Cyber security news for all

More

    Food industry companies are the new targets for hackers

    The cyberattack against Fleury Michon in France seems to confirm all fears: This is no accident, because these are strategic companies. Situation assessment on challenges, risks and defense.

    The cyber attackers targeting the food industry are operating at a completely different level. Those who attack this industry are not beginners. Given the economic and sanitary interests at stake and governance challenges, companies are more likely to deal with a group of well-coordinated hackers or even a mafia or government organization.

    Not to mention attacks designed to take control of machines to change recipes or the quality of a product. If someone changes the recipe of a juice ,it doesn’t taste the way it should, people won’t buy it anymore. If someone changes a sensor and is no longer able to detect an allergen or a product that is harmful to health, companies put the consumers at risk. And if the production chain slows down or stops, they can no longer meet the demand.

    Food industry hackers

    Taking Advantage Of Stock Market Speculation

    But that’s not all. The hackers can also take advantage of stock market speculation on food stocks or commodities. It cannot be ruled out that certain people had bet against Eurofin whose share price had declined significantly after the cyberattack. This is a new form of insider business.

    Certain foods are even considered critical products. In France therefore, water management and food are among the key sectors listed in the Defense Budget Act. And who knows if there are not also certain farmers among the listed key players? If you know that the health sector has a high consumption of starch, anything is possible.

    From the producer to the consumer, different actors (from harvesting to processing to distribution) meet who have different levels of cybersecurity. The problem: Every link in the chain ensures its own cybersecurity. If a single link fails, the entire chain can be at risk.

    The Supply Chain Leads To A Concentration Of Risks

    Automation creates new gates of entry which, if they have not been clearly identified from the start, can become back doors.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox

    [tdn_block_newsletter_subscribe input_placeholder="Email address" btn_text="Subscribe" tds_newsletter2-image="730" tds_newsletter2-image_bg_color="#c3ecff" tds_newsletter3-input_bar_display="" tds_newsletter4-image="731" tds_newsletter4-image_bg_color="#fffbcf" tds_newsletter4-btn_bg_color="#f3b700" tds_newsletter4-check_accent="#f3b700" tds_newsletter5-tdicon="tdc-font-fa tdc-font-fa-envelope-o" tds_newsletter5-btn_bg_color="#000000" tds_newsletter5-btn_bg_color_hover="#4db2ec" tds_newsletter5-check_accent="#000000" tds_newsletter6-input_bar_display="row" tds_newsletter6-btn_bg_color="#da1414" tds_newsletter6-check_accent="#da1414" tds_newsletter7-image="732" tds_newsletter7-btn_bg_color="#1c69ad" tds_newsletter7-check_accent="#1c69ad" tds_newsletter7-f_title_font_size="20" tds_newsletter7-f_title_font_line_height="28px" tds_newsletter8-input_bar_display="row" tds_newsletter8-btn_bg_color="#00649e" tds_newsletter8-btn_bg_color_hover="#21709e" tds_newsletter8-check_accent="#00649e" embedded_form_code="YWN0aW9uJTNEJTIybGlzdC1tYW5hZ2UuY29tJTJGc3Vic2NyaWJlJTIy" tds_newsletter="tds_newsletter1" tds_newsletter3-all_border_width="2" tds_newsletter3-all_border_color="#e6e6e6" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjAiLCJib3JkZXItY29sb3IiOiIjZTZlNmU2IiwiZGlzcGxheSI6IiJ9fQ==" tds_newsletter1-btn_bg_color="#0d42a2" tds_newsletter1-f_btn_font_family="406" tds_newsletter1-f_btn_font_transform="uppercase" tds_newsletter1-f_btn_font_weight="800" tds_newsletter1-f_btn_font_spacing="1" tds_newsletter1-f_input_font_line_height="eyJhbGwiOiIzIiwicG9ydHJhaXQiOiIyLjYiLCJsYW5kc2NhcGUiOiIyLjgifQ==" tds_newsletter1-f_input_font_family="406" tds_newsletter1-f_input_font_size="eyJhbGwiOiIxMyIsImxhbmRzY2FwZSI6IjEyIiwicG9ydHJhaXQiOiIxMSIsInBob25lIjoiMTMifQ==" tds_newsletter1-input_bg_color="#fcfcfc" tds_newsletter1-input_border_size="0" tds_newsletter1-f_btn_font_size="eyJsYW5kc2NhcGUiOiIxMiIsInBvcnRyYWl0IjoiMTEiLCJhbGwiOiIxMyJ9" content_align_horizontal="content-horiz-center"]