The Top Questions Every Agribusiness Should Be Asking About Cyberattacks

Cyberattacks are an ever-growing threat to thousands of organizations and businesses worldwide and the ag industry is a top target these days. In fact, experts estimate that a ransomware attack will occur every 11 seconds.

Advertisement

Michael Moore, Executive Vice President at EFC Systems, goes over the most common questions — and answers — on cyberattacks and data security that will quickly educate you on the subject.

  1. Is the ag industry a target for cyberattacks? Not only is ag a target, but it is an easy target regardless of size. On average, ag retailers allocate about .6% of gross revenues towards their technology budgets. Underspending on technology makes it extremely challenging to install the necessary lines of defense to protect technical resources and opens the door for threat actors to enter your environment. As a comparison, businesses outside of ag allocate 2%-5% of gross revenues towards their technology budget and actual amounts vary based on company size and industry. The increased technology spend allows for advanced tools to be installed that ultimately protect business applications and help secure sensitive data. While purchasing equipment and upgrading facilities are more exciting topics when budgeting, remember to allocate the necessary funds to your technology budget to defend against the threats of today.
  2. How do cyberattacks occur? Roughly 91% of cyberattacks originate from individuals clicking on embedded links in enticing emails that are commonly referred to as a phishing email. Once activated, harmful tools are installed on source systems that ultimately provide a gateway for threat actors to encrypt computer systems and hijack sensitive data. We all play a vital role in reducing the spread of cyberattacks by bringing awareness of phishing attempts. Incorporating phishing training and simulation services will educate your team members on the undesirable consequences that successful phishing attempts deliver and will provide insights on which individuals are more prone to respond. Phishing training and simulation services are a cost-effective way to reduce risk through education and has significant ROI. So, think twice before clicking on that link in an email and be sure to validate unexpected emails before acting.
  3. What happens during a cyberattack? It is common for tools installed by threat actors to go undetected for weeks or months so that critical systems and sensitive data can be identified for encryption at a future date. Once complete, threat actors will encrypt data and a systematic process to shutdown systems will occur. It all starts with one user reporting some sort of cyber notice, which quickly spans throughout the entire network. Access to various systems for accounting/financial, agronomy operations, email, and other mission-critical applications are all unavailable. Eventually, a ransom notice will surface and a request to negotiate a price to restore access to systems and data will occur. During this time technology teams should be following their Incident Response Plan (IRP) to assess the damage, determine system restore points, bring up new systems on a clean network, clean infected devices, and transition from electronic to a manual/paper path to continue to serve customers. It is common to engage with outside firms for legal, forensics, and negotiation services, especially for those with cyber insurance coverage.
  4. Why should I be concerned about cyber threats? The first obvious reason why cyberattacks should be concerning is generally all systems are unavailable during an attack, which creates operational challenges for every part of your organization. The second and less obvious reason is the exfiltration of data from your network can be sold on the dark web potentially exposing your customers and team members. Threat actors target sensitive data from HR and finance teams, so it is a good practice to encrypt, or password protect files that contain sensitive data to add an additional layer of protection.

For more questions and answers, continue reading at CropLife.com.

0