Cybersecurity Risk Management and Strategy Disclosure |
12 Months Ended | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dec. 31, 2024 | |||||||||||||
Cybersecurity Risk Management, Strategy, and Governance [Abstract] | |||||||||||||
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block] |
Cybersecurity
attacks impact businesses and organizations of all sizes and sectors on a global basis. At STCB, we recognize the importance of developing,
implementing and maintaining a cybersecurity risk management program. We are currently implementing resources to protect our systems
and data, from cybersecurity threats. We are dependent on internal and external information technology systems and infrastructure to
securely process, transmit, and store critical information. We are currently in the process of engaging an outsourced security firm for
overseeing our cybersecurity. We seek to reduce cybersecurity risks through a variety of cybersecurity risk management activities that
are designed to identify, assess, manage and mitigate cybersecurity threats.Risk
Management Strategy
The Company’s cybersecurity risk management program is focused on the following key areas:
We plan to review and update our policies, procedures, processes and practices to address changes in the threat landscape and as a result of lessons learned from suspected, actual or simulated incidents. We also plan to review industry best practices to assist in evaluating responses to new challenges and risks. These evaluations include testing both the design and operational effectiveness of security controls.
Cybersecurity Risks
While we plan to dedicate significant efforts and resources to our cybersecurity program, we may be unable to successfully identify threats, prevent attacks, satisfactorily resolve cybersecurity incidents, or implement adequate mitigating controls. Any breach of our network security and information systems or other cybersecurity-related incidents that results in, or may result in, the loss, theft or unauthorized disclosure of data, or any delay in determining the full extent of a potential breach, could have a material adverse impact on our business, results of operations, and financial condition, including harm to our reputation and brand, reduced demand for our solutions, time-consuming and expensive litigation, fines, penalties, and other damages. To date and except as otherwise may be noted in this Annual Report, we are not aware of any cybersecurity threats, nor have we had any cybersecurity incidents. |
||||||||||||
Cybersecurity Risk Management Processes Integrated [Text Block] | We intend to use a cross-functional approach to identifying, preventing, assessing, and mitigating cybersecurity threats and incidents, while also implementing controls and procedures that are designed to provide for the prompt escalation of cybersecurity incidents and support appropriate public disclosure and reporting of incidents as required in a timely manner. | ||||||||||||
Cybersecurity Risk Management Third Party Engaged [Flag] | true | ||||||||||||
Cybersecurity Risk Materially Affected or Reasonably Likely to Materially Affect Registrant [Flag] | false | ||||||||||||
Cybersecurity Risk Board Committee or Subcommittee Responsible for Oversight [Text Block] | At present our Board does not oversee the cybersecurity risk management program, however, the Audit Committee of our Board is in the process of implementing procedures to obtain regular updates on our cybersecurity program, including recent developments, key initiatives to strengthen our systems, applicable industry standards, vulnerability assessments, third-party and independent reviews, and other information security considerations. |