Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] | The Company employs several strategies for assessing, identifying, and managing material risks from cybersecurity threats. Components of this strategy include the use of industry standard traffic monitoring tools, and training users to detect, report, and prevent unusual behavior.
Through our IT consulting firm, we employ continuous monitoring mechanisms to detect and respond to cybersecurity threats promptly. Regular reports are generated as needed for management and the board, providing insights into our cybersecurity posture, incidents, and remediation efforts. We conduct regular assessments and testing to ensure the effectiveness of these controls, especially those related to the protection of financial information. The implementation and management of these processes are integrated with the Company’s overall operational risk management processes that seeks to limit our exposure to unnecessary risks across our operations.
Our cybersecurity program is overseen by the Chief Financial Officer (CFO), who reports directly to the Chief Executive Officer (CEO) and updates the Board of Directors on cybersecurity matters.
Our employees receive regular training on cybersecurity best practices, emphasizing the protection of financial information. We foster a culture of cybersecurity awareness and responsibility throughout the organization.
We maintain a comprehensive incident response plan that outlines the steps to be taken in the event of a cybersecurity incident. This plan includes procedures for promptly reporting material incidents to the SEC, as required, and for communicating with affected stakeholders. Upon discovery of a cybersecurity incident, the identifying party immediately notifies the Company’s CFO. The CFO activates the incident response plan to include the following:
|
||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Management Processes Integrated [Flag] | true | ||||||||||||||||||||||||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | Our employees receive regular training on cybersecurity best practices, emphasizing the protection of financial information. We foster a culture of cybersecurity awareness and responsibility throughout the organization |