Risk Factors Dashboard

Once a year, publicly traded companies issue a comprehensive report of their business, called a 10-K. A component mandated in the 10-K is the ‘Risk Factors’ section, where companies disclose any major potential risks that they may face. This dashboard highlights all major changes and additions in new 10K reports, allowing investors to quickly identify new potential risks and opportunities.

Risk Factors - EDUC

-New additions in green
-Changes in blue
-Hover to see similar sentence in last filing

Item 1A. RISK FACTORS

We are a smaller reporting company and are not required to provide this information.

Item 1B. UNRESOLVED STAFF COMMENTS

None

Item 1C. CYBERSECURITY

The Company has developed and implemented a cybersecurity risk management program intended to protect the confidentiality, integrity, and availability of our critical systems and information. We designed and assessed our cybersecurity risk based on the Payment Card Industry Data Security Standard (PCI DSS). This does not imply that we meet any particular technical standards, specifications, or requirements, only that we use these frameworks as a guide to help us identify, assess, and manage cybersecurity risks relevant to our business.

Our cybersecurity risk management program is integrated into our overall enterprise risk management program and shares common methodologies, reporting channels, and governance processes that apply across the enterprise risk management program to other legal, compliance, strategic, operational, and financial risk areas. Our cybersecurity risk management program includes:

Risk assessments that are designed to help identify material cybersecurity risks to our critical systems and information.

A security team principally responsible for managing (1) our cybersecurity risk assessment processes, (2) our security controls, and (3) our response to cybersecurity incidents.

The use of external service providers, where appropriate, to assess, test or otherwise assist with aspects of our security controls.

Cybersecurity awareness training of our employees, including our incident response personnel.

A cybersecurity incident response plan that includes procedures for responding to cybersecurity incidents.

5

We have not identified risks from known cybersecurity threats, including as a result of any prior cybersecurity incidents, that have materially affected the Company, including our operations, business strategy, results of operations, or financial condition. We face risks from cybersecurity threats that, if realized, are reasonably likely to materially affect us, including our operations, business strategy, results of operations, or financial condition.

Cybersecurity Governance

Our Board considers cybersecurity risk as part of its risk oversight function and has delegated oversight of cybersecurity and other information technology risks to the Company’s Chief Executive Officer and Chief Financial Officer, who oversee management’s implementation of our cybersecurity risk management program and incident response plans.

Our management team and incident response team have overall responsibility for assessing and managing our material risks from cybersecurity threats. The team has primary responsibility for our overall cybersecurity risk management program and supervises both our internal cybersecurity personnel and our retained external cybersecurity consultants that conduct vulnerability scans on a quarterly basis per PCI DSS standards. The team has primary responsibility for our overall cybersecurity risk management program and supervise both our internal cybersecurity personnel and our retained external cybersecurity consultants that conduct vulnerability scans on a quarterly basis per PCI DSS standards. While cyber-attacks are common threats to all businesses, the Company did not experience a material cyber security incident in either fiscal year 2025 or 2024.

Our management team is informed about and monitors the prevention, detection, mitigation, and remediation of key cybersecurity risks and incidents through various means. This may include briefings from internal security personnel, threat intelligence and other information obtained from governmental, public, or private sources, including external consultants engaged by us, and alerts and reports produced by security tools deployed in the information technology environment.

Recently Filed
Click on a ticker to see risk factors
Ticker * File Date
WLTH 2 days, 13 hours ago
SNTW 2 days, 13 hours ago
GCGJ 2 days, 16 hours ago
APOG 2 days, 16 hours ago
QETA 3 days, 19 hours ago
HELE 3 days, 23 hours ago
CUEN 4 days, 10 hours ago
MSB 4 days, 13 hours ago
AZZ 4 days, 14 hours ago
STZ 4 days, 15 hours ago
REBN 4 days, 18 hours ago
AYR 5 days, 15 hours ago
AMCI 6 days, 12 hours ago
LASE 6 days, 13 hours ago
MIND 6 days, 13 hours ago
FDCT 1 week, 2 days ago
HOFT 1 week, 2 days ago
DREM 1 week, 2 days ago
SRRE 1 week, 2 days ago
FMHS 1 week, 2 days ago
TVCN 2 weeks, 2 days ago
SCLX 2 weeks, 2 days ago
CHPG 2 weeks, 2 days ago
BWMG 2 weeks, 2 days ago
QNCX 2 weeks, 2 days ago
SOBR 2 weeks, 2 days ago
ASPI 2 weeks, 2 days ago
FGI 2 weeks, 2 days ago
PLCE 2 weeks, 2 days ago
TWOH 2 weeks, 2 days ago
AAPI 2 weeks, 2 days ago
BLNC 2 weeks, 2 days ago
PGOL 2 weeks, 2 days ago
CMLS 2 weeks, 2 days ago
BB 2 weeks, 3 days ago
IXAQF 2 weeks, 3 days ago
TLYS 2 weeks, 3 days ago
BEEM 2 weeks, 3 days ago
URSB 2 weeks, 3 days ago
DFNS 2 weeks, 3 days ago
BYND 2 weeks, 4 days ago
ALCY 2 weeks, 4 days ago
HYEX 2 weeks, 4 days ago
MOBQ 2 weeks, 4 days ago
GAME 2 weeks, 4 days ago
PPSI 2 weeks, 4 days ago
HSPT 2 weeks, 4 days ago
BBGI 2 weeks, 4 days ago
BUDZ 2 weeks, 4 days ago
HBUV 2 weeks, 4 days ago

OTHER DATASETS

House Trading

Dashboard

Corporate Flights

Dashboard

App Ratings

Dashboard