Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mar. 31, 2025 | |||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Item
1C. CybersecurityProcesses
for assessing, identifying, and managing material risks from cybersecurity threats are conducted in-house, with the help of analytics
and notifications that are built-in to our third-party tools. These processes include:
Cybersecurity threats could potentially result in slowed or halted business operations, such as shipping, closing sales, marketing engagement, and other communications. This would negatively impact the Company’s financial condition until the issue is resolved. Such threats could impact customers of certain programs that rely on digital resources, but a majority of our products would not be materially affected. Other threats may include the compromise of customer personally-identifiable information. We continually monitor for threats to avoid risks to Company or individuals’ data, interruptions to business operations, or financial losses.
No cybersecurity incidents were identified this year. One threat was identified: insecurely stored credentials. This was responded to by implementing an encrypted password manager Company-wide. We will continue to monitor for threats to avoid risks to Company or individuals’ data, interruptions to business operations, or financial losses. Information about risks or any identified cybersecurity threats are reported by our Director of Technology to our President.
Identified cybersecurity risks are reported to IT, where they are assessed and responded to. Any actions taken or cybersecurity incidents identified are reported to the Director of Technology. Qualifications for these individuals include prior experience, education, and/or training in cybersecurity. |
||||||||||||
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | Such threats could impact customers of certain programs that rely on digital resources, but a majority of our products would not be materially affected. |