Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - MAYS

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

ITEM 1A. RISK FACTORS.

Risks Relating to Ownership Structure

The controlling shareholder group may be able to vote its shares in favor of its interests that may not always coincide with the interests of shareholders not part of such group. This risk may be counter-balanced to a degree by the actions of the Company’s Board of Directors (the “Board”) which is made up of a majority of independent directors.

The controlling shareholder group includes a corporation that owns a significant percentage of the Company’s common stock and which does business with the Company, as further described in the Notes to the Consolidated Financial Statements contained in the 2025 Annual Report to Shareholders. Certain conflicts of interest may be perceived by the relationship between the Company and its largest shareholder. Nevertheless, the Company and its largest shareholder have put in place some controls to reduce the effects of any perceived conflict of interest, including ensuring that the Board is composed of a majority of independent directors.

Risks Related to Our Business and Operations

We are a part of the communities in which we do business. Accordingly, like other businesses in our communities, we are subject to the following risks:

Our investment in property development may be limited by increasing costs required to make improvements to property leased to tenants. Also, as the cost of fitting up properties increases, we may be required to wait and forsake opportunities that would be revenue producing until such time that we obtain the necessary financing of such ventures. This risk may be mitigated by obtaining lines of credit and other financing vehicles, although such have significant limitations on the amounts that may be borrowed at any point in time.

2

We also may be subject to environmental liability as an owner or operator of properties. Many of our properties are old and when we need to fit up a property for a new tenant, we may find materials and the like that could be deemed to contain hazardous elements requiring remediation or encapsulation.

As online retail operations continue to expand nationwide, retailers are facing increased competition which reduces the need for the leasing of properties. Remote work since the pandemic has resulted in tenants’ careful evaluation and reduction of office space needs and a decline in demand of commercial office space rentals from increasing competition. The Company emphasizes retention of tenants over a long period of time which helps in difficult economic conditions. The Company also aggressively markets available space to tenants including governmental agencies, medical, industrial, and educational institutions.

We try to lease our properties to tenants with adequate finances. As a result of the current high interest rate environment and less liquidity available to smaller businesses, even formerly financially strong tenants may be at risk. The Company mitigates the risk of tenants with less than adequate finances by leasing our properties to multiple tenants, where applicable, in order to diversify the tenant base.

ITEM 1B. UNRESOLVED STAFF COMMENTS.

Not Applicable.

ITEM 1C. CYBERSECURITY.

Risk Management and Strategy

We have implemented and maintain various information security processes designed to identify, assess, and manage material risks from cybersecurity threats to our critical computer networks, hardware, software, third-party hosted services, and data.

We rely on third-party service providers to help manage our information systems, including network security service providers with experienced information technology professionals. We also work with third parties to identify, assess, and manage actual and perceived cybersecurity threats and risks, and we evaluate cybersecurity risk as part of our overall risk management strategy. With the assistance of these third-party service providers, we implement and maintain various technical, physical, and administrative controls and processes to manage and mitigate material risks from cybersecurity threats to our information systems. This includes procedures for incident detection and response, network security controls, access controls, physical security, systems monitoring, and backup and recovery procedures.

Our operations rely on third-party service providers and software programs. For instance, our accounting and financial reporting-related systems use software obtained from third-party service providers, and these systems are necessary for the efficient and consistent operation of our business. We use these systems to communicate with tenants, banks, vendors, and others, and to manage our accounting, financial reporting, and for other recordkeeping purposes. We, thus, maintain a process to identify and evaluate cybersecurity risks and incidents associated with key third-party providers. When utilizing third-party software for key services, we seek to engage those that are reliable, reputable, and maintain cybersecurity controls. To address risks associated with third-party providers for critical services, we review available audit reports of controls from such providers to assess and manage any identified risks.

Notwithstanding the effort we place on cybersecurity, we may not be successful in preventing or mitigating a cybersecurity incident that could have a material adverse effect on the Company. As of the date of this Annual Report on Form 10-K, we are not aware of any cybersecurity threats or incidents which have materially affected or are likely to materially affect our Company, results of operations, or financial condition.

Governance

Our Board maintains oversight responsibility of risks from cybersecurity threats. This oversight is facilitated primarily through the Audit Committee (the “Committee”), which is responsible for oversight of our information system risk, including cybersecurity threats. The Committee oversees the risk management program designed to implement adequate controls to mitigate cybersecurity risks.

3

The Committee receives periodic updates from management on potential risks, threats, and controls to mitigate identified risks. The Committee reports to the full Board regarding its activities, including those related to cybersecurity. The full Board also receives briefings from management on the cybersecurity risk management program as needed. The full Board of Directors also receives briefings from management on the cybersecurity risk management program as needed.

Our management, represented by our Chief Financial Officer, Ward Lyke, provides leadership for implementation and maintenance of our cybersecurity risk management processes. Mr. Lyke has served as Vice President, Chief Financial Officer, and Treasurer since January 2024, and as an Executive Vice President and Officer of the Company since 1984, including as Assistant Treasurer since 2003. Mr. Lyke currently manages key functions for the Company’s accounting, finance, and treasury strategies, including risk management. Lyke currently manages key functions 3 Table of Contents for the Company’s accounting, finance, and treasury strategies, including risk management. In addition, Mr. Lyke oversees the Company’s managed IT solutions service provider which includes, among other services:

1.Business continuity – Managed data backup utilizing best practices including cloud-based disaster recovery,

2.Multi-vector security protection – Real-time protection against security threats across email, browsers, files, and infrastructure resources,

3.Patch management – Patching for Windows and certain third-party application updates,

4.Infrastructure monitoring – 24x7 monitoring, alerting and maintenance of various office and cloud systems.

Mr. Lyke is notified real time by the managed service provider for matters requiring immediate attention. Mr. Lyke also reviews a standardized monthly report with key IT systems data and statistics, including red flags requiring resolution, if any. Management reports serious cybersecurity incidents to the Committee and our Board.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
IIIN 15 minutes ago
MAYS 4 hours ago
WGO 20 hours ago
FDS 1 day, 6 hours ago
PENG 1 day, 20 hours ago
LEEN 2 days, 2 hours ago
ENFY 2 days, 2 hours ago
DHAI 2 days, 18 hours ago
LMMY 6 days, 1 hour ago
JBL 6 days, 3 hours ago
CMC 6 days, 22 hours ago
BCTX 1 week ago
UNXP 1 week ago
HFUS 1 week ago
RIVF 1 week, 1 day ago
FGPR 1 week, 1 day ago
HWKE 1 week, 1 day ago
FOXX 1 week, 1 day ago
TGL 1 week, 1 day ago
ALDS 1 week, 1 day ago
GHST 1 week, 1 day ago
PETS 1 week, 1 day ago
LUVU 1 week, 1 day ago
LSH 1 week, 1 day ago
SGLY 1 week, 2 days ago
NGTF 1 week, 2 days ago
SGLA 1 week, 2 days ago
DYNT 1 week, 2 days ago
BRWC 1 week, 6 days ago
ACN 1 week, 6 days ago
VLGEA 1 week, 6 days ago
IPW 1 week, 6 days ago
NKLAQ 1 week, 6 days ago
ODC 1 week, 6 days ago
GLEI 2 weeks ago
ADVB 2 weeks ago
COST 2 weeks, 1 day ago
VISM 2 weeks, 2 days ago
OPTX 2 weeks, 5 days ago
CIIT 2 weeks, 5 days ago
MU 2 weeks, 5 days ago
ARRT 2 weeks, 6 days ago
XERI 2 weeks, 6 days ago
UNFI 3 weeks, 1 day ago
MWAI 3 weeks, 1 day ago
VIVC 3 weeks, 1 day ago
KFFB 3 weeks, 1 day ago
NXNT 3 weeks, 1 day ago
INTG 3 weeks, 2 days ago
PRSI 3 weeks, 2 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard