Annual report [Section 13 and 15(d), not S-K Item 405]

Cybersecurity Risk Management and Strategy Disclosure

v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] Cybersecurity attacks impact businesses and organizations of all sizes and sectors on a global basis. At STCB, we recognize the importance of developing, implementing and maintaining a cybersecurity risk management program. We maintain resources to protect our systems and data against cybersecurity threats. We are dependent on internal and external information technology systems and infrastructure to securely process, transmit, and store critical information. We engage an outsourced security firm to oversee our cybersecurity. We reduce cybersecurity risks through a variety of cybersecurity risk management activities that are designed to identify, assess, manage and mitigate cybersecurity threats.Risk Management Strategy

 

The Company’s cybersecurity risk management program focuses on the following key areas:

 

  Governance: The cybersecurity risk management program is led by our outsourced security team. At present our Board does not oversee the cybersecurity risk management program, however, the Audit Committee receives regular updates on our cybersecurity program, including recent developments, key initiatives to strengthen our systems, applicable industry standards, vulnerability assessments, third-party and independent reviews, and other information security considerations.
  Approach: We use a cross-functional approach to identifying, preventing, assessing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures designed to provide for the prompt escalation of cybersecurity incidents and support appropriate public disclosure and reporting of incidents when required. Our cybersecurity efforts include the use of risk-based administrative, technical, and physical controls. STCB maintains an extensive set of policies, procedures, systems and tools designed to help safeguard our systems and data, including firewalls, intrusion detection systems, access controls including multi-factor authentication, vulnerability scanning, penetration testing, independent third-party control audits, an internal bug bounty program, and other systems and processes.
  Incident Response Planning: We maintain a breach reporting and resolution plan that includes defined processes, roles, communications, responsibilities and procedures for responding to cybersecurity incidents and other events that impact our operations. Our incident response plans are tested and evaluated on a regular basis.
  Education and Awareness: We maintain a security and privacy awareness program that runs throughout the year and includes training for all company personnel to enhance employee awareness of how to detect and respond to cybersecurity threats as well as more targeted training for company personnel that have increased responsibility for mitigating certain potential cybersecurity risks.

 

We review and update our policies, procedures, processes and practices to address changes in the threat landscape and based on lessons learned from suspected, actual or simulated incidents. We also review industry best practices to assist in evaluating responses to new challenges and risks. These evaluations include testing both the design and operational effectiveness of security controls.

 

Cybersecurity Risks

 

While we dedicate significant efforts and resources to our cybersecurity program, we may be unable to successfully identify threats, prevent attacks, satisfactorily resolve cybersecurity incidents, or implement adequate mitigating controls. Any breach of our network security and information systems or other cybersecurity-related incidents that results in, or may result in, the loss, theft or unauthorized disclosure of data, or any delay in determining the full extent of a potential breach, could have a material adverse impact on our business, results of operations, and financial condition, including harm to our reputation and brand, reduced demand for our solutions, time-consuming and expensive litigation, fines, penalties, and other damages. To date and except as otherwise may be noted in this Annual Report, we are not aware of any cybersecurity threats, nor have we had any cybersecurity incidents.

 
Cybersecurity Risk Management Processes Integrated [Text Block] We use a cross-functional approach to identifying, preventing, assessing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures designed to provide for the prompt escalation of cybersecurity incidents and support appropriate public disclosure and reporting of incidents when required.
Cybersecurity Risk Management Third Party Engaged [Flag] true
Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] true
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] false
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] At present our Board does not oversee the cybersecurity risk management program, however, the Audit Committee receives regular updates on our cybersecurity program, including recent developments, key initiatives to strengthen our systems, applicable industry standards, vulnerability assessments, third-party and independent reviews, and other information security considerations.