XML 36 R10.htm IDEA: XBRL DOCUMENT v3.25.2
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Jun. 30, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Risk management and strategy

 

We engage and implement risk management strategies to identify, assess, and manage material risks arising from cybersecurity threats and alerts. Our method involves a systematic evaluation of all potential threats, vulnerabilities, and their possible impacts on the Company’s operations, data, and system integrity. Our cybersecurity risk management strategy includes:

 

Identifying risks to our environment;
   
Deploying Internal IT teams and third-party providers to investigate, contain, and resolve identified threats;
   
Providing monthly cybersecurity awareness training to our staff;
   
Maintenance and periodic testing of a cybersecurity incident response plan;
   
Assessing and managing third-party and vendor cybersecurity risk, including contractual security requirements and periodic reviews; and
   
Integrating cybersecurity risk considerations into our enterprise risk management processes.

 

We also engage external cybersecurity consultants and use industry-standard tools to help monitor our networks, review vulnerability scans, and conduct penetration testing on a periodic basis. Our risk management practices are integrated into our overall enterprise risk management framework, as discussed in Item 1A – Risk Factors.

 
Cybersecurity Risk Management Processes Integrated [Text Block] We engage and implement risk management strategies to identify, assess, and manage material risks arising from cybersecurity threats and alerts. Our method involves a systematic evaluation of all potential threats, vulnerabilities, and their possible impacts on the Company’s operations, data, and system integrity.
Cybersecurity Risk Management Third Party Engaged [Flag] false
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] false
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board of Directors Oversight [Text Block] Management and Board Oversight 

The Company’s management team is responsible for the oversight and administration of cybersecurity protocols. Our management team relies on our third-party providers to administer cybersecurity assessments to identify, manage, mitigate, and respond to cybersecurity threats. Management updates the Board on any significant cybersecurity occurrences. The Board receives periodic briefings on cybersecurity risks, incidents, and risk mitigation measures, and reviews management’s cybersecurity policies and response plans at least annually. 

 

Cybersecurity Risk Management Positions or Committees Responsible [Text Block] Management updates the Board on any significant cybersecurity occurrences. The Board receives periodic briefings on cybersecurity risks, incidents, and risk mitigation measures, and reviews management’s cybersecurity policies and response plans at least annually.
Cybersecurity Risk Management Expertise of Management Responsible [Text Block] The Company maintains cybersecurity risk management programs designed to help protect the security of data and technology infrastructure. On an annual basis we conduct assessments to identify cyber risks and develop remediation plans to address identified vulnerabilities. Our program is designed to detect, mitigate, and respond to cybersecurity incidents in a timely manner.