Articles

Cybersecurity in the Food Sector

By CFIN Newsdesk posted 10-13-2023 08:00

  

Welcome to YODL! In addition to daily original content, YODL helps CFIN Members find new partnersresources, and funding opportunities to grow their food business. Learn more about this growing community and become a CFIN Member (for free!) today 

.

CFIN and cybersecurity firm Beauceron have partnered to deliver a three-part webinar series on cybersecurity threats in the food and beverage industry. These webinars, made exclusively for CFIN members, dive into how cybercriminals target food and beverage companies and foodtech businesses, and offer actionable steps to protect your business from unwanted threats.  

 

In Part 1 of the series Nestor Gomez, Chief Technology Officer for CFIN, sat down with Rozita Dara, principal investigator of data management and privacy governance research program at the University of Guelph, and David Shipley, CEO and co-founder of Beauceron Security, for an overview of cybersecurity in the food sector. They also highlight recent cyberattacks against food businesses, the biggest risks companies now face, and steps companies can take to defend against cybercriminals. Following the video are the top three takeaways. 

Here are the top three takeaways from the event: 

 

1. Cyber threats are real risks for food companies 

As recent events with Maple Leaf Foods and Empire Co. have shown, online attacks such as phishing and ransomware can have a significant impact on a company’s supply chain, operations, products, artificial intelligence (AI) and distribution system. The attacks can happen anywhere in the food supply chain, from farms to consumers, and can even impact the region. Unfortunately, many food and beverage companies have not invested in solutions to protect themselves from cyberattacks.  

 

2. Companies need to have a cybersecurity plan 

Analyze where your company has vulnerabilities, and then implement a plan for protecting your data. Follow critical control checks, and cybersecurity best practices such as multifactor authentication for employee sign-in to any connected system. Conduct a tabletop exercise with management so everyone understands what to do when facing a cybersecurity threat.  

 

3. Staff are crucial to the success of your cybersecurity plan 

Properly training employees, including management, on cybersecurity risks and solutions is crucial. Staff need to comprehend the threats and how to report and/or handle them, and management needs to ensure all staff buys into the plan. Follow up with quizzes and continual training.