Opinion: Cyberattacks Could Put Our Food Supply at Risk. Preparedness is Key
With connected tech used at every level on farms and production sites, our food is vulnerable to cyberattacks.
Opinion: Cyberattacks Could Put Our Food Supply at Risk. Preparedness is Key
With connected tech used at every level on farms and production sites, our food is vulnerable to cyberattacks.
Advances in agriculture technology have allowed farmers to do incredible things in recent years. Beyond just improving crop yields and reducing input costs, farms can monitor their fields from across the world. They can use drones to get aerial views without trekking through acres and acres. They can keep track of how each cow in their herd is moving, eating and even how much they’re chewing. But an increased reliance on technology could put our farmers at risk. The more tech used, the more opportunities for cyberattacks that could jeopardize the food supply chain.
Automated feeding and watering systems, autonomous soil treatment systems or even smart heat pumps or air conditioners all have the capability of connecting to the internet—they’re known in security circles as “endpoints.” For each of these endpoints on the farm, there is a vulnerability that can be exploited by malicious actors.
To proactively address these risks, it’s critical that software manufacturers in this sector prioritize security in their products and components. Security must be planted into every stage of this supply chain, from the farm to the supermarket, to ensure entire systems remain protected against any potential cyberattacks. These aren’t simply empty threats. Hackers are jail-breaking tractors and they’re using ransomware to go after individual farms. Earlier this month, a Quebec agricultural group, l’Union des producteurs agricoles, dealt with a ransomware attack that impacted its more than 40,000 members.
It can be difficult to stay on top of all the risks because of the complexity of the tech and the truly diverse applications of it all. From connected and increasingly autonomous farming equipment to large-scale refrigeration units, manufacturing plants with complex operations and technology and huge transport fleets, each link of the chain presents a potential security threat. Among other best practices, it’s essential that all endpoints are protected with the latest embedded security protocols and that all devices are regularly updated with the latest security patches.
Interestingly, humans have been proven the weakest links in the cybersecurity chain. If organizations adopt “cyber hygiene,” such as using two-factor authentication and making all passwords “long and strong” (and private), this will help guard against some of the most common pitfalls that allow malicious actors in. Unlike farmers, cybercriminals can be quite lazy, so a small amount of protection can cause them to take their malicious activities elsewhere.
To ensure that the food supply chain remains reliable and resilient for all, it’s essential that stakeholders work together to share information and best practices around appropriate cybersecurity standards—this includes software manufacturers, farmers, food processors, retailers and regulators. Education is the best tool for defence across the industry, and ensuring a free flow of information is one way to best protect the food supply chain from start to finish.
Given the costly and devastating consequences that a successful cyberattack could have on the food supply chain, it’s crucial that the agricultural industry takes a proactive approach to cybersecurity, focusing on embedding protection rather than simply reacting to threats after they wreak havoc. As the global population continues to grow, the demand for food increases, making this industry a key target for cybercriminals and bad actors who have the potential to cause widespread disruption on the world stage. The successful integration of technology in agriculture ultimately depends on how well they can invest in robust security measures, conduct regular risk assessment, and ensure all stakeholders are aware of the latest security threats.
It is vital that we apply all the cybersecurity knowledge we have to protect our essential agricultural resources. If you are not a cyberexpert, reach out to the professionals who live and breathe this space every day. An ounce of prevention is worth a pound of cure, and one cyberbreach will be much more costly than taking a proactive approach.
Charles Eagan is chief technology officer at BlackBerry. A dynamic leader and IoT expert, Eagan has been at the forefront of new frontiers in digital connectivity for more than 30 years. Eagan’s career has included many industry firsts, with a strong focus on security and innovation in every role. At BlackBerry, Eagan is responsible for the advancement of new technologies, driving innovation within emerging markets and advancing security capabilities that leverage Artificial Intelligence and Machine Learning. He is also responsible for technology research with an emphasis on driving automotive cybersecurity.
Follow us
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Want to republish a Modern Farmer story?
