Farm Progress is part of the Informa Markets Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Serving: East
farmer smart phone

Are you helping hackers steal your valuable farm data?

Earlier this year, the FBI issued a Private Industry Notification, something the agency does when information obtained during investigations warrants a warning to potential victims.

The Federal Bureau of Investigation and USDA say farmers’ increased use of precision agriculture technology puts farmers at greater risk for cyber targeting by hackers who want to steal farm-level data in bulk.

Earlier this year, the FBI issued a Private Industry Notification, something the agency does when information obtained during investigations warrants a warning to potential victims. In this case, criminal hackers could aggregate stolen data or steal analyzed data to exploit U.S. agriculture resources and market trends, which is something farmers have already expressed concern about.

A 2014 American Farm Bureau Federation survey of 3,400 farmers found more than of half the respondents intended to invest in precision agriculture over the next two years. Three-quarters of respondents were worried unauthorized individuals could use their data for commodity market speculation. Only 5 percent of respondents were aware whether or not the companies holding their farm data had a security breach response plan.

To hinder hackers from getting to farm-level data, the FBI recommends farmers:

  • Inquire how data management companies use and protect their data and to be mindful of the cybersecurity features implemented in precision agriculture technology.
  • Monitor employee logins that occur outside of normal business hours.
  • Use two-factor authentication for employee logins, especially remote logins.
  • Create a centralized Information Technology e-mail account for employees to report suspicious e-mails.
  • Provide regular training to remind and inform employees about current social engineering threats.
  • Monitor unusual traffic, especially over non-standard ports.
  • Monitor outgoing data and be willing to block unknown IP addresses.
  • Close unused ports.
  • Use a Virtual Private Network (VPN) for remote login capability.
Hide comments
account-default-image

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish