Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - MGYR

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$MGYR Risk Factor changes from 00/12/19/24/2024 to 00/12/19/25/2025

ITEM 1A.Risk Factors Not required for smaller reporting companies. ITEM 1B.Unresolved Staff Comments Not applicable. ITEM 1C.Cybersecurity The Board of Directors and Information Security Officer are responsible for overseeing the Information Security Program. The Board of Directors receives reports from, and oversees, IT Risk Assessment, Cybersecurity Risk Assessment, Annual IT Program Status Report, Vendor Management Risk Assessment, and Internal Vulnerability Reports and current Cyber Events briefings. The Board of Directors also makes budgeting, procedure, and policy decisions designed and intended to improve the Company’s residual risk. The Technology and Security Committee consists of the Company’s senior management, the IT Management, and business unit management. The primary function of the Technology and Security Committee is to perform Strategic Planning, discuss hardware and software replacement, new projects, current cybersecurity threats, and ongoing cybersecurity issues and threats. The IT Director provides an IT status report to the Board of Directors on a monthly basis. The Company has adopted an Incident Response Plan (the “Plan”) to monitor, detect, mitigate and remediate cybersecurity incidents. The Plan requires that business unit management have a working knowledge of the Company’s Information Security Program and Incident Response Policies. Pursuant to the Plan, the IT Director identifies information owners for sensitive customer information and creates an incident response team. Each Department Manager, upon notification of a potential unauthorized access, manipulation of data or theft of any item identified under the Gramm-Leach-Bliley Act (the “GLBA”) Inventory and Asset Classification, is responsible for further assessing the situation in order to document the suspected or actual breach and forward the appropriate documentation to IT Management. The documentation of the suspected or actual incident includes the following: (a) Identify the nature and scope of the incident; (b) Identify the information systems affected; (c) Identify the types of customer information potentially affected. The documentation of the suspected or actual incident includes the following: (a) Identify the nature and scope of the incident; (b) Identify the information systems affected; (c) Identify the types of customer information potentially affected. 18 Once the Incident Response Team has determined that unauthorized access, manipulation of data or theft of any item identified under GLBA Inventory and Asset Classification has occurred, Executive Management, the Information Security Officer, the Compliance Officer and the Information Technology Management must be contacted immediately. Once the Incident Response Team has determined that unauthorized access, manipulation of data or theft of any item identified under GLBA Inventory and Asset Classification has occurred, Executive Management, the Information Security Officer, the Compliance Officer and the Information Technology Management must be contacted immediately. If theft of any item identified under GLBA Inventory and Asset Classification has occurred, and it cannot be determined what specific information was included on the Asset, the Asset is treated as if it contained sensitive customer information and Senior Management, the Information Security Officer, the Compliance Officer and Information Technology Management must be contacted immediately. If Management declares an incident or if there is a confirmed theft or loss of customer information, appropriate regulatory authorities, law enforcement, and legal counsel are notified. During the fiscal year ended September 30, 2025, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition. 18 During the fiscal year ended September 30, 2024, the risks from cybersecurity threats, including as a result of any previous cybersecurity incidents, have not materially affected the Company, its business strategy, results of operations, or financial condition. .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
HRZN 12 hours ago
HY 12 hours ago
ARCT 12 hours ago
QSI 12 hours ago
FTEK 12 hours ago
ACEL 12 hours ago
RYM 12 hours ago
ANAB 12 hours ago
PRKS 12 hours ago
ABVC 12 hours ago
FTCO 12 hours ago
CVEO 12 hours ago
DAR 12 hours ago
ELVN 12 hours ago
SANA 12 hours ago
UPLD 12 hours ago
HNGE 12 hours ago
JRVR 12 hours ago
IMNM 12 hours ago
CENX 12 hours ago
ADSK 12 hours ago
RIGL 12 hours ago
CALC 12 hours ago
STAA 12 hours ago
EVOX 12 hours ago
CODQL 14 hours ago
HLIO 14 hours ago
CFFI 15 hours ago
SRTA 16 hours ago
YORW 17 hours ago
CBL 18 hours ago
INGM 19 hours ago
AMRC 20 hours ago
HNI 20 hours ago
PRME 20 hours ago
OFS 20 hours ago
SRRK 21 hours ago
PASG 21 hours ago
AMLX 21 hours ago
HYMC 1 day, 8 hours ago
ANIK 1 day, 9 hours ago
DAAQ 1 day, 10 hours ago
RAAQ 1 day, 10 hours ago
HTLD 1 day, 10 hours ago
NBBK 1 day, 11 hours ago
AMRN 1 day, 11 hours ago
CECO 1 day, 11 hours ago
SIVR 1 day, 11 hours ago
GLTR 1 day, 11 hours ago
PALL 1 day, 11 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard