"we or our products and services are a frequent target of computer hackers or organizations that intend to sabotage, take control of or otherwise corrupt our manufacturing or other processes, products and services or to gain access to our network or" . . . . .