Growers are very mindful of their data and the importance of owning the rights to it. Even still, many are willingly giving their data to corporations in order to improve their productivity, increase their yield, and make their farms more profitable. Data ownership and profitability are of course very important, but they are not the only issues growers should be concerned about. They should be asking critical questions about how secure their assets and data are in the first place.
When news broke that growers are using third-party software to access their vehicles, I was surprised to find the focus of conversation was not centered on the fact that third-party software is a susceptible exploit for hacking into equipment.
Combined with the new push for rural broadband Internet access, the fact of the matter is that machines and data have never been more vulnerable from a security perspective. Wherever there are high-speed connections, the vast fields of rural America provide a false sense of security.
How to Get Ahead of Cyber Attacks
There are endless possibilities of what can be hacked. But rather than focusing on scare tactics, I would like to outline three steps growers can take to protect themselves:
1) Secure the Physical Environment:
A secure physical environment is paramount in order to protect critical infrastructure and hardware. Locations that host these assets must be monitored to ensure they are not tampered with by third parties. At its simplest this includes physical locks, and at its most advanced it includes badge readers that digitally log activity.