Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2025 | |||||||||||||
| Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||
| Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Cybersecurity
attacks impact businesses and organizations of all sizes and sectors on a global basis. At STCB, we recognize the importance of developing,
implementing and maintaining a cybersecurity risk management program. We maintain resources to protect our systems
and data against cybersecurity threats. We are dependent on internal and external information technology systems and infrastructure to
securely process, transmit, and store critical information. We engage an outsourced security firm to
oversee our cybersecurity. We reduce cybersecurity risks through a variety of cybersecurity risk management activities that
are designed to identify, assess, manage and mitigate cybersecurity threats.Risk
Management Strategy
The Company’s cybersecurity risk management program focuses on the following key areas:
We review and update our policies, procedures, processes and practices to address changes in the threat landscape and based on lessons learned from suspected, actual or simulated incidents. We also review industry best practices to assist in evaluating responses to new challenges and risks. These evaluations include testing both the design and operational effectiveness of security controls.
Cybersecurity Risks
While we dedicate significant efforts and resources to our cybersecurity program, we may be unable to successfully identify threats, prevent attacks, satisfactorily resolve cybersecurity incidents, or implement adequate mitigating controls. Any breach of our network security and information systems or other cybersecurity-related incidents that results in, or may result in, the loss, theft or unauthorized disclosure of data, or any delay in determining the full extent of a potential breach, could have a material adverse impact on our business, results of operations, and financial condition, including harm to our reputation and brand, reduced demand for our solutions, time-consuming and expensive litigation, fines, penalties, and other damages. To date and except as otherwise may be noted in this Annual Report, we are not aware of any cybersecurity threats, nor have we had any cybersecurity incidents. |
||||||||||||
| Cybersecurity Risk Management Processes Integrated [Text Block] | We use a cross-functional approach to identifying, preventing, assessing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures designed to provide for the prompt escalation of cybersecurity incidents and support appropriate public disclosure and reporting of incidents when required. | ||||||||||||
| Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||
| Cybersecurity Risk Third Party Oversight and Identification Processes [Flag] | true | ||||||||||||
| Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||
| Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | At present our Board does not oversee the cybersecurity risk management program, however, the Audit Committee receives regular updates on our cybersecurity program, including recent developments, key initiatives to strengthen our systems, applicable industry standards, vulnerability assessments, third-party and independent reviews, and other information security considerations. |