Cyber Reality Bites into U.S. Food Supply Chain: How to Protect Your Operation

Food & Ag Industry Named a Targeted Industry for Cybercrime

Share this blog!

Subscribe

Sign up for our eNewsletter, Good Sense, to get updates on financial, strategic and operational best practices for financial institutions.

Subscribe

Get the latest information on legislation, tax reform, business guidance and on farm optimization strategies from your Pinion Ag Experts.

Subscribe

Get the latest information on legislation, tax reform, business guidance and biofuel manufacturing optimization strategies from your Pinion Biofuels Experts.

Reading Time: 3 minutes

If you’ve previously brushed off the notion of cyber threats, it’s time to reconsider. The food and agriculture industry has just become the seventh most targeted industry in the U.S. for cybercrimes. No size or scope of operation is immune.

“Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” stated Gene Kowel, special agent in charge of the FBI’s Omaha Field Office.

Foreign adversaries, including nations like China and Russia, are actively seeking ways to disrupt the American food supply chain. Last year, six grain cooperatives were forced to temporarily shut down due to foreign cyberattacks. One farmer was forced to close his operation after losing $9 million in damages due to cyberattacks.

“If your operation isn’t positioned to identify and react quickly to a cyberattack, it can be a devastating loss – especially for the small- to medium-size businesses that don’t have any strategies in place,” cautions Melissa DeDonder, business technology consultant at Pinion. 

“Food and Ag operations will begin to see laws coming down the pipeline that will require they be aligned with a security framework,” DeDonder adds. (The CMMC framework is currently required to be considered for the government supply chain.)

How They’re Attacking: 4 Threats to Watch For

Four specific cyber threats that should be on every producer’s radar, according to the FBI:

  1. Criminal ransomware attacks
  2. Data theft by foreign adversaries
  3. Malware targeting control systems and farming machinery
  4. The threat of bio-terrorism

Cybercriminals often start with phishing attacks. They use email, social media or other apps to send messages that look legitimate but contain links or malicious attachments. The goal is to get you, a family member or an employee to click on the fake link or attachment and either provide login credentials to sensitive information or execute harmful code.

Weak passwords, compromised credentials and poor encryption can also allow hackers to gain unauthorized access to your systems. Notably, ransomware attackers are more likely to attack ag operations during critical planting and harvest seasons to disrupt the American food supply chain. It’s important to be on alert.

7 Steps to Protect Your Operation Against Cyberattacks

Regardless of your business’s size, it’s crucial to implement an ongoing prevention plan along with detection strategies. This ensures that if a security breach occurs, you can act quickly to identify it and minimize potential losses.

Pinion IT consultants have compiled some basic practices and tools needed to protect against cyberattacks:

  1. Prioritize regular software updates. Ensure that all your software, including the operating systems on your devices, is up-to-date and patched.
  2. Use strong passwords. Always use unique passwords for all your systems and change them several times a year. This includes your computer, social media accounts and even home devices.
  3. Use Multi-Factor Authentication (MFA). This additional layer of security can significantly reduce the risk of unauthorized access to your devices and accounts.
  4. Install and regularly update anti-virus and anti-malware software.
  5. Only use secure networks. Avoid using public Wi-Fi for business transactions or accessing sensitive information. Instead, use secure, encrypted networks. Consider installing and using a virtual private network (VPN).
  6. Invest in identify-theft protection. Identify theft programs or vendors monitor your accounts for threats and assist with resolving issues quickly if your financial accounts are compromised, saving you time and frustration.
  7. Educate your team. Continually train your employees on the latest cyber threats and how to handle suspicious emails, links and phishing attempts.

By implementing these strategies, you can significantly mitigate your risk of cyberattacks and safeguard your operation, reputation, and customer trust.  You should contact the FBI’s cybersecurity task force if you see something suspicious or encounter issues.

Do you know your risk vulnerability? Pinion business technology advisors can identify potential risks and pain points, and develop effective plans, frameworks, and practices to safeguard your operation.

Pinion People Related to this Post