Some statements in this news release are, or may be considered, forward-looking statements for purposes of the Private Securities Litigation Reform Act of 1995. The words "believe," "expect," "anticipate," "project" and similar expressions, among others, generally identify forward-looking statements. AbbVie cautions that these forward-looking statements are subject to risks and uncertainties that may cause actual results to differ materially from those indicated in the forward-looking statements. Such risks and uncertainties include, but are not limited to, competition from other products, challenges to intellectual property, difficulties inherent in the research and development process, adverse litigation or government action, and changes to laws and regulations applicable to our industry. Additional information about the economic, competitive, governmental, technological and other factors that may affect AbbVie's operations is set forth in Item 1A, "Risk Factors," of AbbVie's 2018 Annual Report on Form 10-K, which has been filed with the Securities and Exchange Commission. AbbVie undertakes no obligation to release publicly any revisions to forward-looking statements as a result of subsequent events or developments, except as required by law.
"It's a very difficult situation when they do get hit by this, because their intellectual property is usually what makes them money. And if they haven't got back-ups, if they haven't got a robust process for duplicating all their data you can find yourself in a very difficult situation where somebody's locked away the crown jewels for your business, and that can be very difficult."
Separately, Twist announced this week that it has obtained ISO 27001 certification. The ISO27001:2013 standard provides best practices for information security management systems covering privacy and compliance of software applications as well as intellectual property and other sensitive customer information.
Consider the implications of workers clicking on an ad promising a COVID-19 wonder drug, or opening an email attachment—from what appears to be a legitimate health agency offering pandemic updates—that embeds software designed to compromise security. Or what if a worker is manipulated by social engineering techniques to follow instructions from a cyber criminal claiming to be from the employer’s help desk? Does your company have adequate provisions in place to prevent workers from downloading malware that could be used to collect passwords providing access to payment systems, personnel records, personal customer data, intellectual property, and other important assets?