Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - VRTC

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

$VRTC Risk Factor changes from 00/10/07/22/2022 to 00/10/10/24/2024

ITEM 1A. RISK FACTORS We are a smaller reporting company as defined by Rule 12b-2 of the Exchange Act and are not required to provide the information under this item. RISK FACTORS We are a smaller reporting company as defined by Rule 12b-2 of the Exchange Act and are not required to provide the information under this item. ITEM 1B. ITEM 1B. UNRESOLVED STAFF COMMENTS None. ITEM 1C. CYBERSECURITY Risk management and strategy We recognize the critical importance of developing, implementing, and maintaining robust cybersecurity measures to safeguard our information systems and protect the confidentiality, integrity, and availability of our data. Managing Material Risks & Integrated Overall Risk Management We have strategically integrated cybersecurity risk management into our broader risk management framework to promote a company-wide culture of cybersecurity risk management. This integration ensures that cybersecurity considerations are an integral part of our decision-making processes at every level. Our management team works closely with our IT department to continuously evaluate and address cybersecurity risks in alignment with our business objectives and operational needs. 3 Oversee Third-party Risk Because we are aware of the risks associated with third-party service providers, we have implemented stringent processes to oversee and manage these risks. We conduct thorough security assessments of all third-party providers before engagement and maintain ongoing monitoring to ensure compliance with our cybersecurity standards. The monitoring includes annual assessments of the SOC reports (or international equivalent) of our providers and implementing complementary controls. This approach is designed to mitigate risks related to data breaches or other security incidents originating from third parties. Risks from Cybersecurity Threats We have not encountered cybersecurity challenges that have materially impaired our operations or financial standing. .
Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
NVTS 13 hours ago
DAN 13 hours ago
FSBC 13 hours ago
CLMB 13 hours ago
NPKI 13 hours ago
SBGI 13 hours ago
BXP 14 hours ago
SHO 14 hours ago
HFWA 14 hours ago
SSP 14 hours ago
FBP 14 hours ago
WULF 14 hours ago
GSG 14 hours ago
SLV 14 hours ago
IBIT 14 hours ago
IAUM 14 hours ago
IAU 14 hours ago
ETHA 14 hours ago
SOLV 14 hours ago
NWN 14 hours ago
TDC 15 hours ago
SAFT 15 hours ago
RPC 15 hours ago
FMAO 15 hours ago
HMN 15 hours ago
STLD 15 hours ago
UBSI 15 hours ago
DKL 15 hours ago
DK 15 hours ago
SBAC 15 hours ago
GLP 15 hours ago
CCBG 15 hours ago
CRI 15 hours ago
SBR 15 hours ago
MSIF 16 hours ago
MAIN 16 hours ago
FMC 16 hours ago
FMBH 16 hours ago
NYT 16 hours ago
LASR 16 hours ago
TXRH 17 hours ago
DRH 17 hours ago
DROR 17 hours ago
ACA 17 hours ago
HOMB 17 hours ago
AVB 17 hours ago
EPD 17 hours ago
WWW 18 hours ago
CHE 18 hours ago
MBWM 18 hours ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard