Some findings after 10 months of COVID pandemic

By Atanasios MOSCHOS, Quality, Security & Safety Director, Confiserie Leonidas

Some findings after 10 months of COVID pandemic

Some findings after 10 months of COVID pandemic

By Atanasios MOSCHOS, Quality, Security & Safety Director, Confiserie Leonidas

Some findings after 10 months of COVID pandemic

If You Build It, They Will Come...Maybe

By Casey Debruyn, Ph.d., Heartland Food Products Group

If You Build It, They Will Come...Maybe

Keys to Reaching the Peak of a Cyber Security Program Journey

By Christine Vanderpool, VP IT Security & CISO, Florida Crystals

Keys to Reaching the Peak of a Cyber Security Program...

What are the Possible Ways To Get Rid of Cyber attacks in Food Safety?

Food and Beverages | Friday, August 21, 2020

Investing in cybersecurity is key to risk management processes to protect food companies from possible attacks.

Fremont, CA: As technology penetrates all industries,  the number of cyber-threats to these industries grows simultaneously, and the food industry is no exception to this. And it is the production chain in the food industry that is highly susceptible to cybercrime. Although the food industry is not a target of costly cyber attacks like financial, healthcare, and other sectors have, the attackers are looking for easier victims. Food companies lack sufficient knowledge about how their industrial control systems and IT systems interact. Further, they lack awareness about cyber risks and threats, where it becomes essential for food companies to begin protecting themselves.

Similar to practices used to identify and address food-processing risks, such as pathogens and foreign materials, methods for protecting essential data for processing are the same. These practices comprise evaluation of threats, assessment of occurrence probability, and mitigation of threats. The consequences of cyber attacks are substantial, including financial losses, business interruption, and lowering of reputation. The following ways can address the risk in food companies.

Incorporate cybersecurity tech into food safety and food defense culture 
Monitor and protect critical control points    
Follow cyber policy to bridge the gap and facilitate more communication between OT (operational technology), PR, legal experts, and IT (information technology) personnel to get control of the crisis as quickly as possible.
Maintain security zones to prevent threat migration
Conduct risk assessments of inventory control systems and IT systems
Conduct tests of risk points and the general environment regularly
Ensure that staff with cybersecurity knowledge is involved in procuring and deploying inventory control system devices
Keep sensitive data isolated to minimize access points
Shift from on-premises system to a cloud-based food quality management system

CIOs of the food industry consider taking the above “critical” steps by investing in cyber-coverage as a part of your risk management process is vital as it is everywhere these days.

 

Read Also

follow on linkedin Copyright © 2021 www.fbtechreview.com All Rights Reserved | Privacy Policy
Top