high match confidence
Sentence-level differences:
- Reworded sentence: "Despite our efforts to create these security barriers, we may not be able to keep pace as new threats emerge, and it is virtually impossible for us to entirely eliminate this risk."
- Added sentence: "Our software products may contain vulnerabilities that could be exploited by cybersecurity attackers, allowing them to introduce malicious code into our products to gain access to customer networks."
- Added sentence: "Such attacks could lead to disruptions to our customers’ operations or processes, system downtime, financial loss, loss of their intellectual property, business information and proprietary data, or corruption of data, which could impact Keysight’s reputation, and result in loss of confidence in our products, loss of orders, and loss in revenue, which could materially impact our financial results."
- Added sentence: "We proactively scan for vulnerabilities in our product lines."
- Added sentence: "When vulnerabilities are discovered, we respond with a predefined Product Security Response Process to address the vulnerability, but we cannot eliminate the possibility of a successful cybersecurity attack or exploitation of undiscovered vulnerabilities."
Current (2023):
We rely on several centralized IT systems to provide solutions and services, maintain financial records, retain sensitive data such as intellectual property, proprietary business information, and data related to customers, suppliers, and business partners, process orders, manage…
Read full text
We rely on several centralized IT systems to provide solutions and services, maintain financial records, retain sensitive data such as intellectual property, proprietary business information, and data related to customers, suppliers, and business partners, process orders, manage inventory, process shipments to customers and operate other critical functions. The ongoing maintenance and security of this information is pertinent to the success of our business operations and our strategic goals. Despite our implementation of network security measures, our network may be vulnerable to cybersecurity attacks, computer viruses, break-ins and similar disruptions. Our network security measures include, but are not limited to, the implementation of firewalls, antivirus protection, patches, log monitors, routine backups, offsite storage, network audits, employee training and routine updates and modifications. Despite our efforts to create these security barriers, we may not be able to keep pace as new threats emerge, and it is virtually impossible for us to entirely eliminate this risk. Cybersecurity attacks are evolving and include, but are not limited to, malicious software, attempts to gain unauthorized access to data, and other electronic security breaches that could lead to disruptions in systems, unauthorized release of confidential or otherwise protected information and corruption of data. Any such event could have a material adverse effect on our business, reputation, operating results and financial condition, and no assurance can be given that our efforts to reduce the risk of such attacks will be successful. Our software products may contain vulnerabilities that could be exploited by cybersecurity attackers, allowing them to introduce malicious code into our products to gain access to customer networks. Such attacks could lead to disruptions to our customers’ operations or processes, system downtime, financial loss, loss of their intellectual property, business information and proprietary data, or corruption of data, which could impact Keysight’s reputation, and result in loss of confidence in our products, loss of orders, and loss in revenue, which could materially impact our financial results. We proactively scan for vulnerabilities in our product lines. When vulnerabilities are discovered, we respond with a predefined Product Security Response Process to address the vulnerability, but we cannot eliminate the possibility of a successful cybersecurity attack or exploitation of undiscovered vulnerabilities. In addition, our IT systems may be susceptible to damage, disruptions, instability, or shutdowns due to power outages, hardware failures, telecommunication failures, user errors, implementation of new operational systems or software or upgrades to existing systems and software, catastrophes, or other unforeseen events. Such events could result in the disruption of business processes, network degradation and system downtime, along with the potential that a third party will exploit our critical assets, such as intellectual property, proprietary business information and data related to our customers, suppliers and business partners. Further, such events could result in loss of revenue, loss of or reduction in purchase orders, inability to report financial information, litigation, regulatory fines and penalties, and other damage that could have a material impact on our business operations. To the extent that such disruptions occur, our customers and partners may lose confidence in our solutions, and we may lose business or brand reputation, resulting in a material and adverse effect on our business operating results and financial condition.
View prior text (2022)
We rely on several centralized IT systems to provide solutions and services, maintain financial records, retain sensitive data such as intellectual property, proprietary business information, and data related to customers, suppliers, and business partners, process orders, manage inventory, process shipments to customers and operate other critical functions. The ongoing maintenance and security of this information is pertinent to the success of our business operations and our strategic goals. Despite our implementation of network security measures, our network may be vulnerable to cybersecurity attacks, computer viruses, break-ins and similar disruptions. Our network security measures include, but are not limited to, the implementation of firewalls, antivirus protection, patches, log monitors, routine backups, offsite storage, network audits, employee training and routine updates and modifications. Despite our efforts to create these security barriers, we may not be able to keep pace as new threats emerge and it is virtually impossible for us to entirely eliminate this risk. Cybersecurity attacks are evolving and include, but are not limited to, malicious software, attempts to gain unauthorized access to data, and other electronic security breaches that could lead to disruptions in systems, unauthorized release of confidential or otherwise protected information and corruption of data. Any such event could have a material adverse effect on our business, reputation, operating results and financial condition, and no assurance can be given that our efforts to reduce the risk of such attacks will be successful. In addition, our IT systems may be susceptible to damage, disruptions, instability, or shutdowns due to power outages, hardware failures, telecommunication failures, user errors, implementation of new operational systems or software or upgrades to existing systems and software, catastrophes, or other unforeseen events. Such events could result in the disruption of business processes, network degradation and system downtime, along with the potential that a third party will exploit our critical assets such as intellectual property, proprietary business information and data related to our customers, suppliers and business partners. Further, such events could result in loss of revenue, loss of or reduction in purchase orders, inability to report financial information, litigation, regulatory fines and penalties, and other damage that could have a material impact on our business operations. To the extent that such disruptions occur, our customers and partners may lose confidence in our solutions and we may lose business or brand reputation, resulting in a material and adverse effect on our business operating results and financial condition.