized, the risks in this area continue to grow. While we attempt to mitigate these risks, we remain potentially vulnerable to additional known or unknown threats, and we cannot assure that the impact from such threats will not be material. Moreover, certain vulnerabilities are difficult to detect even using our best efforts, which may allow those vulnerabilities to persist in our systems over long periods of time. In addition to existing risks, flexible work arrangements, the adoption of new technologies such as artificial intelligence, and acquisitions of new businesses may also increase our exposure to cybersecurity breaches and failures. Geopolitical tensions or conflicts may further heighten the risk of cyber-related attacks. It may also be difficult to determine the best way to investigate, mitigate, contain, and remediate the harm caused by a cyber-related incident. Such efforts may not be successful, and we may make errors or fail to take necessary actions. It may take considerable time for us to investigate and evaluate the full impact of incidents, particularly for sophisticated attacks. These factors may inhibit our ability to provide prompt, full, and reliable information about the incident to our customers, partners, regulators, and the public. Additionally, we have incurred and expect to continue to incur significant costs implementing additional security measures to protect against existing and emerging cybersecurity threats. We also have access to sensitive, confidential or personal data or information that is subject to privacy and security laws, regulations or customer-imposed controls. Despite our implementation of certain controls to protect our systems and sensitive, confidential or personal data or information, we may be vulnerable to material security breaches, theft, misplaced, lost or corrupted data, employee errors and/or malfeasance (including misappropriation by departing employees) that could potentially lead to the compromising of sensitive, confidential or personal data or information, improper use of our systems, software solutions or networks or those of our customers, business partners or suppliers, unauthorized access, use, disclosure, modification or destruction of information, defective products, production downtimes and operational disruptions. In addition, a cyber-related attack could result in other negative consequences, including damage to our reputation or competitiveness, remediation or increased protection costs, litigation or regulatory action. While we carry cyber liability insurance, such insurance may not cover us with respect to any or all claims or costs associated with such a breach. Although we have experienced occasional cybersecurity incidents and/or attempted breaches of our computer systems, to date we do not believe any of these breaches have had a material effect on our business strategy, results of operations, or financial condition.
View prior text (2023)
Increased global cybersecurity vulnerabilities, threats, computer viruses, ransomware and phishing attacks and more sophisticated and targeted cyber-related attacks, as well as cybersecurity failures resulting from human error and technological errors, pose a risk to the security of Hologic and its customers, business partners' and suppliers' products, systems and networks and the confidentiality, availability and integrity of data on these products, systems and networks. As the perpetrators of such attacks become more capable, as cybercrime becomes commoditized, and as critical infrastructure is increasingly becoming digitized, the risks in this area continue to grow. While we attempt to mitigate these risks by employing certain physical, administrative, and technical measures, including, but not limited to, employee training, logical access controls, monitoring and testing, and maintenance of protective systems and contingency plans, we remain potentially vulnerable to additional known or unknown threats, and we cannot assure that the impact from such threats will not be material. In addition to existing risks, flexible work arrangements, the adoption of new technologies and acquisitions of new businesses may also increase our exposure to cybersecurity breaches and failures. We regularly assess external and internal cybersecurity-related risks and identify potential improvements to our cybersecurity program (including its staffing, processes, and technology). When potential improvements are identified, we weigh the costs and benefits of such improvements (including against other potential improvements) and, if selected, the improvements are added to a roadmap for possible implementation. Additionally, we have incurred and expect to continue to incur significant costs implementing additional security measures to protect against existing and emerging cybersecurity threats. We also have access to sensitive, confidential or personal data or information that is subject to privacy and security laws, regulations or customer-imposed controls. Despite our implementation of certain controls to protect our systems and sensitive, confidential or personal data or information, we may be vulnerable to material security breaches, theft, misplaced, lost or corrupted data, employee errors and/or malfeasance (including misappropriation by departing employees) that could potentially lead to the compromising of sensitive, confidential or personal data or information, improper use of our systems, software solutions or networks, unauthorized access, use, disclosure, modification or destruction of information, defective products, production downtimes and operational disruptions. In addition, a cyber-related attack could result in other negative consequences, including damage to our reputation or competitiveness, remediation or increased protection costs, litigation or regulatory action. While we carry cyber liability insurance, such insurance may not cover us with respect to any or all claims or costs associated with such a breach. Although we have experienced occasional cybersecurity incidents and/or attempted breaches of our computer systems, to date we do not believe any of these breaches have had a material effect on our business, operations or reputation. 22 22 22 Table of Contents Table of Contents