We are happy for Modern Farmer stories to be shared, and encourage you to republish our articles for your audience. When doing so, we ask that you follow these guidelines:
Please credit us and our writers
For the author byline, please use “Author Name, Modern Farmer.” At the top of our stories, if on the web, please include this text and link: “This story was originally published by Modern Farmer.”
Please make sure to include a link back to either our home page or the article URL.
At the bottom of the story, please include the following text:
“Modern Farmer is a nonprofit initiative dedicated to raising awareness and catalyzing action at the intersection of food, agriculture, and society. Read more at <link>Modern Farmer</link>.”
Use our widget
We’d like to be able to track our stories, so we ask that if you republish our content, you do so using our widget (located on the left hand side of the article). The HTML code has a built-in tracker that tells us the data and domain where the story was published, as well as view counts.
Check the image requirements
It’s your responsibility to confirm you're licensed to republish images in our articles. Some images, such as those from commercial providers, don't allow their images to be republished without permission or payment. Copyright terms are generally listed in the image caption and attribution. You are welcome to omit our images or substitute with your own. Charts and interactive graphics follow the same rules.
Don’t change too much. Or, ask us first.
Articles must be republished in their entirety. It’s okay to change references to time (“today” to “yesterday”) or location (“Iowa City, IA” to “here”). But please keep everything else the same.
If you feel strongly that a more material edit needs to be made, get in touch with us at [email protected]. We’re happy to discuss it with the original author, but we must have prior approval for changes before publication.
Special cases
Extracts. You may run the first few lines or paragraphs of the article and then say: “Read the full article at Modern Farmer” with a link back to the original article.
Quotes. You may quote authors provided you include a link back to the article URL.
Translations. These require writer approval. To inquire about translation of a Modern Farmer article, contact us at [email protected]
Signed consent / copyright release forms. These are not required, provided you are following these guidelines.
Print. Articles can be republished in print under these same rules, with the exception that you do not need to include the links.
Tag us
When sharing the story on social media, please tag us using the following: - Twitter (@ModFarm) - Facebook (@ModernFarmerMedia) - Instagram (@modfarm)
Use our content respectfully
Modern Farmer is a nonprofit and as such we share our content for free and in good faith in order to reach new audiences. Respectfully,
No selling ads against our stories. It’s okay to put our stories on pages with ads.
Don’t republish our material wholesale, or automatically; you need to select stories to be republished individually.
You have no rights to sell, license, syndicate, or otherwise represent yourself as the authorized owner of our material to any third parties. This means that you cannot actively publish or submit our work for syndication to third party platforms or apps like Apple News or Google News. We understand that publishers cannot fully control when certain third parties automatically summarize or crawl content from publishers’ own sites.
Keep in touch
We want to hear from you if you love Modern Farmer content, have a collaboration idea, or anything else to share. As a nonprofit outlet, we work in service of our community and are always open to comments, feedback, and ideas. Contact us at [email protected].by Charles Eagan, Modern Farmer
August 23, 2023
Modern Farmer Weekly
Solutions Hub
Innovations, ideas and inspiration. Actionable solutions for a resilient food system.
ExploreExplore other topics
Share With Us
We want to hear from Modern Farmer readers who have thoughtful commentary, actionable solutions, or helpful ideas to share.
SubmitNecessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and are used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies.
“Unlike farmers, cybercriminals can be quite lazy, so a small amount of protection can cause them to take their malicious activities elsewhere” That’s a rather worrying statement by someone of that background to make! Some cyber criminals may be quite lazy, but only because they generally use automation to attack and subdue a target. A small amount of protection can be useful, but only if it’s kept updated regularly: one of the worst practices by industries that tend to buy black-box IT solutions is to not update their systems, and it’s then that the cyber criminals take control. If the… Read more »
Cybercriminals, unlike farmers, can be quite sluggish, so even a little bit of security can deter them from committing cybercrime in one place and moving on to another. That’s a shocking claim for someone from that background to make! It’s true that some cybercriminals take the easy way out, but that’s usually because they rely on automated tools to launch attacks and gain control over their victims.