Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | ||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | ||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | Risk Management and
Strategy We recognize the importance of securing our data and information systems and have a process for assessing, mitigating, overseeing and managing cybersecurity and related risks. This process is supported by both management and our Board of Directors.
The Company’s cybersecurity function is led by a contracted Chief Technology Officer (“Contract CTO”), who provides strategic oversight and reports directly to the Chief Executive Officer. The Contract CTO is responsible for managing the Company’s cybersecurity risk and overseeing the protection of our networks, systems, and data. To execute these responsibilities, the Company utilizes a combination of internal personnel and multiple external technology partners, including two independent IT service firms that support system administration, infrastructure management, and security monitoring. These resources employ industry-standard tools and processes designed to prevent, identify, escalate, investigate, and resolve security incidents in a timely manner. Additionally, with fewer than 20 employees and contractors, the Company’s small size facilitates rapid communication and coordinated response to potential cybersecurity risks. The Company’s aggressive prevention and response protocols consist of the following:
Our Board of Directors is responsible for overseeing our enterprise risk management activities. The Board of Directors receives an update on the Company’s risk management process and the risk trends related to cybersecurity at least annually. Additionally, on a quarterly basis, the Audit Committee will receive updates from Management on cybersecurity. Any material threat that may arise will be communicated to the Board of Directors and Audit Committee upon identification.
While the Company has not, as of the date of this Form 10-K, identified a cybersecurity threat or incident that resulted in a material adverse impact to its business, results of operations or financial condition, there can be no guarantee that the Company will not experience such an incident in the future. |
|||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | |||||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | |||||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | |||||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Text Block] | While the Company has not, as of the date of this Form 10-K, identified a cybersecurity threat or incident that resulted in a material adverse impact to its business, results of operations or financial condition, there can be no guarantee that the Company will not experience such an incident in the future. | |||||||||||||||
| Cybersecurity Risk Board of Directors Oversight [Text Block] | Our Board of Directors is responsible for overseeing our enterprise risk management activities. | |||||||||||||||
| Cybersecurity Risk Process for Informing Board Committee or Subcommittee Responsible for Oversight [Text Block] | The Board of Directors receives an update on the Company’s risk management process and the risk trends related to cybersecurity at least annually. | |||||||||||||||
| Cybersecurity Risk Role of Management [Text Block] | The Company’s cybersecurity function is led by a contracted Chief Technology Officer (“Contract CTO”), who provides strategic oversight and reports directly to the Chief Executive Officer. The Contract CTO is responsible for managing the Company’s cybersecurity risk and overseeing the protection of our networks, systems, and data. To execute these responsibilities, the Company utilizes a combination of internal personnel and multiple external technology partners, including two independent IT service firms that support system administration, infrastructure management, and security monitoring. These resources employ industry-standard tools and processes designed to prevent, identify, escalate, investigate, and resolve security incidents in a timely manner. Additionally, with fewer than 20 employees and contractors, the Company’s small size facilitates rapid communication and coordinated response to potential cybersecurity risks. | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible [Flag] | true | |||||||||||||||
| Cybersecurity Risk Process for Informing Management or Committees Responsible [Text Block] | Additionally, on a quarterly basis, the Audit Committee will receive updates from Management on cybersecurity. Any material threat that may arise will be communicated to the Board of Directors and Audit Committee upon identification. | |||||||||||||||
| Cybersecurity Risk Management Positions or Committees Responsible Report to Board [Flag] | true |