v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

We have implemented and maintain various information security processes in accordance with our business designed to identify, assess, manage and protect against material risks from cybersecurity threats to our critical computer networks, communication systems, hardware and software, and our critical data, including intellectual property and confidential information.

 

Depending on the environment, we implement and maintain various technical, physical and organizational measures, processes, and policies designed to manage and mitigate material risks from cybersecurity threats to our information systems and data, including, for example, incident detection and response plans; disaster recovery and business continuity plans; maintaining network security and access controls; asset management; monitoring certain of our systems and network; cybersecurity insurance; and training our employees about certain cybersecurity risks and threats.

 

We currently engage third party information technology partners to design and manage our information security processes and system. Working with our outsourced security team, our Chief Financial Officer manages the risk assessment and mitigation process. We hired a business systems and information technology manager in fiscal 2025 to increase our in-house expertise in this area. As we grow, we plan to develop a more robust and detailed strategy for cybersecurity.

Cybersecurity Risk Management Processes Integrated [Text Block] We have implemented and maintain various information security processes in accordance with our business designed to identify, assess, manage and protect against material risks from cybersecurity threats to our critical computer networks, communication systems, hardware and software, and our critical data, including intellectual property and confidential information.
Cybersecurity Risk Management Processes Integrated [Flag] true
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Board of Directors Oversight [Text Block]

Governance

 

Cybersecurity risks are overseen by the full Board of Directors and the Audit Committee as part of their regular oversight. Members of the Board and Audit Committee are encouraged to engage in ad hoc conversations with management on cybersecurity related updates to our risk management and strategy. Cybersecurity incidents are reported to the Chief Financial Officer to determine incident severity and response. In an effort to deter and detect cyber threats, we also provide all employees with access to digital assets with an ongoing cybersecurity awareness training program, which further educates employees and covers timely and relevant topics, including phishing, password protection, asset use and mobile security.

 

Risks from cybersecurity threats

 

To date, we have not identified any cybersecurity incidents or threats that have materially affected us, or are reasonably likely to materially affect us, including our business strategy, results of operations, or financial condition. However, like many companies in our industry, we face numerous and evolving cybersecurity threats that could adversely affect our business. For more information about the risks from cybersecurity threats that may materially affect us and how they may do so, see our risk factors under Part 1 Item 1A Risk Factors contained elsewhere in this report.

Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] Cybersecurity risks are overseen by the full Board of Directors and the Audit Committee as part of their regular oversight.
Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] Members of the Board and Audit Committee are encouraged to engage in ad hoc conversations with management on cybersecurity related updates to our risk management and strategy. Cybersecurity incidents are reported to the Chief Financial Officer to determine incident severity and response.
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] However, like many companies in our industry, we face numerous and evolving cybersecurity threats that could adversely affect our business. For more information about the risks from cybersecurity threats that may materially affect us and how they may do so, see our risk factors under Part 1 Item 1A Risk Factors contained elsewhere in this report.